
UTHSC WPCAS Security & Risk Analysis
wordpress.org/plugins/uthsc-wpcasIntegrate Central Authentication Service (CAS) with WordPress
Is UTHSC WPCAS Safe to Use in 2026?
Generally Safe
Score 85/100UTHSC WPCAS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The uthsc-wpcas plugin v1.0 presents a mixed security posture. On one hand, the plugin demonstrates strong security practices in its handling of database interactions, with all SQL queries utilizing prepared statements. Furthermore, the static analysis reveals a very small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits the potential avenues for external exploitation. However, there are notable concerns. The complete absence of nonce checks and capability checks is a major weakness, as it means actions within the plugin are not protected against CSRF attacks or unauthorized privilege escalation. Additionally, the low percentage of properly escaped output (3%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website. The presence of the `ini_set` function, while not inherently malicious, warrants review in its usage as it can alter PHP configurations. The lack of any recorded vulnerabilities in its history is a positive indicator, suggesting the developers may be attentive, but it does not negate the risks identified in the current code analysis.
Key Concerns
- Missing nonce checks
- Missing capability checks
- Low percentage of properly escaped output
- Use of ini_set function
UTHSC WPCAS Security Vulnerabilities
UTHSC WPCAS Release Timeline
UTHSC WPCAS Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
UTHSC WPCAS Attack Surface
WordPress Hooks 13
Maintenance & Trust
UTHSC WPCAS Maintenance & Trust
Maintenance Signals
Community Trust
UTHSC WPCAS Alternatives
wpCAS
wpcas
wpCAS integrates WordPress into an established CAS architecture, allowing centralized management and authentication of user credentials in a heterogen …
Cassava CAS Server
wp-cas-server
Cassava provides authentication services based on the Jasig CAS protocol.
wpCAS Server
wpcas-server
Turns WordPress or WordPress MU into a CAS single sign-on authenticator.
Authorizer
authorizer
Authorizer limits login attempts, restricts access to specific users, and authenticates against external sources (OAuth2, Google, LDAP, or CAS).
WP Cassify
wp-cassify
The plugin is an Apereo CAS Client. It performs CAS authentication and autorization for Wordpress.
UTHSC WPCAS Developer Profile
1 plugin · 10 total installs
How We Detect UTHSC WPCAS
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/uthsc-wpcas/admin/css/uthsc-wpcas-admin.css/wp-content/plugins/uthsc-wpcas/admin/js/uthsc-wpcas-admin.js/wp-content/plugins/uthsc-wpcas/phpCAS-1.3-stable/CAS.php/wp-content/plugins/uthsc-wpcas/phpCAS-1.3-stable/CAS.phputhsc-wpcas/admin/css/uthsc-wpcas-admin.css?ver=uthsc-wpcas/admin/js/uthsc-wpcas-admin.js?ver=HTML / DOM Fingerprints
uthsc-wpcas-settings-pageuthsc-wpcas-test-pageuthsc-wpcas-about-page<!-- Register settings in lib/wpcas-options.php --><!-- Update settings in lib/wpcas-options.php --><!-- Unregister settings in lib/wpcas-options.php --><!-- Delete settings in lib/wpcas-options.php -->+17 moredata-wpcas-hostdata-wpcas-portdata-wpcas-contextdata-wpcas-cas-server-ca-certdata-wpcas-no-cas-server-validationphpCAS