Web Administrator User Role Security & Risk Analysis

wordpress.org/plugins/web-administrator-user-role

Plugin that automatically creates custom role for Web Administrators and allows to edit capacities for this role.

10 active installs v2.2 PHP + WP 4.8+ Updated Mar 19, 2018
administratorcapabilitychange-capabilitiesuser-roleuser-role-plugin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Web Administrator User Role Safe to Use in 2026?

Generally Safe

Score 85/100

Web Administrator User Role has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "web-administrator-user-role" v2.2 plugin presents a generally strong security posture based on the provided static analysis. The absence of any recorded vulnerabilities, including CVEs, is a significant positive indicator. The plugin also demonstrates good practices by avoiding dangerous functions, external HTTP requests, and file operations. Crucially, it utilizes prepared statements for all SQL queries, mitigating the risk of SQL injection, and has no discernible attack surface through AJAX, REST API, shortcodes, or cron events, with all identified entry points (though zero) apparently protected.

However, a significant concern arises from the lack of output escaping. With 3 total outputs and 0% properly escaped, this leaves the plugin vulnerable to cross-site scripting (XSS) attacks. Any data displayed by the plugin that originates from user input or other untrusted sources could potentially be injected with malicious scripts. Furthermore, the complete absence of nonce checks and capability checks across all entry points is a serious oversight. While the attack surface is currently reported as zero, any future addition of functionality without these fundamental security measures would create significant vulnerabilities.

In conclusion, while the plugin benefits from a clean vulnerability history and robust SQL handling, the unescaped output and lack of authorization checks are critical weaknesses that require immediate attention. These issues significantly outweigh the current lack of exploitable entry points, creating a substantial risk of XSS and potential unauthorized access if functionality is ever added or if the attack surface is expanded.

Key Concerns

  • All outputs are unescaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Web Administrator User Role Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Web Administrator User Role Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Web Administrator User Role Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_enqueue_scriptsweb-administrator-user-role.php:18
actionadmin_menuweb-administrator-user-role.php:74
filtereditable_rolesweb-administrator-user-role.php:91
Maintenance & Trust

Web Administrator User Role Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 19, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Web Administrator User Role Developer Profile

Robert Kampas

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Web Administrator User Role

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/web-administrator-user-role/web-administrator-user-role.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Web Administrator User Role