WebUser All in one Security & Risk Analysis

wordpress.org/plugins/webuser-all-in-one

A plugin developed by Webuser B.V. for Webuser customers.

10 active installs v1.2.5 PHP + WP 3.0.1+ Updated Dec 13, 2016
webuser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WebUser All in one Safe to Use in 2026?

Generally Safe

Score 85/100

WebUser All in one has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The webuser-all-in-one plugin v1.2.5 exhibits a mixed security posture. On the positive side, it has no known vulnerabilities (CVEs) and demonstrates good practices in its handling of SQL queries, exclusively using prepared statements. Furthermore, all identified entry points (AJAX, REST API, shortcodes, cron) appear to have some form of authentication or permission checks in place, which is a strong security measure. However, significant concerns arise from the static code analysis. The presence of the `unserialize` function is a critical risk, as it can lead to Remote Code Execution if used with untrusted serialized data. The taint analysis reveals that a majority of analyzed flows (5 out of 6) have unsanitized paths, indicating a potential for data to be processed without proper validation, even if no 'critical' or 'high' severity issues were flagged in the taint analysis itself. The low percentage of properly escaped output (28%) is also a considerable weakness, suggesting a high probability of Cross-Site Scripting (XSS) vulnerabilities. The plugin's vulnerability history being completely clear is a positive sign, but it does not negate the risks identified in the current codebase.

In conclusion, while the plugin benefits from a clean vulnerability record and a seemingly secured attack surface, the identified use of `unserialize` and the prevalence of unsanitized paths in taint analysis, coupled with inadequate output escaping, present substantial security risks. These code-level weaknesses require immediate attention to mitigate potential exploitation, particularly for XSS and potential RCE via unserialization.

Key Concerns

  • Dangerous function unserialize found
  • Low percentage of properly escaped output
  • Most flows with unsanitized paths
Vulnerabilities
None known

WebUser All in one Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WebUser All in one Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
63
25 escaped
Nonce Checks
2
Capability Checks
1
File Operations
8
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize($data);core\Google\Cache\File.php:59

Output Escaping

28% escaped88 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

6 flows5 with unsanitized paths
ga_options_do_network_errors (core\core_google_apps_login.php:561)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WebUser All in one Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[webuser_header] WebUser All in one.php:620
WordPress Hooks 24
actionadmin_noticescore\core_google_apps_login.php:440
actionnetwork_admin_noticescore\core_google_apps_login.php:442
actionshow_user_profilecore\core_google_apps_login.php:450
actionplugins_loadedcore\core_google_apps_login.php:822
actionlogin_enqueue_scriptscore\core_google_apps_login.php:824
actionlogin_formcore\core_google_apps_login.php:825
filterauthenticatecore\core_google_apps_login.php:826
filterlogin_redirectcore\core_google_apps_login.php:828
actioninitcore\core_google_apps_login.php:829
actionadmin_initcore\core_google_apps_login.php:831
filtergal_get_clientidcore\core_google_apps_login.php:835
filternetwork_admin_plugin_action_linkscore\core_google_apps_login.php:838
filterplugin_action_linkscore\core_google_apps_login.php:842
filtermap_meta_capWebUser All in one.php:39
actionadmin_menuWebUser All in one.php:205
actionnetwork_admin_menuWebUser All in one.php:206
actionwp_dashboard_setupWebUser All in one.php:234
actionadmin_noticesWebUser All in one.php:343
actionnetwork_admin_noticesWebUser All in one.php:345
actionlogin_enqueue_scriptsWebUser All in one.php:395
actionlogin_enqueue_scriptsWebUser All in one.php:401
actionadd_meta_boxesWebUser All in one.php:424
actionsave_postWebUser All in one.php:567
actionadmin_headWebUser All in one.php:618
Maintenance & Trust

WebUser All in one Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 13, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

WebUser All in one Alternatives

No alternatives data available yet.

Developer Profile

WebUser All in one Developer Profile

Sem Wong

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WebUser All in one

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/webuser-all-in-one/core/css/google.css/wp-content/plugins/webuser-all-in-one/core/js/google.js
Version Parameters
webuser-all-in-one/style.css?ver=webuser-all-in-one/script.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Webuser capabilities BEGIN --><!-- Webuser capabilities EINDE --><!-- Webuser database installation BEGIN --><!-- Webuser database installation EINDE -->+5 more
FAQ

Frequently Asked Questions about WebUser All in one