
WebUser All in one Security & Risk Analysis
wordpress.org/plugins/webuser-all-in-oneA plugin developed by Webuser B.V. for Webuser customers.
Is WebUser All in one Safe to Use in 2026?
Generally Safe
Score 85/100WebUser All in one has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The webuser-all-in-one plugin v1.2.5 exhibits a mixed security posture. On the positive side, it has no known vulnerabilities (CVEs) and demonstrates good practices in its handling of SQL queries, exclusively using prepared statements. Furthermore, all identified entry points (AJAX, REST API, shortcodes, cron) appear to have some form of authentication or permission checks in place, which is a strong security measure. However, significant concerns arise from the static code analysis. The presence of the `unserialize` function is a critical risk, as it can lead to Remote Code Execution if used with untrusted serialized data. The taint analysis reveals that a majority of analyzed flows (5 out of 6) have unsanitized paths, indicating a potential for data to be processed without proper validation, even if no 'critical' or 'high' severity issues were flagged in the taint analysis itself. The low percentage of properly escaped output (28%) is also a considerable weakness, suggesting a high probability of Cross-Site Scripting (XSS) vulnerabilities. The plugin's vulnerability history being completely clear is a positive sign, but it does not negate the risks identified in the current codebase.
In conclusion, while the plugin benefits from a clean vulnerability record and a seemingly secured attack surface, the identified use of `unserialize` and the prevalence of unsanitized paths in taint analysis, coupled with inadequate output escaping, present substantial security risks. These code-level weaknesses require immediate attention to mitigate potential exploitation, particularly for XSS and potential RCE via unserialization.
Key Concerns
- Dangerous function unserialize found
- Low percentage of properly escaped output
- Most flows with unsanitized paths
WebUser All in one Security Vulnerabilities
WebUser All in one Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
WebUser All in one Attack Surface
Shortcodes 1
WordPress Hooks 24
Maintenance & Trust
WebUser All in one Maintenance & Trust
Maintenance Signals
Community Trust
WebUser All in one Alternatives
No alternatives data available yet.
WebUser All in one Developer Profile
2 plugins · 40 total installs
How We Detect WebUser All in one
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/webuser-all-in-one/core/css/google.css/wp-content/plugins/webuser-all-in-one/core/js/google.jswebuser-all-in-one/style.css?ver=webuser-all-in-one/script.js?ver=HTML / DOM Fingerprints
<!-- Webuser capabilities BEGIN --><!-- Webuser capabilities EINDE --><!-- Webuser database installation BEGIN --><!-- Webuser database installation EINDE -->+5 more