
WP-Orphanage Extended Security & Risk Analysis
wordpress.org/plugins/wp-orphanage-extendedPlugin to promote users with no roles set (the orphans) to the role from other blog where they registered or to default if any found.
Is WP-Orphanage Extended Safe to Use in 2026?
Generally Safe
Score 98/100WP-Orphanage Extended has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The 'wp-orphanage-extended' v1.3 plugin presents a mixed security posture. On the positive side, static analysis reveals a minimal attack surface with no detectable AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. The code also shows a good practice of implementing nonce checks and capability checks, and there are no observed dangerous functions or file operations, which are encouraging signs. However, a significant concern arises from the presence of a single SQL query that does not utilize prepared statements. While taint analysis shows no issues, this raw SQL query represents a potential injection vector if user input is not meticulously handled before being passed to the database.
The plugin's vulnerability history is also a point of concern. It has one known high-severity CVE, which is thankfully no longer unpatched. The historical pattern of a high-severity vulnerability, even if resolved, suggests that past development may have overlooked critical security aspects, particularly regarding potential Cross-Site Request Forgery (CSRF) vulnerabilities. Although the current version appears to have addressed past critical issues and has a clean taint analysis, the presence of raw SQL and the historical high-severity CVE warrant careful consideration. The plugin demonstrates strengths in limiting its attack surface and implementing basic security checks, but the SQL query issue and historical precedent indicate a need for continued vigilance.
Key Concerns
- SQL query not using prepared statements
- Historical high-severity CVE
WP-Orphanage Extended Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
WP-Orphanage Extended <= 1.2 - Cross-Site Request Forgery to Orphan Account Privilege Escalation
WP-Orphanage Extended Release Timeline
WP-Orphanage Extended Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP-Orphanage Extended Attack Surface
WordPress Hooks 4
Maintenance & Trust
WP-Orphanage Extended Maintenance & Trust
Maintenance Signals
Community Trust
WP-Orphanage Extended Alternatives
User Switching
user-switching
Instant switching between user accounts in WordPress and WooCommerce.
One User Avatar | User Profile Picture
one-user-avatar
Use any image from your WordPress Media Library as a custom user avatar or user profile picture. Add your own Default Avatar.
Simple Local Avatars
simple-local-avatars
Adds an avatar upload field to user profiles. Generates requested sizes on demand just like Gravatar!
Export and Import Users and Customers
users-customers-import-export-for-wp-woocommerce
Import and export WordPress users and WooCommerce customers using CSV. Migrate to your new site without any data loss.
User Profile Picture
metronet-profile-picture
Set a custom profile image (avatar) for a user using the standard WordPress media upload tool.
WP-Orphanage Extended Developer Profile
16 plugins · 710 total installs
How We Detect WP-Orphanage Extended
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-orphanage-extended/wp-orphanage-extended-options.php