WP User Defaults Security & Risk Analysis

wordpress.org/plugins/wp-user-defaults

Set some default options for new user accounts.

10 active installs v1.1 PHP + WP 2.7+ Updated Dec 21, 2009
defaultdefaultsuserusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP User Defaults Safe to Use in 2026?

Generally Safe

Score 85/100

WP User Defaults has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

Based on the provided static analysis, "wp-user-defaults" v1.1 exhibits a strong security posture. The absence of any identified dangerous functions, unescaped output, file operations, external HTTP requests, or raw SQL queries is highly commendable. The plugin also demonstrates good practices by not exposing a significant attack surface through AJAX handlers, REST API routes, or shortcodes. Furthermore, the lack of any known vulnerabilities in its history suggests a history of secure development and maintenance.

Vulnerabilities
None known

WP User Defaults Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP User Defaults Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

WP User Defaults Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP User Defaults Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuwp-user-defaults.php:139
actionuser_registerwp-user-defaults.php:140
Maintenance & Trust

WP User Defaults Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedDec 21, 2009
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP User Defaults Developer Profile

sant0sk1

3 plugins · 250 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP User Defaults

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapform-table
Data Attributes
name="user_defaults_rich_editing"name="user_defaults_comments_shortcuts"name="user_defaults_admin_color"name="user_defaults_display_name"
FAQ

Frequently Asked Questions about WP User Defaults