WP-UserAgent Security & Risk Analysis

wordpress.org/plugins/wp-useragent

WP-UserAgent is a simple plugin that allows you to display details about a computer's operating system or web browser that your visitors comment …

200 active installs v1.1.8 PHP + WP 2.0+ Updated Oct 16, 2020
browseruser-agentuseragentweb
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-UserAgent Safe to Use in 2026?

Generally Safe

Score 85/100

WP-UserAgent has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The wp-useragent v1.1.8 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the lack of identified dangerous functions, file operations, and external HTTP requests suggests a focused and contained functionality. The use of prepared statements for SQL queries is a critical security best practice that is fully adhered to. However, the moderate rate of properly escaped output (63%) presents a potential, albeit minor, risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is not consistently sanitized before being displayed.

The vulnerability history is remarkably clean, with zero recorded CVEs of any severity. This indicates a history of either robust development or a lack of targeted attacks. The absence of critical or high severity vulnerabilities in the past is a positive sign. The lack of any identified taint flows also reinforces the impression of secure coding practices. The plugin's strengths lie in its minimal attack surface and secure data handling for SQL. The primary weakness, though not severe, is the inconsistent output escaping.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

WP-UserAgent Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-UserAgent Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

63% escaped16 total outputs
Attack Surface

WP-UserAgent Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filtercomment_textwp-useragent.php:175
filtercomment_textwp-useragent.php:181
actionadmin_menuwp-useragent.php:354
filtercomment_textwp-useragent.php:379
filtercomment_textwp-useragent.php:384
actionplugins_loadedwp-useragent.php:413
Maintenance & Trust

WP-UserAgent Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedOct 16, 2020
PHP min version
Downloads40K

Community Trust

Rating100/100
Number of ratings5
Active installs200
Developer Profile

WP-UserAgent Developer Profile

kyleabaker

2 plugins · 240 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-UserAgent

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-useragent/wp-useragent-detect-device.php/wp-content/plugins/wp-useragent/wp-useragent-detect-os.php/wp-content/plugins/wp-useragent/wp-useragent-detect-platform.php/wp-content/plugins/wp-useragent/wp-useragent-detect-trackback.php/wp-content/plugins/wp-useragent/wp-useragent-detect-webbrowser.php/wp-content/plugins/wp-useragent/wp-useragent-detect-webbrowser-version.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP-UserAgent