
WP-UserOnline Security & Risk Analysis
wordpress.org/plugins/wp-useronlineEnable you to display how many users are online on your Wordpress blog with detailed statistics.
Is WP-UserOnline Safe to Use in 2026?
Generally Safe
Score 89/100WP-UserOnline has a strong security track record. Known vulnerabilities have been patched promptly.
The wp-useronline plugin v2.88.9 presents a moderate security risk due to a combination of static analysis findings and its historical vulnerability pattern. While it shows some positive signs like zero critical unpatched CVEs and a relatively low percentage of SQL queries without prepared statements, several areas raise significant concerns. The presence of two unprotected AJAX handlers creates a substantial attack surface that could be exploited by unauthenticated users. Furthermore, the taint analysis reveals six high-severity flows with unsanitized paths, indicating a strong potential for serious vulnerabilities if these flows are not properly handled. The plugin's history of four CVEs, including two high and two medium severity vulnerabilities, with the most recent in late 2023, suggests a recurring pattern of security weaknesses that have required patching.
Despite the absence of dangerous functions and file operations, the high number of unsanitized paths in the taint analysis coupled with unprotected entry points points towards a need for more robust input validation and output escaping. The fact that 68% of outputs are not properly escaped, combined with high-severity taint flows, creates a significant risk of cross-site scripting (XSS) or other injection attacks. While the plugin has a history of addressing vulnerabilities, the ongoing discovery of high-severity issues indicates that the development practices may not consistently prioritize security. Overall, the plugin's security posture is concerning due to the combination of exploitable entry points, critical taint flows, and a history of security flaws, requiring careful attention and potential mitigation.
Key Concerns
- Unprotected AJAX handlers
- High severity taint flows
- Poor output escaping
- Vulnerability history (High severity)
- Vulnerability history (Medium severity)
WP-UserOnline Security Vulnerabilities
CVEs by Year
Severity Breakdown
4 total CVEs
WP-UserOnline <= 2.88.2 - Unauthenticated Stored Cross-Site Scripting
WP-UserOnline <= 2.88.0 - Authenticated (Admin+) Stored Cross-Site Scripting
WP-UserOnline <= 2.87.6 - Authenticated (Admin+) Stored Cross-Site Scripting
WP-UserOnline < 2.70 - Cross-Site Scripting
WP-UserOnline Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP-UserOnline Attack Surface
AJAX Handlers 2
Shortcodes 1
WordPress Hooks 22
Maintenance & Trust
WP-UserOnline Maintenance & Trust
Maintenance Signals
Community Trust
WP-UserOnline Alternatives
CBX User Online & Last Login
cbxuseronline
Shows online users based on cookie for guest and session for registered user. It also records the last login of user.
Widget Areas for LearnDash
widget-areas-learndash
Add unlimited blocks/widgets to several areas of LearnDash Focus Mode, plus course & group pages.
Fake Who’s Online for WordPress
fake-whos-online-widget
Fake whos online is a plugin that allows you to make your site seem more popular by displaying a fake amount of users online on your Wordpress site.
Casengo Live Chat Support
the-casengo-chat-widget
Live Chat by Casengo, fully functional, easy to use and has great design! Install live chat support on your WordPress site today!
DemandHub
demandhub
Add and customize DemandHub's website widgets on your WordPress website
WP-UserOnline Developer Profile
20 plugins · 889K total installs
How We Detect WP-UserOnline
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-useronline/scb/JS/scb.js/wp-content/plugins/wp-useronline/useronline.js/wp-content/plugins/wp-useronline/scb/JS/scb.js/wp-content/plugins/wp-useronline/useronline.jswp-useronline/useronline.js?ver=HTML / DOM Fingerprints
useronlineL10n[page_useronline]