
wpNamedUsers Security & Risk Analysis
wordpress.org/plugins/wpnamedusersIntranet / Extranet plugin for Wordpress that allows users to specify which users and/or groups can access specific posts or pages.
Is wpNamedUsers Safe to Use in 2026?
Use With Caution
Score 63/100wpNamedUsers has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The wpnamedusers plugin v0.5 presents a mixed security posture. On the positive side, the plugin demonstrates strong adherence to WordPress security best practices with a significant number of capability checks and a single nonce check, contributing to a robust defense against common attacks. The absence of direct file operations and external HTTP requests further minimizes its attack surface in these areas. However, the static analysis reveals critical weaknesses. A concerning 100% of output is not properly escaped, posing a significant risk for Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis indicates a flow with an unsanitized path, identified as high severity, which could potentially lead to data manipulation or unauthorized access if exploited. The vulnerability history shows a past medium-severity Cross-Site Request Forgery (CSRF) vulnerability, and the presence of one unpatched CVE, though its severity isn't explicitly stated beyond being "medium," is a significant concern. This history, combined with the current unescaped output and high-severity taint flow, suggests a pattern of overlooking critical output sanitization and potentially incomplete vulnerability remediation. While the plugin has strengths in authentication and input validation for certain entry points (which are currently zero, but this could change), the unaddressed output escaping and the lingering unpatched vulnerability are substantial risks that require immediate attention.
Key Concerns
- Unpatched CVE exists
- High severity taint flow found
- 100% of output unescaped
wpNamedUsers Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
wpNamedUsers <= 0.5 - Cross-Site Request Forgery
wpNamedUsers Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
wpNamedUsers Attack Surface
WordPress Hooks 8
Maintenance & Trust
wpNamedUsers Maintenance & Trust
Maintenance Signals
Community Trust
wpNamedUsers Alternatives
Multiple Post Passwords
multiple-post-passwords
Set multiple passwords for your protected pages so you can give them to different users.
Password Passthrough
password-passthrough
This plugin allows passwords for password-protected pages/posts to be passed directly through the URL.
AuthPro
authpro
Adds AuthPro.com remotely hosted service support to your WordPress website.
Login Logout Shortcode Simple
login-logout-shortcode-simple
Protect your pages by just adding a shortcode. No need to know programming. [login-logout-shortcode-simple] only!
Advanced Post Password
advanced-post-password
Enhance the security of password-protected posts/pages with this plugin.
wpNamedUsers Developer Profile
1 plugin · 50 total installs
How We Detect wpNamedUsers
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wpnamedusers/css/wpNamedUsers.csswpNamedUsers/style.css?ver=wpNamedUsers.js?ver=