Import User Meta Data from CSV Security & Risk Analysis

wordpress.org/plugins/add-user-metadata

Bulk import user meta data from a text list ( csv ) - checking for missing users & existing usermeta data to avoid duplicates.

70 active installs v0.5.2 PHP + WP 4.0.0+ Updated Aug 28, 2020
importuserusermetausersuser_meta
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Import User Meta Data from CSV Safe to Use in 2026?

Generally Safe

Score 85/100

Import User Meta Data from CSV has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'add-user-metadata' plugin v0.5.2 exhibits a generally good security posture based on the static analysis. The absence of any reported CVEs and the use of prepared statements for all SQL queries are significant strengths. The presence of a nonce check and a capability check further indicate an effort towards secure coding practices.

However, the static analysis does reveal potential areas for improvement. A notable concern is the low percentage of properly escaped output (38%), which could lead to cross-site scripting (XSS) vulnerabilities if sensitive data is not properly sanitized before being displayed. While the attack surface appears small with no directly exposed entry points, the lack of comprehensive output escaping is a weakness that requires attention.

Overall, the plugin has a clean vulnerability history and demonstrates some fundamental security measures. The primary risk lies in the insufficient output escaping, which, despite the lack of current reported issues, represents a latent vulnerability. Addressing this would significantly improve the plugin's security.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

Import User Meta Data from CSV Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Import User Meta Data from CSV Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
6 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

38% escaped16 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
admin_page (add-user-metadata.php:163)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Import User Meta Data from CSV Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitadd-user-metadata.php:24
actionplugins_loadedadd-user-metadata.php:74
actionadmin_initadd-user-metadata.php:83
actionadmin_menuadd-user-metadata.php:86
actionadmin_footeradd-user-metadata.php:89
actionadmin_noticesadd-user-metadata.php:521
Maintenance & Trust

Import User Meta Data from CSV Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.0
Last updatedAug 28, 2020
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings3
Active installs70
Developer Profile

Import User Meta Data from CSV Developer Profile

qstudio

4 plugins · 7K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Import User Meta Data from CSV

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/add-user-metadata/admin-user-meta.css/wp-content/plugins/add-user-metadata/admin-user-meta.js
Version Parameters
add-user-metadata/admin-user-meta.css?ver=add-user-metadata/admin-user-meta.js?ver=

HTML / DOM Fingerprints

CSS Classes
debugcan_hide
Data Attributes
placeholder="metadata_title"
FAQ

Frequently Asked Questions about Import User Meta Data from CSV