All Users Filter Security & Risk Analysis

wordpress.org/plugins/all-users-filter

Filter, sort, and export WordPress users to CSV using powerful UI-driven meta queries (roles, dates, numeric ranges, regex, and more).

0 active installs v1.4 PHP 7.4+ WP 6.9+ Updated Feb 21, 2026
customer-listexport-userexport-usersuser-exportusermeta
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is All Users Filter Safe to Use in 2026?

Generally Safe

Score 100/100

All Users Filter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "all-users-filter" plugin version 1.4 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and 100% properly escaped output are significant strengths. Furthermore, the plugin demonstrates good security practice by implementing nonce and capability checks on its entry points, resulting in zero unprotected attack surfaces. The vulnerability history is also clean, with no recorded CVEs, indicating a generally well-maintained codebase.

While the static analysis reveals no critical or high-severity issues like taint flows or unescaped outputs, and the plugin avoids file operations and external HTTP requests, a minor area for consideration could be the number of entry points relative to the checks. With one AJAX handler, having two nonce checks and two capability checks is positive, but it's worth noting that any future expansion of entry points would require diligent adherence to these security practices. The lack of any recorded past vulnerabilities further reinforces the current positive assessment, suggesting a proactive approach to security by the developers.

Vulnerabilities
None known

All Users Filter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

All Users Filter Release Timeline

v1.4Current
v1.3
v1.2
v1.1
v1.0
Code Analysis
Analyzed Mar 17, 2026

All Users Filter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
0
51 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

100% escaped51 total outputs
Attack Surface

All Users Filter Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_allusfi_wp_usr_export_csvinc\admin\admin_export_ajax_handler.php:7
WordPress Hooks 6
actionplugins_loadedall-users-filter.php:61
actionadmin_enqueue_scriptsinc\admin\class.allusfi_main.php:14
actionmanage_users_extra_tablenavinc\admin\class.allusfi_main.php:15
filterpre_get_usersinc\admin\class.allusfi_main.php:18
actionpre_user_queryinc\admin\class.allusfi_main.php:19
actionadmin_initinc\admin\class.allusfi_main.php:388
Maintenance & Trust

All Users Filter Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 21, 2026
PHP min version7.4
Downloads507

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

All Users Filter Developer Profile

Hardik Patel

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect All Users Filter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/all-users-filter/assets/js/admin.js/wp-content/plugins/all-users-filter/assets/css/admin.css
Script Paths
/wp-content/plugins/all-users-filter/assets/js/admin.js
Version Parameters
all-users-filter/assets/js/admin.js?ver=all-users-filter/assets/css/admin.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-plugin-prefix="allusfi"
JS Globals
allusfi_objALLUSFI_PREFIX
FAQ

Frequently Asked Questions about All Users Filter