BP Display Name Security & Risk Analysis

wordpress.org/plugins/bp-display-name

This Plugin allows BuddyPress and Wordpress users to change the "Display name publicly as" field for ALL users, at any time.

20 active installs v1.0 PHP + WP 3.0+ Updated Unknown
bpbuddybuddybossbuddypressdisplayname
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BP Display Name Safe to Use in 2026?

Generally Safe

Score 100/100

BP Display Name has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The bp-display-name v1.0 plugin exhibits a generally good security posture due to the complete absence of known vulnerabilities and a lack of high-risk code signals such as dangerous functions or external HTTP requests. The plugin also shows a positive trend in database interaction, with all SQL queries utilizing prepared statements. However, there are significant concerns regarding output sanitization and taint analysis. The static analysis revealed that 100% of output is not properly escaped, which presents a substantial risk for cross-site scripting (XSS) vulnerabilities. Additionally, the taint analysis identified two flows with unsanitized paths, indicating potential pathways for malicious data to be processed without proper validation, even though these did not reach a critical or high severity in the analysis. The lack of any detected attack surface points like AJAX handlers, REST API routes, or shortcodes is a strength, but the identified output and taint issues warrant caution.

Key Concerns

  • Output is not properly escaped
  • Taint flows with unsanitized paths found
Vulnerabilities
None known

BP Display Name Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

BP Display Name Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
admin_screen (bp-display-name.php:77)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

BP Display Name Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionbp_initbp-display-name.php:14
actionbp_displayed_user_fullnamebp-display-name.php:19
actionbp_member_namebp-display-name.php:20
Maintenance & Trust

BP Display Name Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedUnknown
PHP min version
Downloads7K

Community Trust

Rating46/100
Number of ratings3
Active installs20
Developer Profile

BP Display Name Developer Profile

fmeroney

2 plugins · 30 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BP Display Name

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
bpdn-settings-form
Data Attributes
name="name-type"id="name-type"name="bpdn-settings-form"
FAQ

Frequently Asked Questions about BP Display Name