
BuddyPress FollowMe Security & Risk Analysis
wordpress.org/plugins/buddypress-follow-meBuddypress Follow Me is fork of BuddyPress Follow plugin (http://wordpress.org/extend/plugins/buddypress-followers/). buddypress-followers is now upda …
Is BuddyPress FollowMe Safe to Use in 2026?
Generally Safe
Score 85/100BuddyPress FollowMe has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'buddypress-follow-me' v1.2.2 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for all SQL queries and avoids external HTTP requests and file operations. The absence of known vulnerabilities and CVEs in its history is also a strong indicator of past security diligence. However, several concerns warrant attention. The presence of the `create_function` function is a significant red flag, as it is considered deprecated and can be a source of security vulnerabilities if not handled with extreme care, potentially leading to code injection. Furthermore, a critically low percentage (6%) of properly escaped output suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the application. While the attack surface is small and all identified entry points have some form of protection, the lack of capability checks for any of the entry points is a missed opportunity to enforce proper authorization, leaving potential for privilege escalation or unauthorized actions if other protective measures are bypassed. The taint analysis showing zero flows analyzed is not inherently a weakness, but it also means that the deeper potential for chained vulnerabilities that might be exposed by taint analysis remains unexplored for this version.
In conclusion, while the plugin benefits from secure SQL handling and a clean vulnerability history, the critical issues of poorly escaped output and the use of `create_function` introduce significant risks. The absence of capability checks adds another layer of potential weakness. Addressing these specific areas should be a priority to improve the plugin's overall security.
Key Concerns
- High percentage of unescaped output
- Dangerous function create_function used
- No capability checks on entry points
BuddyPress FollowMe Security Vulnerabilities
BuddyPress FollowMe Release Timeline
BuddyPress FollowMe Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
BuddyPress FollowMe Attack Surface
AJAX Handlers 2
Shortcodes 1
WordPress Hooks 31
Maintenance & Trust
BuddyPress FollowMe Maintenance & Trust
Maintenance Signals
Community Trust
BuddyPress FollowMe Alternatives
BuddyPress Follow
buddypress-followers
Follow members on your BuddyPress site with this nifty plugin.
Google+ Follow Box
google-plus-badge-like-fb-like-box
Google+ Badge / Follow Box Widget like FB Like Box
bbP Follow Users
bbp-follow-users
This simple plugin allows users to follow other members on bbPress . The users can view the latest posts and replies from their followed users in a wi …
Follow Us Badges
wpsite-follow-us-badges
Follow Us Badges by 99 Robots showcases your Facebook, Twitter, LinkedIn. YouTube, Tumblr and other social media badges.
Social Media Widget
social-media-widgets
Easily create beautiful social media link with the install of this plugin.This widget takes a simple, extendable approach for displaying your social m …
BuddyPress FollowMe Developer Profile
4 plugins · 160 total installs
How We Detect BuddyPress FollowMe
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/buddypress-follow-me/js/general.jsjs/general.jsbuddypress-follow-me/js/general.js?ver=HTML / DOM Fingerprints
<!-- FollowMe 1.2.2 -->IMPORTANT: DO NOT configure your component so that it has to run in the /plugins/buddypress/ directory. If you
do this, whenever the user auto-upgrades BuddyPress - your custom component will be deleted automatically. Design
your component to run in the /wp-content/plugins/ directoryIMPORTANT: When table defintions change and you need to upgrade,
make sure that you increment this constant so that it runs the install function again.
Also, if you have errors when testing the component for the first time, make sure that you check to
see if the table(s) got created. If not, you'll most likely need to increment this constant as
BP_FOLLOW_DB_VERSION was written to the wp_usermeta table and the install function will not be
triggered again unless you increment the version to a number higher than stored in the meta data.