
BuddyPress Usernames Only Security & Risk Analysis
wordpress.org/plugins/buddypress-usernames-onlyOverride display names across your BuddyPress site with usernames.
Is BuddyPress Usernames Only Safe to Use in 2026?
Generally Safe
Score 85/100BuddyPress Usernames Only has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "buddypress-usernames-only" plugin v0.6 exhibits a strong adherence to secure coding practices in several key areas. The analysis shows a complete absence of SQL injection vulnerabilities due to the exclusive use of prepared statements, and all identified output is properly escaped, mitigating cross-site scripting (XSS) risks. Furthermore, the plugin does not perform any file operations or make external HTTP requests, reducing its attack surface in those domains. The vulnerability history is clean, with no recorded CVEs, indicating a good track record for security.
However, the plugin does present some concerning signals. The presence of 5 instances of the `create_function` PHP function is a significant security risk. `create_function` is deprecated and can be a vector for code injection if user-supplied data is ever passed into it without rigorous sanitization. Additionally, the complete lack of nonce checks and capability checks across all entry points (even if there are none currently exposed) signifies a potential vulnerability if the plugin's functionality expands or if an attack vector is discovered later. The absence of taint analysis flows might be due to the plugin's simplicity or limitations in the analysis tool, but it does not inherently mean there are no such flows.
In conclusion, while the plugin demonstrates excellent practices in SQL and output handling, the use of `create_function` and the absence of crucial security checks like nonces and capability checks represent notable weaknesses. The clean vulnerability history is a positive indicator, but the code-level concerns require attention. Overall, the security posture is mixed, with foundational security well-addressed but potential for injection and authorization bypass if `create_function` is misused or if new entry points are added without proper checks.
Key Concerns
- Use of deprecated and dangerous create_function()
- No nonce checks on entry points
- No capability checks on entry points
BuddyPress Usernames Only Security Vulnerabilities
BuddyPress Usernames Only Code Analysis
Dangerous Functions Found
BuddyPress Usernames Only Attack Surface
WordPress Hooks 27
Maintenance & Trust
BuddyPress Usernames Only Maintenance & Trust
Maintenance Signals
Community Trust
BuddyPress Usernames Only Alternatives
Honorific Buddypress Usernames
honorific-buddypress-members-name
Allows to add honorific buddypress names on the website.
Visual Authors Page
visual-authors-page
This "Visual Authors page" plugin display authors list in any page by placing shortcode on it.
Username Changer
username-changer
Unlock the power to change WordPress usernames with complete security and data integrity.
Better Messages – Live Chat, Chat Rooms, Real-Time Messaging & Private Messages
bp-better-messages
Real-time messaging and chat rooms for WordPress ecosystem: private conversations, public and private chat rooms, video & audio calls, and more.
Easy Username Updater
username-updater
A plugin to change registered username and display name.
BuddyPress Usernames Only Developer Profile
8 plugins · 380 total installs
How We Detect BuddyPress Usernames Only
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
BP_SHOW_DISPLAYNAME_ON_PROFILE