Bulk Remove Users Security & Risk Analysis

wordpress.org/plugins/bulk-remove-users

Add the users' email separated by comma to remove all the users in one shot.

20 active installs v1.0 PHP + WP 4.6+ Updated Jun 5, 2020
bulkmanagementusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bulk Remove Users Safe to Use in 2026?

Generally Safe

Score 85/100

Bulk Remove Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "bulk-remove-users" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface, and importantly, there are no unprotected entry points. Furthermore, the code signals are positive, with no dangerous functions identified, all SQL queries using prepared statements, no file operations, and no external HTTP requests. This suggests the developers have followed good security practices in these areas.

However, a significant concern arises from the complete lack of output escaping. With one total output identified and 0% properly escaped, this presents a notable risk. Any data displayed by the plugin without proper sanitization could be vulnerable to cross-site scripting (XSS) attacks. The lack of nonce and capability checks, while potentially less critical due to the limited attack surface, also represents a missed opportunity to enforce security rigorously. The vulnerability history being entirely clear is a positive sign, indicating a likely responsible development history for this version.

In conclusion, while the plugin demonstrates strengths in limiting its attack surface and using secure database practices, the unescaped output is a critical weakness that requires immediate attention. The absence of comprehensive authentication and authorization checks, though mitigated by the limited entry points, also leaves room for improvement. Addressing the output escaping vulnerability is paramount to improving the plugin's overall security.

Key Concerns

  • Unescaped output found
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Bulk Remove Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Bulk Remove Users Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Bulk Remove Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Bulk Remove Users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menubulk_remove_users.php:14
Maintenance & Trust

Bulk Remove Users Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJun 5, 2020
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Bulk Remove Users Developer Profile

marcodedo

4 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bulk Remove Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="juru_users"name="juru_submit"
FAQ

Frequently Asked Questions about Bulk Remove Users