CSV Download Security & Risk Analysis

wordpress.org/plugins/csv-download

A plugin for WP developers to easily add CSV download links to the admin section or front end.

10 active installs v1.0.0 PHP + WP + Updated Aug 2, 2016
comma-separated-values-listcsvcsv-downloadcsv-download-buttoncsv-download-link
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CSV Download Safe to Use in 2026?

Generally Safe

Score 85/100

CSV Download has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "csv-download" v1.0.0 plugin presents a mixed security picture. On the positive side, there are no recorded vulnerabilities (CVEs) and the plugin avoids risky practices like raw SQL queries and external HTTP requests. The static analysis shows a surprisingly small attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, all SQL queries use prepared statements. This indicates a conscious effort towards secure coding practices in certain areas.

However, significant concerns arise from the lack of output escaping, with 0% of the 5 identified outputs being properly escaped. This is a major security weakness that could lead to cross-site scripting (XSS) vulnerabilities if the data being output is user-controlled or originates from an untrusted source. Furthermore, the taint analysis reveals 2 flows with unsanitized paths, which, while not currently flagged as critical or high severity, warrants attention as it signifies potential for path traversal or file inclusion vulnerabilities. The absence of nonce and capability checks on any potential entry points, though currently none are identified, is a general concern for future extensibility.

Given the absence of historical vulnerabilities, the plugin's creator may have a good understanding of WordPress security. However, the current version suffers from critical flaws in output sanitization and potential path manipulation risks. The lack of explicit authentication checks on entry points, while currently moot due to zero entry points, remains a potential future risk. The plugin's strengths in avoiding SQL injection and external requests are overshadowed by its weaknesses in XSS prevention and path sanitization.

Key Concerns

  • Output escaping is not properly handled
  • Taint flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

CSV Download Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CSV Download Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
csv_button_display_callback (csvdownload.php:143)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CSV Download Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadd_meta_boxescsvdownload.php:118
Maintenance & Trust

CSV Download Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedAug 2, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

CSV Download Developer Profile

desie314

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CSV Download

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
csv_download_button
Data Attributes
data-csv_download_button
Shortcode Output
<a class="" href="&csv_export_button=1"></a>
FAQ

Frequently Asked Questions about CSV Download