CSV to HTML Security & Risk Analysis

wordpress.org/plugins/csv-to-html

Easily display, edit, and synchronize CSV files as dynamic HTML tables using a simple shortcode—no coding required.

300 active installs v3.65 PHP 8.0+ WP 3.0.1+ Updated Jun 23, 2025
csvhtmlimportsynchronizetable
96
A · Safe
CVEs total2
Unpatched0
Last CVEDec 11, 2024
Safety Verdict

Is CSV to HTML Safe to Use in 2026?

Generally Safe

Score 96/100

CSV to HTML has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Dec 11, 2024Updated 9mo ago
Risk Assessment

The "csv-to-html" plugin version 3.65 presents a mixed security posture. While it demonstrates good practices by utilizing prepared statements for SQL queries and generally implementing proper output escaping (95%), and importantly, has no currently unpatched CVEs, there are several areas of concern. The presence of a dangerous function (`unserialize`) is a significant red flag. Although the static analysis and taint flows did not reveal immediate exploitable vulnerabilities related to it, the potential for deserialization vulnerabilities is high if user-controlled input reaches this function without proper sanitization.

The plugin's vulnerability history, with two known CVEs including a past critical vulnerability, indicates a tendency for severe security flaws to have existed. The types of past vulnerabilities (XSS and unrestricted uploads) are common but can have devastating impacts. The fact that these are now patched is positive, but the historical presence of such critical issues warrants caution and vigilance.

Overall, while the immediate attack surface appears to have proper authentication checks and recent vulnerabilities are patched, the latent risk associated with `unserialize` and the plugin's history of critical vulnerabilities suggest that a higher level of scrutiny and proactive security measures are advisable. Continued monitoring for future vulnerabilities is essential.

Key Concerns

  • Presence of dangerous function: unserialize
  • Past critical vulnerability (now patched)
  • Past medium vulnerability (now patched)
  • Unescaped output (5% not properly escaped)
Vulnerabilities
2

CSV to HTML Security Vulnerabilities

CVEs by Year

2 CVEs in 2024
2024
Patched Has unpatched

Severity Breakdown

Critical
1
Medium
1

2 total CVEs

CVE-2024-54275medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CSV to html <= 3.08 - Reflected Cross-Site Scripting

Dec 11, 2024 Patched in 3.15 (41d)
CVE-2024-52406critical · 9.9Unrestricted Upload of File with Dangerous Type

CSV to html <= 3.26 - Authenticated (Subscriber+) Arbitrary File Upload

Nov 13, 2024 Patched in 3.27 (69d)
Code Analysis
Analyzed Mar 16, 2026

CSV to HTML Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
9
188 escaped
Nonce Checks
6
Capability Checks
1
File Operations
1
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$content_arr = unserialize( $exp_htmltime[1] );csvtohtml.php:3669

Output Escaping

95% escaped197 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
dynamic_form (csvtohtml.php:1109)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CSV to HTML Attack Surface

Entry Points7
Unprotected0

AJAX Handlers 6

authwp_ajax_fetchtablecsvtohtml.php:367
authwp_ajax_getdefaultscsvtohtml.php:368
authwp_ajax_refreshformcsvtohtml.php:369
authwp_ajax_savecsvfilecsvtohtml.php:370
noprivwp_ajax_fetchtablecsvtohtml.php:373
noprivwp_ajax_getdefaultscsvtohtml.php:374

Shortcodes 1

[csvtohtml_create] csvtohtml.php:413
WordPress Hooks 3
actioninitcsvtohtml.php:175
filterplugin_action_linkscsvtohtml.php:364
actionadmin_menucsvtohtml.php:414
Maintenance & Trust

CSV to HTML Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 23, 2025
PHP min version8.0
Downloads34K

Community Trust

Rating100/100
Number of ratings22
Active installs300
Developer Profile

CSV to HTML Developer Profile

wibergsweb

2 plugins · 320 total installs

82
trust score
Avg Security Score
91/100
Avg Patch Time
55 days
View full developer profile
Detection Fingerprints

How We Detect CSV to HTML

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/csv-to-html/css/editor.css/wp-content/plugins/csv-to-html/css/frontend.css/wp-content/plugins/csv-to-html/css/styles.css/wp-content/plugins/csv-to-html/js/editor.js/wp-content/plugins/csv-to-html/js/frontend.js
Script Paths
/wp-content/plugins/csv-to-html/js/editor.js/wp-content/plugins/csv-to-html/js/frontend.js
Version Parameters
/wp-content/plugins/csv-to-html/css/editor.css?ver=/wp-content/plugins/csv-to-html/css/frontend.css?ver=/wp-content/plugins/csv-to-html/css/styles.css?ver=/wp-content/plugins/csv-to-html/js/editor.js?ver=/wp-content/plugins/csv-to-html/js/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
csv-to-html-tablecsv-to-html-editor-container
Data Attributes
data-csvtohtml-iddata-csvtohtml-sourcedata-csvtohtml-display-typedata-csvtohtml-editor-enabled
JS Globals
csvtohtml_editor_settingscsvtohtml_frontend_settings
REST Endpoints
/wp-json/csv-to-html/v1/get-data/wp-json/csv-to-html/v1/save-data
Shortcode Output
[csv_table[csv_editor
FAQ

Frequently Asked Questions about CSV to HTML