
Delete Me Security & Risk Analysis
wordpress.org/plugins/delete-meAllow users with specific WordPress roles to delete themselves from the Your Profile page or anywhere Shortcodes can be used.
Is Delete Me Safe to Use in 2026?
Generally Safe
Score 92/100Delete Me has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "delete-me" v3.2 plugin presents a mixed security picture. On the positive side, its attack surface appears to be zero, with no reported AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication. This significantly limits immediate exploitation vectors. Furthermore, the static analysis reveals a good number of capability checks and nonce checks, indicating some level of effort to secure entry points. However, significant concerns arise from the handling of SQL queries. With six total queries and a 0% usage of prepared statements, the plugin is highly susceptible to SQL injection vulnerabilities. The relatively low percentage of properly escaped output (43%) also suggests a risk of cross-site scripting (XSS) flaws.
The vulnerability history shows a single medium-severity vulnerability of the Cross-site Scripting type, which was last observed in October 2023 and is currently patched. While this indicates a past issue, the absence of critical or high vulnerabilities in the history, coupled with the fact that the last known CVE is patched, is somewhat reassuring. However, the presence of SQL queries without prepared statements represents a substantial and active risk that could lead to serious data breaches or compromise, despite the seemingly clean attack surface and lack of currently unpatched historical vulnerabilities. The plugin's strengths lie in its limited attack surface and some authentication checks, but its widespread use of raw SQL queries without prepared statements is a critical weakness.
Key Concerns
- Raw SQL queries without prepared statements
- Low percentage of properly escaped output
- Past medium severity XSS vulnerability
Delete Me Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Delete Me <= 3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Delete Me Release Timeline
Delete Me Code Analysis
SQL Query Safety
Output Escaping
Delete Me Attack Surface
WordPress Hooks 10
Maintenance & Trust
Delete Me Maintenance & Trust
Maintenance Signals
Community Trust
Delete Me Alternatives
Bulk Delete Users by Email
bulk-delete-users-by-email
Allows bulk deletion of users by providing a list of emails. Deletes user data and meta, with batch processing for large lists.
WP Frontend Delete Account
wp-frontend-delete-account
Lets customers delete their account by their own.
Inactive User Deleter
inactive-user-deleter
If you wanna clean up a lot of fake or inactive user's registrations (usually made by spammers) by one operation - this tool will help you to do …
Bulk Delete Users by Keyword
bulk-delete-users-by-keyword
Efficiently manage your WordPress users with keyword-based bulk deletion capabilities.
Style Stripper
style-stripper
Removes all inline style tags from the content of posts/pages/custom post types.
Delete Me Developer Profile
1 plugin · 8K total installs
How We Detect Delete Me
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/delete-me/css/admin.css/wp-content/plugins/delete-me/css/style.css/wp-content/plugins/delete-me/js/admin.js/wp-content/plugins/delete-me/js/delete-me.js/wp-content/plugins/delete-me/js/admin.js/wp-content/plugins/delete-me/js/delete-me.jsdelete-me/css/admin.css?ver=delete-me/css/style.css?ver=delete-me/js/admin.js?ver=delete-me/js/delete-me.js?ver=HTML / DOM Fingerprints
plugin-delete-me-wrap<!-- Plugin Name: Delete Me -->data-delete-me-triggerplugin_delete_me_script[plugin_delete_me /]