Delete Me Security & Risk Analysis

wordpress.org/plugins/delete-me

Allow users with specific WordPress roles to delete themselves from the Your Profile page or anywhere Shortcodes can be used.

8K active installs v3.2 PHP 5.2.4+ WP 3.7+ Updated Jun 2, 2024
deletegdprmultisiteunsubscribeuser-management
92
A · Safe
CVEs total1
Unpatched0
Last CVEOct 23, 2023
Download
Safety Verdict

Is Delete Me Safe to Use in 2026?

Generally Safe

Score 92/100

Delete Me has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Oct 23, 2023Updated 1yr ago
Risk Assessment

The "delete-me" v3.2 plugin presents a mixed security picture. On the positive side, its attack surface appears to be zero, with no reported AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication. This significantly limits immediate exploitation vectors. Furthermore, the static analysis reveals a good number of capability checks and nonce checks, indicating some level of effort to secure entry points. However, significant concerns arise from the handling of SQL queries. With six total queries and a 0% usage of prepared statements, the plugin is highly susceptible to SQL injection vulnerabilities. The relatively low percentage of properly escaped output (43%) also suggests a risk of cross-site scripting (XSS) flaws.

The vulnerability history shows a single medium-severity vulnerability of the Cross-site Scripting type, which was last observed in October 2023 and is currently patched. While this indicates a past issue, the absence of critical or high vulnerabilities in the history, coupled with the fact that the last known CVE is patched, is somewhat reassuring. However, the presence of SQL queries without prepared statements represents a substantial and active risk that could lead to serious data breaches or compromise, despite the seemingly clean attack surface and lack of currently unpatched historical vulnerabilities. The plugin's strengths lie in its limited attack surface and some authentication checks, but its widespread use of raw SQL queries without prepared statements is a critical weakness.

Key Concerns

  • Raw SQL queries without prepared statements
  • Low percentage of properly escaped output
  • Past medium severity XSS vulnerability
Vulnerabilities
1 published

Delete Me Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-5126medium · 4.9Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Delete Me <= 3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Oct 23, 2023 Patched in 3.1 (92d)
Version History

Delete Me Release Timeline

v3.2Current
v3.1
v3.01 CVE
v2.91 CVE
v2.81 CVE
v2.71 CVE
v2.61 CVE
v2.51 CVE
v2.41 CVE
v2.31 CVE
v2.21 CVE
v2.11 CVE
v2.01 CVE
v1.91 CVE
v1.81 CVE
v1.71 CVE
v1.61 CVE
v1.51 CVE
v1.41 CVE
v1.31 CVE
Code Analysis
Analyzed Mar 16, 2026

Delete Me Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
0 prepared
Unescaped Output
89
66 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared6 total queries

Output Escaping

43% escaped155 total outputs
Attack Surface

Delete Me Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionplugins_loadeddelete-me.php:86
actionwp_loadeddelete-me.php:87
actionwpmu_new_blogdelete-me.php:175
actionwpdelete-me.php:187
actionnetwork_admin_menudelete-me.php:231
actionadmin_menudelete-me.php:232
actionshow_user_profiledelete-me.php:233
filteradmin_titledelete-me.php:234
filterplugin_row_metadelete-me.php:235
actionall_admin_noticesinc\upgrade.php:25
Maintenance & Trust

Delete Me Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 2, 2024
PHP min version5.2.4
Downloads108K

Community Trust

Rating100/100
Number of ratings24
Active installs8K
Developer Profile

Delete Me Developer Profile

cmc3215

1 plugin · 8K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
92 days
View full developer profile
Detection Fingerprints

How We Detect Delete Me

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/delete-me/css/admin.css/wp-content/plugins/delete-me/css/style.css/wp-content/plugins/delete-me/js/admin.js/wp-content/plugins/delete-me/js/delete-me.js
Script Paths
/wp-content/plugins/delete-me/js/admin.js/wp-content/plugins/delete-me/js/delete-me.js
Version Parameters
delete-me/css/admin.css?ver=delete-me/css/style.css?ver=delete-me/js/admin.js?ver=delete-me/js/delete-me.js?ver=

HTML / DOM Fingerprints

CSS Classes
plugin-delete-me-wrap
HTML Comments
<!-- Plugin Name: Delete Me -->
Data Attributes
data-delete-me-trigger
JS Globals
plugin_delete_me_script
Shortcode Output
[plugin_delete_me /]
FAQ

Frequently Asked Questions about Delete Me