eShop CSV Export Security & Risk Analysis

wordpress.org/plugins/eshop-csv-export

Export your eShop products to CSV. Easily manage up to 10000+ eShop products.

10 active installs v1.2 PHP + WP 2.9.2+ Updated Jan 16, 2013
bulkcsveshopexportimport
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is eShop CSV Export Safe to Use in 2026?

Generally Safe

Score 85/100

eShop CSV Export has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "eshop-csv-export" v1.2 plugin exhibits a mixed security posture. On the positive side, the plugin has no known CVEs, a clean vulnerability history, and a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are properly prepared, and there are no external HTTP requests or bundled libraries to worry about. However, significant concerns arise from the static analysis. The presence of the `unserialize` function is a major red flag, as it can lead to remote code execution if user-controlled data is not rigorously validated before being passed to it. The complete lack of output escaping for all identified outputs is also highly problematic, potentially exposing the site to cross-site scripting (XSS) vulnerabilities. The absence of nonce and capability checks, while the attack surface is currently zero, means that if any entry points are introduced in the future without proper authorization checks, they would be inherently vulnerable.

Key Concerns

  • Dangerous function 'unserialize' used
  • No output escaping on any outputs
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

eShop CSV Export Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

eShop CSV Export Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
5 prepared
Unescaped Output
11
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$eshop1 = unserialize( $post1['meta_value'] );eShop.php:33
unserialize$prod = $this->array_flatten( unserialize( $p['meta_value'] ), false );eShop.php:62
unserialize$esprod = unserialize( $p->meta_value );eShop.php:74

SQL Query Safety

100% prepared5 total queries

Output Escaping

0% escaped11 total outputs
Attack Surface

eShop CSV Export Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menueshop_csv_exp_controller.php:129
actionadmin_headeshop_csv_exp_controller.php:130
actionadmin_print_styleseshop_csv_exp_controller.php:136
Maintenance & Trust

eShop CSV Export Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJan 16, 2013
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

eShop CSV Export Developer Profile

CPK Web Solutions

4 plugins · 240 total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
4120 days
View full developer profile
Detection Fingerprints

How We Detect eShop CSV Export

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/eshop-csv-export/css/styles.css
Version Parameters
/wp-content/plugins/eshop-csv-export/css/styles.css?ver=/wp-content/plugins/eshop-csv-export/download.php?csvfile=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about eShop CSV Export