
Export Customers Data Security & Risk Analysis
wordpress.org/plugins/export-customers-dataEasily export WooCommerce customers' data to CSV or XLSX with advanced filters and smart field support.
Is Export Customers Data Safe to Use in 2026?
Generally Safe
Score 99/100Export Customers Data has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "export-customers-data" plugin v1.2.7 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries and generally performs well on output escaping, with 75% of outputs being properly handled. The plugin also includes a reasonable number of nonce and capability checks, suggesting an awareness of common WordPress security mechanisms. However, significant concerns arise from the attack surface analysis, specifically the presence of one unprotected AJAX handler. This creates a direct entry point for potential malicious activity without proper authentication or authorization checks.
The taint analysis reveals one flow with unsanitized paths, which, while not classified as critical or high, still represents a potential avenue for vulnerabilities if the data within that flow is ever used in a sensitive operation. The vulnerability history, though showing only one medium CVE in the past, is a crucial indicator. The fact that the last vulnerability was a Cross-site Scripting (XSS) issue, a common and often severe vulnerability type, suggests that input sanitization may be an area requiring closer scrutiny within the plugin's codebase, especially given the identified unsanitized path flow.
In conclusion, while the plugin utilizes secure SQL practices and generally handles output well, the unprotected AJAX endpoint and the history of an XSS vulnerability are notable weaknesses. The single unsanitized path flow, though minor in severity per the taint analysis, warrants attention in conjunction with the historical XSS pattern. Further investigation into the specific AJAX handler and the unsanitized path flow is recommended to fully mitigate potential risks.
Key Concerns
- Unprotected AJAX handler
- Flow with unsanitized paths
- Past medium severity CVE (XSS)
Export Customers Data Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Export Customers Data <= 1.2.3 - Reflected Cross-Site Scripting
Export Customers Data Release Timeline
Export Customers Data Code Analysis
Output Escaping
Data Flow Analysis
Export Customers Data Attack Surface
AJAX Handlers 2
WordPress Hooks 5
Maintenance & Trust
Export Customers Data Maintenance & Trust
Maintenance Signals
Community Trust
Export Customers Data Alternatives
PureDevs Customer History for WooCommerce
puredevs-customer-history-for-woocommerce
Track your WooCommerce customers' order history, spending, and behaviour from a clean admin dashboard.
Simple Customer CSV Exporter for WooCommerce
simple-customer-csv-exporter-for-woocommerce
List customers, filter by user's purchased products and users without orders with option to export data to CSV.
Google Analytics for WooCommerce
woocommerce-google-analytics-integration
Provides integration between Google Analytics and WooCommerce.
Klaviyo
klaviyo
Klaviyo for WooCommerce
WP All Export – Drag & Drop Export to Any Custom CSV, XML & Excel
wp-all-export
Easily export data from any post type, custom field, or taxonomy to a CSV, XML, or Excel file of any custom format. Supports WooCommerce products, ord …
Export Customers Data Developer Profile
44 plugins · 33K total installs
How We Detect Export Customers Data
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/export-customers-data/inc/wcde-admin-scripts.js/wp-content/plugins/export-customers-data/inc/wcde-front-scripts.js/wp-content/plugins/export-customers-data/inc/xlsxwriter.class.phpexport-customers-data/inc/wcde-admin-scripts.js?ver=export-customers-data/inc/wcde-front-scripts.js?ver=HTML / DOM Fingerprints
wcde_url