Export User Data Security & Risk Analysis

wordpress.org/plugins/export-user-data

Export users data and metadata to a csv or Excel file

7K active installs v2.2.6 PHP 7.0+ WP 4.8+ Updated Dec 28, 2021
excelexportusermetausers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Export User Data Safe to Use in 2026?

Generally Safe

Score 85/100

Export User Data has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The 'export-user-data' plugin v2.2.6 exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface with no identified entry points that are unprotected. Furthermore, there is no recorded vulnerability history, suggesting a history of secure development or effective patching. The absence of file operations and external HTTP requests also reduces potential risks.

However, there are notable concerns. The presence of the `unserialize` function is a significant red flag. Without proper sanitization or context, `unserialize` can lead to Remote Code Execution (RCE) vulnerabilities if the serialized data originates from an untrusted source. The lack of nonce checks and capability checks on any potential entry points, though the analysis shows zero entry points, suggests a potential oversight in how data would be secured if the attack surface were to expand. Additionally, while SQL queries are predominantly prepared, a portion are not, which could be a risk if those queries involve user-supplied input.

In conclusion, while the plugin currently presents a low immediate risk due to its limited attack surface and clean vulnerability history, the presence of `unserialize` without explicit safeguards represents a critical potential weakness. Developers should prioritize addressing this function to ensure robust security.

Key Concerns

  • Dangerous function `unserialize` found
  • SQL queries without prepared statements found
  • Output not always properly escaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Export User Data Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Export User Data Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
3 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$unserialized = @unserialize( $value );library\core\helper.php:171

SQL Query Safety

60% prepared5 total queries

Output Escaping

67% escaped6 total outputs
Attack Surface

Export User Data Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Export User Data Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedDec 28, 2021
PHP min version7.0
Downloads240K

Community Trust

Rating92/100
Number of ratings45
Active installs7K
Developer Profile

Export User Data Developer Profile

qstudio

4 plugins · 7K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Export User Data

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/export-user-data/css/admin.css/wp-content/plugins/export-user-data/js/admin.js/wp-content/plugins/export-user-data/js/script.js
Script Paths
/wp-content/plugins/export-user-data/js/admin.js/wp-content/plugins/export-user-data/js/script.js
Version Parameters
export-user-data/css/admin.css?ver=export-user-data/js/admin.js?ver=export-user-data/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
q-eud-admin-page
HTML Comments
<!-- start: q/eud/admin/display_key --><!-- end: q/eud/admin/display_key --><!-- Q Studio Export User Data Plugin --><!-- Q Studio -->+1 more
Data Attributes
data-q-eud-nonce
JS Globals
q_eud_admin_options
FAQ

Frequently Asked Questions about Export User Data