User Information to CSV Security & Risk Analysis

wordpress.org/plugins/export-users-csv-records

Export-users-csv-records Plugin allows you to export users list and their metadata in CSV file.

0 active installs v1.3.2 PHP 5.6.20+ WP 4.1+ Updated Feb 20, 2020
export-userexport-usersreportsuser-exportusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is User Information to CSV Safe to Use in 2026?

Generally Safe

Score 85/100

User Information to CSV has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'export-users-csv-records' v1.3.2 plugin exhibits a generally good security posture in several key areas. The static analysis reveals no identified AJAX handlers, REST API routes, shortcodes, or cron events, significantly limiting its attack surface. Furthermore, all SQL queries are correctly implemented using prepared statements, and there are no external HTTP requests or bundled libraries that might introduce vulnerabilities. The absence of any known CVEs in its history further reinforces this impression of a well-maintained and secure plugin.

However, there are notable areas of concern that temper this positive assessment. The plugin has a complete lack of nonce checks and capability checks. This means that any functionality exposed, even if not immediately apparent from the attack surface analysis, is not protected against unauthorized access or abuse. Critically, 100% of the identified output operations are not properly escaped. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or dynamically generated content could be injected and executed within the browser of other users, potentially leading to session hijacking, defacement, or malicious redirects.

While the plugin's limited attack surface and secure SQL practices are commendable, the absence of essential security controls like nonce and capability checks, coupled with the pervasive issue of unescaped output, introduces significant risks. The lack of past vulnerabilities might be due to the limited exposure of its features or a fortunate oversight, rather than inherent robustness. Therefore, while not demonstrably vulnerable in its current state based on the provided data, the plugin has critical weaknesses that require immediate attention to prevent potential exploitation.

Key Concerns

  • Unescaped output (100%)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

User Information to CSV Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

User Information to CSV Release Timeline

v1.3.2Current
Code Analysis
Analyzed Apr 16, 2026

User Information to CSV Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

User Information to CSV Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuexport-users-csv-records.php:19
Maintenance & Trust

User Information to CSV Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedFeb 20, 2020
PHP min version5.6.20
Downloads994

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

User Information to CSV Developer Profile

jignasa06

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Information to CSV

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
FAQ

Frequently Asked Questions about User Information to CSV