
Extended User Search In WP-Admin Security & Risk Analysis
wordpress.org/plugins/extended-user-search-in-wp-adminBy default WordPress in WP-admin allows users to search only by username or email id.
Is Extended User Search In WP-Admin Safe to Use in 2026?
Generally Safe
Score 85/100Extended User Search In WP-Admin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'extended-user-search-in-wp-admin' v3 exhibits a mixed security posture. On the positive side, there's a complete absence of known CVEs, indicating a potentially stable and well-maintained codebase in the past. Furthermore, the static analysis shows excellent output escaping practices and a lack of direct file operations or external HTTP requests, contributing to a reduced attack surface in those areas. However, significant concerns arise from the SQL query handling and taint analysis. All SQL queries are executed without prepared statements, presenting a high risk of SQL injection vulnerabilities. The taint analysis revealing two flows with unsanitized paths, classified as high severity, directly supports this concern and suggests that user-supplied data is not being adequately validated before being used in sensitive operations.
The lack of any recorded vulnerabilities in its history might be misleading. While positive, it does not negate the identified risks in the current codebase. The current version shows a critical flaw in its data handling. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with authorization checks, while seemingly reducing the attack surface, also means that when an actual entry point is exploited (which the SQL and taint analysis suggests is possible), the impact could be severe due to the lack of built-in defenses for these potential vulnerabilities. The plugin's strengths in output escaping are overshadowed by its weaknesses in data input validation and SQL security.
Key Concerns
- Raw SQL queries without prepared statements
- High severity taint flows with unsanitized paths
- No capability checks for entry points
- No nonce checks for entry points
Extended User Search In WP-Admin Security Vulnerabilities
Extended User Search In WP-Admin Code Analysis
SQL Query Safety
Data Flow Analysis
Extended User Search In WP-Admin Attack Surface
WordPress Hooks 1
Maintenance & Trust
Extended User Search In WP-Admin Maintenance & Trust
Maintenance Signals
Community Trust
Extended User Search In WP-Admin Alternatives
Enhanced User Search
enhanced-user-search
Effortlessly find users in WordPress! Search by first & last name, username, or email.
User First Name / Full Name Search In WP-admin
full-name-search-in-wp-admin
User First Name / Full Name Search In WP-admin plugin which empowers users search with no hassles.
Extended User Search In WP-Admin Developer Profile
5 plugins · 3K total installs
How We Detect Extended User Search In WP-Admin
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/extended-user-search-in-wp-admin/extended-user-search-in-wp-admin.php