Extra User Details Security & Risk Analysis

wordpress.org/plugins/extra-user-details

Add extra fields to the user profile page, saved in WordPress' native way (in wp_usermeta).

1K active installs v0.5.3 PHP + WP 3.3+ Updated Oct 12, 2024
adminfieldslinksprofilesocial
91
A · Safe
CVEs total2
Unpatched0
Last CVEJun 19, 2023
Safety Verdict

Is Extra User Details Safe to Use in 2026?

Generally Safe

Score 91/100

Extra User Details has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Jun 19, 2023Updated 1yr ago
Risk Assessment

The 'extra-user-details' plugin version 0.5.3 presents a mixed security posture. On the positive side, the plugin exhibits good practices by utilizing prepared statements for all SQL queries, implementing nonce checks, and performing capability checks. There are no identified file operations or external HTTP requests, which reduces potential attack vectors. Furthermore, the absence of any unpatched CVEs is a significant strength, indicating that past vulnerabilities have been addressed by the developer.

However, the static analysis reveals notable concerns. The presence of three instances of the `unserialize` function is a critical risk. Unserialized data can be manipulated to execute arbitrary code or cause denial-of-service conditions if the input is not strictly controlled and validated. Additionally, while the overall output escaping rate is 64%, the 36% of improperly escaped outputs represent a tangible risk for Cross-Site Scripting (XSS) vulnerabilities. The vulnerability history, featuring two medium-severity CVEs for CSRF and XSS, reinforces these concerns, suggesting a pattern of input validation and output sanitization weaknesses.

In conclusion, while the plugin has made strides in areas like SQL sanitization and authentication checks, the continued presence of `unserialize` and historical XSS/CSRF vulnerabilities necessitates careful attention. The lack of a large attack surface is positive, but the identified code signals and historical patterns warrant a cautious approach.

Key Concerns

  • Dangerous function 'unserialize' found
  • Improper output escaping detected (36% unescaped)
  • Previous medium severity vulnerabilities (CSRF, XSS)
Vulnerabilities
2

Extra User Details Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-35877medium · 4.3Cross-Site Request Forgery (CSRF)

Extra User Details <= 0.5 - Cross-Site Request Forgery

Jun 19, 2023 Patched in 0.5.1 (218d)
CVE-2023-35878medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Extra User Details <= 0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting

Jun 19, 2023 Patched in 0.5.1 (218d)
Code Analysis
Analyzed Mar 16, 2026

Extra User Details Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
8
14 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$all_fields = unserialize($all_fields_serialized);extra_user_details.php:101
unserialize$all_fields = unserialize($all_fields);extra_user_details.php:214
unserialize$all_fields = unserialize($serialized_config);extra_user_details.php:438

Output Escaping

64% escaped22 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
eud_plugin_options (extra_user_details.php:135)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Extra User Details Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedextra_user_details.php:17
actionedit_user_profileextra_user_details.php:30
actionshow_user_profileextra_user_details.php:31
actionprofile_updateextra_user_details.php:32
actionadmin_menuextra_user_details.php:35
actioninitextra_user_details.php:36
Maintenance & Trust

Extra User Details Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 12, 2024
PHP min version
Downloads61K

Community Trust

Rating94/100
Number of ratings10
Active installs1K
Developer Profile

Extra User Details Developer Profile

Vadym

1 plugin · 1K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
218 days
View full developer profile
Detection Fingerprints

How We Detect Extra User Details

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/extra-user-details/css/extra-user-details.css/wp-content/plugins/extra-user-details/js/extra-user-details.js
Script Paths
/wp-content/plugins/extra-user-details/js/extra-user-details.js
Version Parameters
extra-user-details/css/extra-user-details.css?ver=extra-user-details/js/extra-user-details.js?ver=

HTML / DOM Fingerprints

CSS Classes
eud-fields-help
Data Attributes
id="eud-fields-help"name="eud_fields"id="eudclass="regular-text code"
FAQ

Frequently Asked Questions about Extra User Details