EZ Staff List Security & Risk Analysis

wordpress.org/plugins/ez-staff-list

This plugin gives you the ability to easily list your staff members

20 active installs v0.7 PHP + WP 2.3+ Updated Nov 2, 2012
employeeemployee-liststaffstaff-list
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EZ Staff List Safe to Use in 2026?

Generally Safe

Score 85/100

EZ Staff List has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "ez-staff-list" plugin v0.7 exhibits a mixed security posture. While it demonstrates good practice by exclusively using prepared statements for all its SQL queries and has no recorded vulnerability history, significant concerns arise from its static analysis. The plugin has an unprotected AJAX handler, representing a critical entry point into the application that lacks authentication. Furthermore, a concerning lack of output escaping (0%) means that data displayed to users could potentially be vulnerable to Cross-Site Scripting (XSS) attacks. The presence of the "unserialize" function, coupled with unsanitized taint flows, presents a latent risk of remote code execution if user-controlled data is passed to it without proper validation. The bundled, outdated jQuery library also introduces potential vulnerabilities if it hasn't been patched in newer versions.

Key Concerns

  • Unprotected AJAX handler
  • 0% output escaping
  • Use of unserialize function
  • Unsanitized taint flows
  • Bundled outdated jQuery library
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

EZ Staff List Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

EZ Staff List Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
6 prepared
Unescaped Output
42
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserializeif (!empty($staff_members) && !is_array($staff_members)) { $staff_members = unserialize($staff_membeplugins\staff_management.class.php:443

Bundled Libraries

jQuery1.4.4

SQL Query Safety

100% prepared6 total queries

Output Escaping

0% escaped42 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
Main (plugins\staff_management.class.php:22)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

EZ Staff List Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_staff_mgtez-staff-list.php:76

Shortcodes 1

[staff_list] ez-staff-list.php:79
WordPress Hooks 2
actionadmin_menuez-staff-list.php:73
actionadmin_headez-staff-list.php:75
Maintenance & Trust

EZ Staff List Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 2, 2012
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

EZ Staff List Developer Profile

Luke

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EZ Staff List

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ez-staff-list/ez-staff-list.css/wp-content/plugins/ez-staff-list/js/jpicker-1.1.6/css/jPicker-1.1.6.css/wp-content/plugins/ez-staff-list/js/jpicker-1.1.6/jPicker.css/wp-content/plugins/ez-staff-list/js/jpicker-1.1.6/jpicker-1.1.6.js/wp-content/plugins/ez-staff-list/js/main.js
Script Paths
wp-content/plugins/ez-staff-list/js/jpicker-1.1.6/jpicker-1.1.6.jswp-content/plugins/ez-staff-list/js/main.js

HTML / DOM Fingerprints

Shortcode Output
[staff_list]
FAQ

Frequently Asked Questions about EZ Staff List