Simple CRM BuddyPress Addon Security & Risk Analysis

wordpress.org/plugins/simple-crm-buddypress-xprofile

Imports BuddyPress XProfile data to Simple CRM...

10 active installs v0.1 PHP + WP 3.0+ Updated Apr 12, 2011
buddypresscrmfieldsprofileusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple CRM BuddyPress Addon Safe to Use in 2026?

Generally Safe

Score 85/100

Simple CRM BuddyPress Addon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "simple-crm-buddypress-xprofile" plugin v0.1 exhibits a generally positive security posture based on the static analysis. The complete absence of exposed AJAX handlers, REST API routes, shortcodes, and cron events with open attack vectors is a significant strength. Furthermore, the plugin utilizes prepared statements for its single SQL query and includes a nonce check, indicating an awareness of common web security practices. The lack of critical or high-severity taint flows is also reassuring.

However, there are areas for improvement. The fact that only 50% of the identified output operations are properly escaped is a concern, as this could lead to cross-site scripting (XSS) vulnerabilities if sensitive data is displayed to users without adequate sanitization. The plugin also performs file operations, which, while not explicitly flagged as problematic, can be a source of vulnerabilities if not handled with extreme care. The absence of capability checks is another potential weakness, as it implies that some operations might be accessible to users who shouldn't have them, although the limited attack surface mitigates this risk for now.

The plugin's vulnerability history, showing zero known CVEs, is excellent and suggests a history of secure development. This, combined with the current static analysis findings, indicates a low immediate risk. Nevertheless, the unescaped output presents a tangible, albeit potentially low-impact, risk that should be addressed to achieve a more robust security profile.

Key Concerns

  • 50% of output operations are not properly escaped
  • No capability checks for operations
Vulnerabilities
None known

Simple CRM BuddyPress Addon Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple CRM BuddyPress Addon Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
2
2 escaped
Nonce Checks
1
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

50% escaped4 total outputs
Attack Surface

Simple CRM BuddyPress Addon Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionscrm_options_screen_updatedincludes\crm_bp.class.php:13
actionscrm_options_screenincludes\crm_bp.class.php:14
actionbp_core_admin_screenincludes\crm_bp.class.php:17
actionbp_core_admin_screenincludes\crm_bp.class.php:18
actioninitsimple-crm-buddypress-users.php:22
Maintenance & Trust

Simple CRM BuddyPress Addon Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedApr 12, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Simple CRM BuddyPress Addon Developer Profile

S

8 plugins · 490 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple CRM BuddyPress Addon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-crm-buddypress-xprofile/includes/templates/bp_options.php

HTML / DOM Fingerprints

Data Attributes
name="scrm_bp_nonce"name="scrm_bp_import_filename"name="scrm_bp_export"name="scrm_bp_delete"
FAQ

Frequently Asked Questions about Simple CRM BuddyPress Addon