
User Profile Fields Security & Risk Analysis
wordpress.org/plugins/user-profile-fieldsAllows site owners to remove fields from the "User Profile" admin screen
Is User Profile Fields Safe to Use in 2026?
Generally Safe
Score 85/100User Profile Fields has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "user-profile-fields" plugin version 0.1 exhibits a concerning security posture despite a seemingly clean vulnerability history. While the plugin boasts zero known CVEs and a limited attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events, the static analysis reveals significant weaknesses. The presence of the `unserialize` function without any apparent sanitization or validation is a major red flag. Furthermore, 100% of its SQL queries are prepared, which is a positive, but the fact that none of its outputs are properly escaped presents a high risk of cross-site scripting (XSS) vulnerabilities.
The taint analysis shows flows with unsanitized paths, which, combined with the unescaped output and the dangerous `unserialize` function, strongly suggests potential for remote code execution or data manipulation if user-controlled input can reach these points. The lack of nonce and capability checks across all entry points (even though there are zero listed) means that if any were to be introduced or if the analysis missed something, they would be entirely unprotected. The vulnerability history being empty could indicate either a lack of past security scrutiny or that the plugin has simply not been targeted or found to be vulnerable yet.
In conclusion, while the plugin has a low immediate external attack surface and good SQL practices, the internal code signals and taint analysis point to critical potential vulnerabilities, particularly around the use of `unserialize` and unescaped output. The absence of a security history offers no assurance and should not be relied upon. This plugin requires immediate attention to address the identified risks before it can be considered secure.
Key Concerns
- Dangerous function: unserialize
- Unescaped output detected
- Taint flows with unsanitized paths
- No nonce checks
- No capability checks
User Profile Fields Security Vulnerabilities
User Profile Fields Release Timeline
User Profile Fields Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
User Profile Fields Attack Surface
WordPress Hooks 4
Maintenance & Trust
User Profile Fields Maintenance & Trust
Maintenance Signals
Community Trust
User Profile Fields Alternatives
Tismy User Profile Upload
tismy-user-profile-upload
Upload your own user profile picture rather than falling back to the default or having your users create a Gravatar account.
Plugin Name: Buddypress profile view from admin
buddypress-profile-view-from-admin
This plugin allows admin user to view buddypress profile from admin amd will not work without buddypress.
Dashboard User profile Detais-(DUPD)
dashboard-user-profile-detais-dupd
A smart, easy way to add Dashboard User Profile Widget to your Wordpress Site.
Plugin
dashboard-user-profile-dup
A smart, easy way to add Dashboard User Profile Widget to your Wordpress Site.
Default Media Library View
default-media-view
Adds a media library default view selection to the user profile page.
User Profile Fields Developer Profile
3 plugins · 120 total installs
How We Detect User Profile Fields
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
htauth-sync-options<!-- New Fields -->