User Profile Fields Security & Risk Analysis

wordpress.org/plugins/user-profile-fields

Allows site owners to remove fields from the "User Profile" admin screen

10 active installs v0.1 PHP + WP 3.7.0+ Updated Feb 5, 2014
adminremove-fieldsuser-profile
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is User Profile Fields Safe to Use in 2026?

Generally Safe

Score 85/100

User Profile Fields has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "user-profile-fields" plugin version 0.1 exhibits a concerning security posture despite a seemingly clean vulnerability history. While the plugin boasts zero known CVEs and a limited attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events, the static analysis reveals significant weaknesses. The presence of the `unserialize` function without any apparent sanitization or validation is a major red flag. Furthermore, 100% of its SQL queries are prepared, which is a positive, but the fact that none of its outputs are properly escaped presents a high risk of cross-site scripting (XSS) vulnerabilities.

The taint analysis shows flows with unsanitized paths, which, combined with the unescaped output and the dangerous `unserialize` function, strongly suggests potential for remote code execution or data manipulation if user-controlled input can reach these points. The lack of nonce and capability checks across all entry points (even though there are zero listed) means that if any were to be introduced or if the analysis missed something, they would be entirely unprotected. The vulnerability history being empty could indicate either a lack of past security scrutiny or that the plugin has simply not been targeted or found to be vulnerable yet.

In conclusion, while the plugin has a low immediate external attack surface and good SQL practices, the internal code signals and taint analysis point to critical potential vulnerabilities, particularly around the use of `unserialize` and unescaped output. The absence of a security history offers no assurance and should not be relied upon. This plugin requires immediate attention to address the identified risks before it can be considered secure.

Key Concerns

  • Dangerous function: unserialize
  • Unescaped output detected
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

User Profile Fields Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

User Profile Fields Release Timeline

v0.1Current
Code Analysis
Analyzed Mar 17, 2026

User Profile Fields Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$this->options = array_merge(unserialize(USERPROFILEFIELDS_DEFAULT_OPTIONS), get_option(USERPROFILEFuser-profile-fields.php:47
unserialize$_POST = array_merge(unserialize(USERPROFILEFIELDS_DEFAULT_OPTIONS), $_POST);user-profile-fields.php:102

Output Escaping

0% escaped3 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
optionsPage (user-profile-fields.php:98)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

User Profile Fields Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuuser-profile-fields.php:173
actionadmin_headuser-profile-fields.php:174
actionadmin_footeruser-profile-fields.php:175
filteruser_contactmethodsuser-profile-fields.php:177
Maintenance & Trust

User Profile Fields Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 5, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

User Profile Fields Developer Profile

John Luetke

3 plugins · 120 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Profile Fields

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
htauth-sync-options
HTML Comments
<!-- New Fields -->
FAQ

Frequently Asked Questions about User Profile Fields