
User Sync Security & Risk Analysis
wordpress.org/plugins/user-syncUser sync for WordPress plugin enables automated user sync from WP to Salesforce, Zoom, Tableau, and remote user sync from multiple WordPress sites
Is User Sync Safe to Use in 2026?
Generally Safe
Score 99/100User Sync has a strong security track record. Known vulnerabilities have been patched promptly.
The "user-sync" plugin v1.0.3 exhibits a generally strong security posture with robust practices in place. The static analysis indicates a very small attack surface, with only one AJAX handler and no REST API routes, shortcodes, or cron events. Notably, the single AJAX handler appears to be protected, which is a significant positive. The code demonstrates good use of prepared statements for SQL queries (93%) and proper output escaping (95%), minimizing risks associated with data injection and cross-site scripting. Furthermore, the absence of file operations and the limited number of external HTTP requests are also reassuring.
However, several concerning signals emerge from the taint analysis. Seven out of ten analyzed flows have unsanitized paths, with all of them identified as high severity. This suggests a significant risk of insecure handling of user-supplied input, potentially leading to vulnerabilities if not adequately addressed by permission checks or sanitization at the point of use. The lack of capability checks, despite the presence of nonce checks, is another area of concern, as it might allow unauthorized users to trigger certain functionalities.
The vulnerability history shows one medium-severity CVE in the past. While currently unpatched, this indicates a recurring pattern of past security issues, even if minor. The plugin's history of a CSRF vulnerability suggests a need for continued vigilance in implementing proper authorization and validation mechanisms. In conclusion, while "user-sync" v1.0.3 has commendable strengths in areas like SQL and output sanitization, the high severity taint flows with unsanitized paths and the absence of capability checks represent critical areas requiring immediate attention to mitigate potential security risks.
Key Concerns
- High severity taint flows with unsanitized paths
- Taint analysis: 7 unsanitized paths found
- No capability checks
- Medium severity CVE in vulnerability history
User Sync Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
User Sync – Remote User Sync <= 1.0.2 - Cross-Site Request Forgery to Plugin Deactivation
User Sync Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
User Sync Attack Surface
AJAX Handlers 1
WordPress Hooks 11
Maintenance & Trust
User Sync Maintenance & Trust
Maintenance Signals
Community Trust
User Sync Alternatives
SCIM User Sync/Provisioning
scim-user-provisioning
SCIM User Sync & User Provisioning. Create, delete, update users & automated user sync from Azure AD, Okta, Google Apps & many IDPs into WordPress.
Sync Post With Other Site
sync-post-with-other-site
Allows user to sync Posts, Pages and Custom Post Type with multiple websites.
Air WP Sync – Airtable to WordPress
air-wp-sync
Swiftly sync Airtable to your WordPress website!
Stock Sync for WooCommerce
stock-sync-for-woocommerce
Sync stock quantities between two WooCommerce stores.
WP Sync for Notion – Notion to WordPress
wp-sync-for-notion
Connect Notion and send data to WordPress with the WP Sync for Notion plugin!
User Sync Developer Profile
38 plugins · 83K total installs
How We Detect User Sync
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/user-sync/Views/include/css/mo-user-sync-settings.css/wp-content/plugins/user-sync/Views/include/js/mo-user-sync-settings.js/wp-content/plugins/user-sync/Views/include/js/mo-user-sync-settings.jsuser-sync/Views/include/css/mo-user-sync-settings.css?ver=user-sync/Views/include/js/mo-user-sync-settings.js?ver=HTML / DOM Fingerprints
data-nonceajax_object_user_syncajax_var