User Sync Security & Risk Analysis

wordpress.org/plugins/user-sync

User sync for WordPress plugin enables automated user sync from WP to Salesforce, Zoom, Tableau, and remote user sync from multiple WordPress sites

200 active installs v1.0.3 PHP 5.4+ WP 3.7+ Updated Sep 12, 2025
keycloakscimsynchronizationtableauuser-sync
99
A · Safe
CVEs total1
Unpatched0
Last CVESep 16, 2025
Safety Verdict

Is User Sync Safe to Use in 2026?

Generally Safe

Score 99/100

User Sync has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Sep 16, 2025Updated 6mo ago
Risk Assessment

The "user-sync" plugin v1.0.3 exhibits a generally strong security posture with robust practices in place. The static analysis indicates a very small attack surface, with only one AJAX handler and no REST API routes, shortcodes, or cron events. Notably, the single AJAX handler appears to be protected, which is a significant positive. The code demonstrates good use of prepared statements for SQL queries (93%) and proper output escaping (95%), minimizing risks associated with data injection and cross-site scripting. Furthermore, the absence of file operations and the limited number of external HTTP requests are also reassuring.

However, several concerning signals emerge from the taint analysis. Seven out of ten analyzed flows have unsanitized paths, with all of them identified as high severity. This suggests a significant risk of insecure handling of user-supplied input, potentially leading to vulnerabilities if not adequately addressed by permission checks or sanitization at the point of use. The lack of capability checks, despite the presence of nonce checks, is another area of concern, as it might allow unauthorized users to trigger certain functionalities.

The vulnerability history shows one medium-severity CVE in the past. While currently unpatched, this indicates a recurring pattern of past security issues, even if minor. The plugin's history of a CSRF vulnerability suggests a need for continued vigilance in implementing proper authorization and validation mechanisms. In conclusion, while "user-sync" v1.0.3 has commendable strengths in areas like SQL and output sanitization, the high severity taint flows with unsanitized paths and the absence of capability checks represent critical areas requiring immediate attention to mitigate potential security risks.

Key Concerns

  • High severity taint flows with unsanitized paths
  • Taint analysis: 7 unsanitized paths found
  • No capability checks
  • Medium severity CVE in vulnerability history
Vulnerabilities
1

User Sync Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-9891medium · 4.3Cross-Site Request Forgery (CSRF)

User Sync – Remote User Sync <= 1.0.2 - Cross-Site Request Forgery to Plugin Deactivation

Sep 16, 2025 Patched in 1.0.3 (1d)
Code Analysis
Analyzed Mar 16, 2026

User Sync Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
39 prepared
Unescaped Output
9
170 escaped
Nonce Checks
6
Capability Checks
0
File Operations
0
External Requests
8
Bundled Libraries
0

SQL Query Safety

93% prepared42 total queries

Output Escaping

95% escaped179 total outputs
Data Flows
7 unsanitized

Data Flow Analysis

10 flows7 with unsanitized paths
<mo_user_sync_remote_table> (mo_user_sync_remote_table.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

User Sync Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_mo_server_typemo-user-sync-main.php:32
WordPress Hooks 11
filterhandle_bulk_actions-usersHandlers\mo-user-sync-bulk-action-handler.php:5
actionadmin_noticesHandlers\mo-user-sync-bulk-action-handler.php:6
actionuser_registerHandlers\mo-user-sync-bulk-action-handler.php:42
actionadmin_menumo-user-sync-main.php:27
actionadmin_initmo-user-sync-main.php:28
actioninitmo-user-sync-main.php:29
filterset-screen-optionmo-user-sync-main.php:30
actionadmin_footermo-user-sync-main.php:31
actionadmin_enqueue_scriptsmo-user-sync-main.php:60
actionadmin_enqueue_scriptsmo-user-sync-main.php:61
filterbulk_actions-usersViews\mo-user-sync-bulk-action-user.php:3
Maintenance & Trust

User Sync Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 12, 2025
PHP min version5.4
Downloads10K

Community Trust

Rating60/100
Number of ratings2
Active installs200
Developer Profile

User Sync Developer Profile

miniOrange

38 plugins · 83K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
324 days
View full developer profile
Detection Fingerprints

How We Detect User Sync

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-sync/Views/include/css/mo-user-sync-settings.css/wp-content/plugins/user-sync/Views/include/js/mo-user-sync-settings.js
Script Paths
/wp-content/plugins/user-sync/Views/include/js/mo-user-sync-settings.js
Version Parameters
user-sync/Views/include/css/mo-user-sync-settings.css?ver=user-sync/Views/include/js/mo-user-sync-settings.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-nonce
JS Globals
ajax_object_user_syncajax_var
FAQ

Frequently Asked Questions about User Sync