Users to Csv Security & Risk Analysis

wordpress.org/plugins/users2csv

Select and export users details (default wordpress and user meta fields) in CSV format.

20 active installs v0.2 PHP + WP 3.5+ Updated May 28, 2013
convertcsvexportselect-fieldsusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Users to Csv Safe to Use in 2026?

Generally Safe

Score 85/100

Users to Csv has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "users2csv" v0.2 plugin exhibits a generally positive security posture, with no recorded vulnerabilities and a proactive approach to secure coding practices. The static analysis reveals a minimal attack surface, with zero AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without proper authentication or permission checks. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests significantly reduces its exploitability.

However, there are a few areas for improvement. While the plugin utilizes nonce and capability checks, only one of each is present, suggesting limited enforcement across the entire codebase. More concerning is the relatively low percentage of SQL queries (40%) that employ prepared statements, indicating a potential risk of SQL injection if the remaining queries handle user-supplied data without adequate sanitization. The output escaping is also a weakness, with only 25% of outputs properly escaped, leaving room for cross-site scripting (XSS) vulnerabilities. The taint analysis, while showing no critical or high severity flows, only analyzed two flows, which is a very small sample size. This, combined with the identified SQL and output escaping concerns, means that the absence of critical issues in the taint analysis might not be a definitive indicator of complete security.

In conclusion, "users2csv" v0.2 demonstrates good intentions by minimizing its attack surface and implementing some security checks. The lack of historical vulnerabilities is a strong indicator of past diligence. However, the insufficient prepared statement usage for SQL and the low rate of output escaping represent tangible security risks that should be addressed. The limited scope of the taint analysis also warrants caution. Overall, the plugin is reasonably secure but has room for improvement to achieve a more robust security profile.

Key Concerns

  • Low rate of prepared statements for SQL queries
  • Low rate of properly escaped output
  • Limited scope of taint analysis (2 flows)
Vulnerabilities
None known

Users to Csv Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Users to Csv Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Users to Csv Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
2 prepared
Unescaped Output
6
2 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

40% prepared5 total queries

Output Escaping

25% escaped8 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
users_page (users2csv.php:98)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Users to Csv Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuusers2csv.php:22
actioninitusers2csv.php:23
filteru2c_exclude_datausers2csv.php:24
actionpre_user_queryusers2csv.php:42
Maintenance & Trust

Users to Csv Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMay 28, 2013
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Users to Csv Developer Profile

welaika

3 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Users to Csv

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/users2csv/css/u2c-admin.css/wp-content/plugins/users2csv/js/u2c-admin.js
Script Paths
/wp-content/plugins/users2csv/js/u2c-admin.js
Version Parameters
users2csv/css/u2c-admin.css?ver=users2csv/js/u2c-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
u2c_users_roleu2c_users_start_monthu2c_users_end_month
Data Attributes
name="_wpnonce-export-users-page_export"name="role"id="u2c_users_role"name="start_month"id="u2c_users_start_month"name="end_month"+4 more
FAQ

Frequently Asked Questions about Users to Csv