
Usersnap Security & Risk Analysis
wordpress.org/plugins/usersnapUsersnap: The feedback platform designed to capture, organize, and respond to user feedback seamlessly.
Is Usersnap Safe to Use in 2026?
Generally Safe
Score 92/100Usersnap has a strong security track record. Known vulnerabilities have been patched promptly.
The "usersnap" plugin v4.20 presents a mixed security posture. While the static analysis indicates a generally good practice with zero identified dangerous functions, SQL injection vulnerabilities, or file operations, and all SQL queries utilizing prepared statements, there are notable weaknesses. The low percentage of properly escaped output (10%) is a significant concern, suggesting a high potential for cross-site scripting (XSS) vulnerabilities. The absence of nonce checks on AJAX handlers and capability checks on REST API routes, coupled with zero identified entry points and unprotected handlers, might indicate a limited attack surface or that these checks are handled elsewhere, but it also means any future introduced entry points could be unprotected.
The vulnerability history reveals one past medium-severity vulnerability, specifically Cross-site Scripting, which was patched in early 2023. While there are no currently unpatched CVEs, the historical presence of XSS suggests that the development team may have had challenges in properly sanitizing output in the past. This, combined with the current static analysis findings of poor output escaping, points to a recurring area of risk that requires careful monitoring and more robust sanitization practices.
In conclusion, the plugin demonstrates strengths in its avoidance of common injection vulnerabilities and secure SQL handling. However, the significant concern regarding insufficient output escaping, supported by past XSS vulnerabilities, presents a tangible risk. The limited attack surface revealed in the static analysis is a positive sign, but the potential for XSS due to poor output handling remains the most critical weakness.
Key Concerns
- Low percentage of properly escaped output
- Past medium CVE (XSS)
- No nonce checks on AJAX handlers
- No permission callbacks on REST API routes
Usersnap Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Usersnap <= 4.16 - Authenticated (Admin+) Stored Cross Site Scripting
Usersnap Code Analysis
Output Escaping
Usersnap Attack Surface
WordPress Hooks 6
Maintenance & Trust
Usersnap Maintenance & Trust
Maintenance Signals
Community Trust
Usersnap Alternatives
No alternatives data available yet.
Usersnap Developer Profile
1 plugin · 500 total installs
How We Detect Usersnap
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/usersnap/style.cssusersnap/style.css?ver=usersnap.php?ver=HTML / DOM Fingerprints
us-boxdata-cfasyncwindow['_usersnapconfig']