WP Export Users Security & Risk Analysis

wordpress.org/plugins/wp-export-users

Allows for custom csv user data output. It allows you to customize the Field Separators and Encapsulators. It gives you a preview of your data that …

30 active installs v1.4 PHP + WP 2.0.2+ Updated Dec 15, 2010
csvcustom-exportpreviewuser-datausers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Export Users Safe to Use in 2026?

Generally Safe

Score 85/100

WP Export Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "wp-export-users" v1.4 plugin exhibits a generally concerning security posture, despite the absence of publicly known vulnerabilities and a seemingly small attack surface. The static analysis reveals significant weaknesses in its code. Notably, 100% of its SQL queries are not using prepared statements, which is a critical risk for SQL injection vulnerabilities. Furthermore, none of the output operations are properly escaped, posing a high risk of cross-site scripting (XSS) attacks. The taint analysis also found two flows with unsanitized paths, which, although not classified as critical or high severity in this instance, indicate potential vulnerabilities if they were to involve sensitive data or be exploited in conjunction with other weaknesses.

The lack of nonce checks and capability checks on any entry points, combined with the unescaped output, creates a very insecure environment for user interaction and data handling within the plugin. While the plugin has no recorded CVEs, this could be due to a lack of thorough security auditing or a small user base. The absence of any security best practices like prepared statements and output escaping is a significant red flag. Overall, while the plugin doesn't present an immediate, known critical threat based on its history, the internal code analysis reveals fundamental security flaws that expose it to significant risks of SQL injection and XSS vulnerabilities.

Key Concerns

  • Raw SQL without prepared statements
  • Unescaped output
  • No nonce checks
  • No capability checks
  • Taint flows with unsanitized paths
Vulnerabilities
None known

WP Export Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Export Users Release Timeline

v1.4Current
v1.3
v1.2
v1.1
Code Analysis
Analyzed Mar 16, 2026

WP Export Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped5 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
generate_custom_user_list (wp_export_users.php:288)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Export Users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_headwp_export_users.php:326
actionadmin_menuwp_export_users.php:327
Maintenance & Trust

WP Export Users Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedDec 15, 2010
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

WP Export Users Developer Profile

matthewprice1178

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Export Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapoptionsredblue
FAQ

Frequently Asked Questions about WP Export Users