
WP Export Users Plus Security & Risk Analysis
wordpress.org/plugins/wp-export-users-plusThis "Plus" version allows those users who have installed the WP-Members plugin (the one by Chad Butler) to export additional fields for the …
Is WP Export Users Plus Safe to Use in 2026?
Generally Safe
Score 85/100WP Export Users Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'wp-export-users-plus' v1.0 plugin presents a mixed security posture. On the positive side, it boasts a remarkably small attack surface with zero detected entry points like AJAX handlers, REST API routes, shortcodes, or cron events. The absence of external HTTP requests and file operations is also a good sign. However, significant concerns arise from the code analysis. The plugin utilizes raw SQL queries without any prepared statements, which is a substantial risk for SQL injection vulnerabilities. Furthermore, a concerning 0% of output escaping is properly handled, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis reveals two flows with unsanitized paths, though thankfully, these did not escalate to critical or high severity in this static analysis. The plugin's vulnerability history is clean, with no recorded CVEs, which is a strength. However, this could also be attributed to the limited attack surface and the fact that its current version might not have been extensively tested or targeted. The lack of capability checks and nonce checks on any potential (though currently undetected) entry points is also a weakness.
In conclusion, while the plugin has a seemingly minimal attack surface and no known historical vulnerabilities, the static analysis reveals critical underlying security flaws. The complete absence of prepared statements for its SQL query and the lack of any output escaping make it highly susceptible to SQL injection and XSS attacks respectively. These issues significantly outweigh the positive aspects, suggesting a high risk if the plugin were to be used in a production environment without immediate remediation.
Key Concerns
- Raw SQL queries without prepared statements
- No properly escaped output detected
- Flows with unsanitized paths detected
- No nonce checks
- No capability checks
WP Export Users Plus Security Vulnerabilities
WP Export Users Plus Release Timeline
WP Export Users Plus Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP Export Users Plus Attack Surface
WordPress Hooks 2
Maintenance & Trust
WP Export Users Plus Maintenance & Trust
Maintenance Signals
Community Trust
WP Export Users Plus Alternatives
Export and Import Users and Customers
users-customers-import-export-for-wp-woocommerce
Import and export WordPress users and WooCommerce customers using CSV. Migrate to your new site without any data loss.
WP All Export – User Export Add-On
export-wp-users-xml-csv
Drag & drop to export users and all user data to a completely custom CSV, Excel, or XML of any format. Supports roles, metadata, custom fields, wi …
Export Users Data CSV
export-users-data-csv
Export Users Data Plugin allows you to export users information with important meta data in CSV file format.
LH Export Users to CSV
lh-export-users-to-csv
Export Users to CSV Plugin allows you to export users listings and their metadata into a CSV file.
WP Export Users
wp-export-users
Allows for custom csv user data output. It allows you to customize the Field Separators and Encapsulators. It gives you a preview of your data that …
WP Export Users Plus Developer Profile
1 plugin · 40 total installs
How We Detect WP Export Users Plus
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
wrapoptionsredbluename="user_login"name="first_name"name="last_name"name="user_email"name="user_pass"name="disp_name"+11 more