WP Export Users Plus Security & Risk Analysis

wordpress.org/plugins/wp-export-users-plus

This "Plus" version allows those users who have installed the WP-Members plugin (the one by Chad Butler) to export additional fields for the …

40 active installs v1.0 PHP + WP 2.0.2+ Updated Dec 17, 2014
csvcustom-exportexport-useruserswp-export
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Export Users Plus Safe to Use in 2026?

Generally Safe

Score 85/100

WP Export Users Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'wp-export-users-plus' v1.0 plugin presents a mixed security posture. On the positive side, it boasts a remarkably small attack surface with zero detected entry points like AJAX handlers, REST API routes, shortcodes, or cron events. The absence of external HTTP requests and file operations is also a good sign. However, significant concerns arise from the code analysis. The plugin utilizes raw SQL queries without any prepared statements, which is a substantial risk for SQL injection vulnerabilities. Furthermore, a concerning 0% of output escaping is properly handled, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis reveals two flows with unsanitized paths, though thankfully, these did not escalate to critical or high severity in this static analysis. The plugin's vulnerability history is clean, with no recorded CVEs, which is a strength. However, this could also be attributed to the limited attack surface and the fact that its current version might not have been extensively tested or targeted. The lack of capability checks and nonce checks on any potential (though currently undetected) entry points is also a weakness.

In conclusion, while the plugin has a seemingly minimal attack surface and no known historical vulnerabilities, the static analysis reveals critical underlying security flaws. The complete absence of prepared statements for its SQL query and the lack of any output escaping make it highly susceptible to SQL injection and XSS attacks respectively. These issues significantly outweigh the positive aspects, suggesting a high risk if the plugin were to be used in a production environment without immediate remediation.

Key Concerns

  • Raw SQL queries without prepared statements
  • No properly escaped output detected
  • Flows with unsanitized paths detected
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

WP Export Users Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Export Users Plus Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

WP Export Users Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped5 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
generate_custom_user_list (wp_export_users_plus.php:358)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Export Users Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_headwp_export_users_plus.php:402
actionadmin_menuwp_export_users_plus.php:403
Maintenance & Trust

WP Export Users Plus Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedDec 17, 2014
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

WP Export Users Plus Developer Profile

gregsterWP

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Export Users Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapoptionsredblue
Data Attributes
name="user_login"name="first_name"name="last_name"name="user_email"name="user_pass"name="disp_name"+11 more
FAQ

Frequently Asked Questions about WP Export Users Plus