WP Search Username Security & Risk Analysis

wordpress.org/plugins/wp-search-username

Search every username from the author in your Wordpress site.

0 active installs v1.0 PHP + WP 3.5+ Updated Unknown
authordisplay-namepostssearchusername
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Search Username Safe to Use in 2026?

Generally Safe

Score 100/100

WP Search Username has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wp-search-username" v1.0 plugin exhibits a generally positive security posture with several good practices observed. The absence of known CVEs and the use of prepared statements for all SQL queries are significant strengths. Furthermore, the plugin has no file operations or external HTTP requests, which reduces potential attack vectors. However, there are critical areas for concern. The low percentage of properly escaped output (36%) is a major weakness, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The presence of a taint flow with unsanitized paths, although not classified as critical or high in severity by the analysis, warrants attention as it suggests potential for unexpected or malicious data handling.

The plugin's vulnerability history is clean, which is a positive indicator. This, combined with the lack of dangerous functions and no bundled libraries, suggests the developers are generally mindful of common security pitfalls. However, the complete lack of nonce and capability checks, coupled with only one entry point that is not protected by authentication, raises serious questions about its ability to prevent unauthorized actions or data exposure, especially if the shortcode is used in a context where user input can influence its behavior. While the static analysis indicates no direct vulnerabilities related to authentication, the absence of these checks is a significant oversight in secure WordPress development.

In conclusion, while "wp-search-username" v1.0 benefits from a clean vulnerability history and the absence of known dangerous code patterns, its security is significantly undermined by poor output escaping practices and the lack of critical security checks like nonces and capability checks. The taint flow, even if not immediately severe, highlights a potential for unforeseen issues. The plugin is not inherently dangerous, but these weaknesses expose it to common and potentially impactful vulnerabilities, requiring immediate attention for improvement.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flow with unsanitized paths
  • No nonce checks
  • No capability checks
  • One unprotected entry point
Vulnerabilities
None known

WP Search Username Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Search Username Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

36% escaped22 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<author> (author.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Search Username Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[search-username] wp-search-username.php:94
WordPress Hooks 3
actionwp_enqueue_scriptswp-search-username.php:12
actionwidgets_initwp-search-username.php:15
actionpre_get_postswp-search-username.php:67
Maintenance & Trust

WP Search Username Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WP Search Username Developer Profile

speedy222

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Search Username

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-search-username/wp-search-username.php

HTML / DOM Fingerprints

CSS Classes
wpsu_searchusernamewidget_widget_class
Data Attributes
name="q=author&author_name"
Shortcode Output
<form role="search" method="get" id="searchform" class="searchform" action="
FAQ

Frequently Asked Questions about WP Search Username