WP User Merger Security & Risk Analysis

wordpress.org/plugins/wp-user-merger

WP User Merger is a WordPress plugin that allows you to merge two different users with seletable user fields.

300 active installs v1.6.4 PHP 7.0+ WP 4.4+ Updated Mar 13, 2026
merge-usersuser-mergerwoocommerce-memberships
98
A · Safe
CVEs total3
Unpatched0
Last CVENov 7, 2022
Safety Verdict

Is WP User Merger Safe to Use in 2026?

Generally Safe

Score 98/100

WP User Merger has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Nov 7, 2022Updated 21d ago
Risk Assessment

The wp-user-merger plugin, version 1.6.4, presents a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries, avoiding dangerous functions, and having no file operations or external HTTP requests. The presence of nonce and capability checks on its entry points is also a positive indicator of security awareness. However, a significant concern arises from the taint analysis, which reveals two flows with unsanitized paths, both flagged as high severity. This suggests potential for attackers to inject malicious input that is not properly handled, which could lead to security vulnerabilities despite the use of prepared statements for SQL.

The plugin's vulnerability history is a notable red flag. It has a history of three high-severity CVEs, all of which are currently patched. The common vulnerability type being SQL Injection indicates a recurring weakness in how user input was handled in the past. While all historical vulnerabilities are patched, the recurrence of SQL Injection suggests that the codebase may have inherent challenges in sanitizing input, which is further corroborated by the current taint analysis findings.

In conclusion, while the plugin has adopted some strong security measures, the presence of high-severity unsanitized flows and a history of SQL Injection vulnerabilities warrant careful consideration. The 29% proper output escaping also indicates room for improvement to prevent potential cross-site scripting (XSS) vulnerabilities.

Key Concerns

  • High severity unsanitized taint flows (2)
  • Low output escaping percentage (29%)
  • History of 3 High severity CVEs
Vulnerabilities
3

WP User Merger Security Vulnerabilities

CVEs by Year

3 CVEs in 2022
2022
Patched Has unpatched

Severity Breakdown

High
3

3 total CVEs

CVE-2022-3848high · 7.2Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

WP User Merger <= 1.5.2 - Authenticated (Admin+) SQL Injection

Nov 7, 2022 Patched in 1.5.3 (442d)
CVE-2022-3849high · 7.2Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

WP User Merger <= 1.5.2 - Authenticated (Admin+) SQL Injection

Nov 7, 2022 Patched in 1.5.3 (442d)
CVE-2022-3865high · 7.2Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

WP User Merger <= 1.5.2 - Authenticated (Admin+) SQL Injection

Nov 7, 2022 Patched in 1.5.3 (442d)
Code Analysis
Analyzed Mar 16, 2026

WP User Merger Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
10 prepared
Unescaped Output
71
29 escaped
Nonce Checks
5
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared10 total queries

Output Escaping

29% escaped100 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

5 flows2 with unsanitized paths
wpsu_get_users_list (inc\functions.php:346)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP User Merger Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_wpsu_update_optionsinc\functions.php:313
authwp_ajax_wpsu_get_users_listinc\functions.php:343
authwp_ajax_wpsu_get_user_assetsinc\functions.php:455
WordPress Hooks 5
actionadmin_enqueue_scriptsinc\functions.php:61
actionadmin_initinc\functions.php:532
actionwpus_before_delete_userinc\functions.php:697
actiondelete_userinc\wpus_settings.php:63
actionadmin_menuindex.php:57
Maintenance & Trust

WP User Merger Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 13, 2026
PHP min version7.0
Downloads10K

Community Trust

Rating100/100
Number of ratings6
Active installs300
Developer Profile

WP User Merger Developer Profile

Fahad Mahmood

40 plugins · 33K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
237 days
View full developer profile
Detection Fingerprints

How We Detect WP User Merger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-user-merger/css/fontawesome.min.css/wp-content/plugins/wp-user-merger/css/slimselect.min.css/wp-content/plugins/wp-user-merger/js/slimselect.min.js/wp-content/plugins/wp-user-merger/js/jquery.magnific-popup.min.js/wp-content/plugins/wp-user-merger/css/magnific-popup.css/wp-content/plugins/wp-user-merger/js/admin-scripts.js/wp-content/plugins/wp-user-merger/js/bootstrap.min.js/wp-content/plugins/wp-user-merger/css/bootstrap.min.css+1 more
Script Paths
js/fontawesome.min.cssjs/slimselect.min.cssjs/slimselect.min.jsjs/jquery.magnific-popup.min.jsjs/magnific-popup.cssjs/admin-scripts.js+3 more
Version Parameters
wp-user-merger/css/fontawesome.min.css?ver=wp-user-merger/css/slimselect.min.css?ver=wp-user-merger/js/slimselect.min.js?ver=wp-user-merger/js/jquery.magnific-popup.min.js?ver=wp-user-merger/css/magnific-popup.css?ver=wp-user-merger/js/admin-scripts.js?ver=wp-user-merger/js/bootstrap.min.js?ver=wp-user-merger/css/bootstrap.min.css?ver=wp-user-merger/css/admin-style.css?ver=

HTML / DOM Fingerprints

CSS Classes
wpus-merger-settings-formwpus-merger-user-fieldwpus-merger-buttonwpus-merge-users-btnwpus-delete-users-btn
Data Attributes
data-wpus-noncedata-wpsu-user-searchable
JS Globals
wpsu_obj
FAQ

Frequently Asked Questions about WP User Merger