
WP-vCard Security & Risk Analysis
wordpress.org/plugins/wp-vcardImport users from vcard file format. Works with populair websites such as linkedin and gmail.
Is WP-vCard Safe to Use in 2026?
Generally Safe
Score 85/100WP-vCard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The wp-vcard plugin v1.1 exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities, including CVEs, indicating a historically stable security record. Furthermore, all SQL queries are properly prepared, and there are no external HTTP requests, which are good security practices that reduce attack vectors. The absence of AJAX handlers, REST API routes, shortcodes, and cron events also significantly limits the plugin's attack surface, and importantly, these limited entry points are all protected by authorization checks.
However, the code analysis reveals some significant concerns. A very low percentage of output is properly escaped, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities. This is further corroborated by taint analysis which identified two flows with unsanitized paths, although they are not flagged as critical or high severity. The presence of file operations without clear context regarding their necessity and sanitization also presents a potential risk. The complete lack of nonce checks and capability checks on the identified entry points (even though they are minimal) is a major oversight and a direct invitation for privilege escalation or unauthorized actions if any of these entry points were to be exposed or if the plugin's functionality were to expand in the future.
In conclusion, while the plugin benefits from a clean vulnerability history and a limited, authenticated attack surface, the severe lack of output escaping and the absence of nonce/capability checks are critical weaknesses. These issues, despite the current minimal attack surface, make the plugin highly susceptible to XSS attacks and potential unauthorized actions should its functionality evolve or be misused. Mitigation of the unescaped output and implementation of robust capability checks are paramount for improving its security.
Key Concerns
- Low percentage of output properly escaped
- Flows with unsanitized paths
- No nonce checks
- No capability checks
- File operations present
WP-vCard Security Vulnerabilities
WP-vCard Code Analysis
Output Escaping
Data Flow Analysis
WP-vCard Attack Surface
WordPress Hooks 3
Maintenance & Trust
WP-vCard Maintenance & Trust
Maintenance Signals
Community Trust
WP-vCard Alternatives
Export and Import Users and Customers
users-customers-import-export-for-wp-woocommerce
Import and export WordPress users and WooCommerce customers using CSV. Migrate to your new site without any data loss.
Import Users from CSV
import-users-from-csv
Import users from a CSV into WordPress
User Import with meta – WP Ultimate CSV Importer Add-on
import-users
Import and export WordPress and WooCommerce users with full user meta, custom fields, billing & shipping details, and membership data.
Simple Membership WP user Import
simple-membership-wp-user-import
An addon for importing existing WordPress users to the Simple Membership plugin as members
BuddyPress Default Data
bp-default-data
Plugin will create lots of users, messages, friends connections, groups, topics, activity items, profile data - useful for testing purpose.
WP-vCard Developer Profile
4 plugins · 6K total installs
How We Detect WP-vCard
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-vcard/classes/util/class.vcard.php/wp-content/plugins/wp-vcard/classes/model/WPVCAdminConfigForm.php/wp-content/plugins/wp-vcard/classes/util/WPVCWPPlugin.php/wp-content/plugins/wp-vcard/classes/action/WPVCAdminAction.php/wp-content/plugins/wp-vcard/classes/action/WPVCAdminConfigAction.php/wp-content/plugins/wp-vcard/classes/util/com.daveligthart.util.wordpress.phpHTML / DOM Fingerprints
<!-- WPVCARDMain. --><!-- WPVCBaseForm. --><!-- BaseForm. --><!-- __construct() -->+14 morename="form_name"id="form_name"value="WPVCAdminConfigForm"value="WPVCBaseForm"