WP-vCard Security & Risk Analysis

wordpress.org/plugins/wp-vcard

Import users from vcard file format. Works with populair websites such as linkedin and gmail.

20 active installs v1.1 PHP + WP 2.3+ Updated Dec 18, 2012
gmailimportlinkedinusersvcard
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-vCard Safe to Use in 2026?

Generally Safe

Score 85/100

WP-vCard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The wp-vcard plugin v1.1 exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities, including CVEs, indicating a historically stable security record. Furthermore, all SQL queries are properly prepared, and there are no external HTTP requests, which are good security practices that reduce attack vectors. The absence of AJAX handlers, REST API routes, shortcodes, and cron events also significantly limits the plugin's attack surface, and importantly, these limited entry points are all protected by authorization checks.

However, the code analysis reveals some significant concerns. A very low percentage of output is properly escaped, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities. This is further corroborated by taint analysis which identified two flows with unsanitized paths, although they are not flagged as critical or high severity. The presence of file operations without clear context regarding their necessity and sanitization also presents a potential risk. The complete lack of nonce checks and capability checks on the identified entry points (even though they are minimal) is a major oversight and a direct invitation for privilege escalation or unauthorized actions if any of these entry points were to be exposed or if the plugin's functionality were to expand in the future.

In conclusion, while the plugin benefits from a clean vulnerability history and a limited, authenticated attack surface, the severe lack of output escaping and the absence of nonce/capability checks are critical weaknesses. These issues, despite the current minimal attack surface, make the plugin highly susceptible to XSS attacks and potential unauthorized actions should its functionality evolve or be misused. Mitigation of the unescaped output and implementation of robust capability checks are paramount for improving its security.

Key Concerns

  • Low percentage of output properly escaped
  • Flows with unsanitized paths
  • No nonce checks
  • No capability checks
  • File operations present
Vulnerabilities
None known

WP-vCard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-vCard Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
33
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

3% escaped34 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
<admin_config> (view\admin\admin_config.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-vCard Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_headclasses\action\WPVCAdminAction.php:42
actionadmin_menuclasses\action\WPVCAdminAction.php:44
actionadmin_noticesclasses\action\WPVCAdminAction.php:50
Maintenance & Trust

WP-vCard Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedDec 18, 2012
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

WP-vCard Developer Profile

Dave Ligthart

4 plugins · 6K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-vCard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-vcard/classes/util/class.vcard.php/wp-content/plugins/wp-vcard/classes/model/WPVCAdminConfigForm.php/wp-content/plugins/wp-vcard/classes/util/WPVCWPPlugin.php/wp-content/plugins/wp-vcard/classes/action/WPVCAdminAction.php/wp-content/plugins/wp-vcard/classes/action/WPVCAdminConfigAction.php/wp-content/plugins/wp-vcard/classes/util/com.daveligthart.util.wordpress.php

HTML / DOM Fingerprints

HTML Comments
<!-- WPVCARDMain. --><!-- WPVCBaseForm. --><!-- BaseForm. --><!-- __construct() -->+14 more
Data Attributes
name="form_name"id="form_name"value="WPVCAdminConfigForm"value="WPVCBaseForm"
FAQ

Frequently Asked Questions about WP-vCard