Description
The WP Users Exporter plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.4.2 via the 'Export Users' functionality. This makes it possible for authenticated attackers, such as a subscriber, to add untrusted input into profile information like First Names that will embed into the exported CSV file triggered by an administrator and can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42460 | The WP Users Exporter plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.4.2 via the 'Export Users' functionality. This makes it possible for authenticated attackers, such as a subscriber, to add untrusted input into profile information like First Names that will embed into the exported CSV file triggered by an administrator and can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration. |
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | WP Users Exporter <= 1.4.2 - CSV Injection |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:02:56.882Z
Reserved: 2022-08-29T00:00:00.000Z
Link: CVE-2022-3026
No data.
Status : Modified
Published: 2022-09-06T18:15:16.010
Modified: 2026-04-08T18:17:27.487
Link: CVE-2022-3026
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD