Description
The WP Users Exporter plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.4.2 via the 'Export Users' functionality. This makes it possible for authenticated attackers, such as a subscriber, to add untrusted input into profile information like First Names that will embed into the exported CSV file triggered by an administrator and can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
Published: 2022-09-06
Score: 6.5 Medium
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-42460 The WP Users Exporter plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.4.2 via the 'Export Users' functionality. This makes it possible for authenticated attackers, such as a subscriber, to add untrusted input into profile information like First Names that will embed into the exported CSV file triggered by an administrator and can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title WP Users Exporter <= 1.4.2 - CSV Injection

Subscriptions

Wp-users-exporter Project Wp-users-exporter
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:56.882Z

Reserved: 2022-08-29T00:00:00.000Z

Link: CVE-2022-3026

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-09-06T18:15:16.010

Modified: 2026-04-08T18:17:27.487

Link: CVE-2022-3026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses