This plugin hasn’t been updated in over 2 years. It may no longer be maintained or supported and may have compatibility issues when used with more recent versions of WordPress.

Improved user search in backend

Description

This Plugin improves the search for users in the WordPress backend significantly. It empowers admins to search for the first name, last name and email address of users instead of only their nicknames/nicenames.

It is also possible to search for custom user meta fields now.

Translations: English, German, Swedish

Plugin Homepage: http://www.blackbam.at/blackbams-blog/2011/06/27/wordpress-improved-user-search-first-name-last-name-email-in-backend/
Special characters like quotes are escaped, problems with the query may apper when trying to search for other non-alphanumeric characters.

1.2.4

  • Added translations and il8n (Mikael Grön jag@mikaelgron.se)
    (en_US, en_UK,sv_SE)
  • Added german translation (de_DE)

1.2.3

  • Database compatibility improved.

1.2.2

  • Re-allowed special characters in keys, but strings are still escaped for safe queries.

1.2.1

  • Filter and test custom meta fields. Remove unallowed characters.

1.2.0

  • Added Case-insensitive matching.
  • Added Multisite support.

1.1.2

Fix issue where attempting to activate the plugin would throw an “Invalid Header” error

1.1.1

Minor changes.

1.1

Added options page to include custom user meta fields in the search.

1.0.1

Little code improvements.

1.0

Initial release to the Plugins directory.

Installation

  1. Upload the “improved-user-search-in-backend” directory into the /wp-content/plugins/ of WordPress or use the auto-installer.

  2. Activate the Plugin through the Plugins page.

  3. Maybe you want to change the defaults in Settings -> User Search.

  4. Enjoy.

Contributors & Developers

“Improved user search in backend” is open source software. The following people have contributed to this plugin.

Contributors

Changelog

1.2.6

Additional security fix sanitizing text field input.

1.2.5

  • Removed a possible XSS/CSRF vulnerability in the backend.