
Allow Multiple Accounts Security & Risk Analysis
wordpress.org/plugins/allow-multiple-accountsAllow multiple user accounts to be created, registered, and updated having the same email address.
Is Allow Multiple Accounts Safe to Use in 2026?
Generally Safe
Score 85/100Allow Multiple Accounts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "allow-multiple-accounts" v3.0.4 plugin exhibits a mixed security posture. On the positive side, it has a minimal attack surface with no discovered AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are correctly parameterized, and there are no external HTTP requests or file operations, which are good security practices. The plugin also incorporates capability checks, indicating an awareness of WordPress's permission system.
However, several concerns temper this positive outlook. The presence of the `unserialize` function is a significant red flag, as it is notoriously prone to deserialization vulnerabilities if not handled with extreme caution and proper validation of the input data. The low percentage (22%) of properly escaped outputs suggests that a substantial portion of data being outputted by the plugin is not sanitized, potentially opening the door to Cross-Site Scripting (XSS) attacks. The complete absence of nonce checks on its entry points is also concerning, as nonces are crucial for preventing Cross-Site Request Forgery (CSRF) attacks.
The plugin's vulnerability history is clean, with no recorded CVEs, which is a strong positive indicator. This, combined with the lack of critical or high-severity taint flows, suggests that current known vulnerabilities are not present. However, the lack of historical data means we cannot infer a long-term track record of security diligence. In conclusion, while the plugin has strengths in its limited attack surface and proper SQL usage, the `unserialize` function, the low output escaping rate, and the missing nonce checks represent significant potential weaknesses that require attention.
Key Concerns
- Dangerous function used: unserialize
- Low output escaping percentage
- Missing nonce checks
Allow Multiple Accounts Security Vulnerabilities
Allow Multiple Accounts Release Timeline
Allow Multiple Accounts Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Allow Multiple Accounts Attack Surface
WordPress Hooks 22
Maintenance & Trust
Allow Multiple Accounts Maintenance & Trust
Maintenance Signals
Community Trust
Allow Multiple Accounts Alternatives
Customer Email Verification for WooCommerce
customer-email-verification-for-woocommerce
Secure WooCommerce registrations with OTP-based email verification, reducing spam and ensuring only valid email addresses are used.
Newsletter – Send awesome emails from WordPress
newsletter
An email marketing tool for your blog: subscription forms to create your lists with unlimited subscribers and newsletters.
Mailchimp List Subscribe Form
mailchimp
Add a Mailchimp signup form block, widget, or shortcode to your WordPress site.
Mailjet Email Marketing
mailjet-for-wordpress
Includes WooCommerce automated and order emails. Design, send and track engaging marketing and transactional emails from your WordPress admin.
Mailster WordPress Newsletter Plugin
mailster
Send beautiful newsletters from WordPress. Collect subscribers with signup forms, automate your emails for WooCommerce, blog post notifications & …
Allow Multiple Accounts Developer Profile
63 plugins · 92K total installs
How We Detect Allow Multiple Accounts
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/allow-multiple-accounts/css/allow-multiple-accounts.css/wp-content/plugins/allow-multiple-accounts/js/allow-multiple-accounts.js/wp-content/plugins/allow-multiple-accounts/js/allow-multiple-accounts.jsallow-multiple-accounts/css/allow-multiple-accounts.css?ver=allow-multiple-accounts/js/allow-multiple-accounts.js?ver=HTML / DOM Fingerprints
<!-- NOTE FROM THE DEVELOPER --><!-- TODO: --><!-- Copyright (c) 2008-2015 by Scott Reilly (aka coffee2code) -->