
AlT Multiduplicator Security & Risk Analysis
wordpress.org/plugins/alt-multiduplicatorPermet de dupliquer des posts sur un site multisite en respectant le référencement
Is AlT Multiduplicator Safe to Use in 2026?
Generally Safe
Score 85/100AlT Multiduplicator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The alt-multiduplicator plugin v1.2.0 presents a mixed security posture. On the positive side, the plugin exhibits a very small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are not protected. This significantly limits the ways an attacker could interact with the plugin. Furthermore, there is no recorded vulnerability history, suggesting a historically stable plugin.
However, several significant concerns are raised by the static analysis. The plugin uses SQL queries without prepared statements, which is a major risk for SQL injection vulnerabilities. The taint analysis also identified one flow with unsanitized paths, indicating a potential for path traversal or file system manipulation, though it was not categorized as critical or high severity. The low percentage of properly escaped output suggests a risk of cross-site scripting (XSS) vulnerabilities. The complete absence of nonce checks, coupled with only one capability check and no auth checks on any entry points (though the entry points are zero), is a critical oversight that could be exploited if any entry points were to become accessible or if logic flaws exist that bypass the intended security checks.
In conclusion, while the plugin's limited attack surface and lack of historical vulnerabilities are strengths, the identified code-level weaknesses, particularly the unescaped output, unsanitized paths, and especially the lack of prepared statements for SQL queries and nonce checks, represent significant security risks that require immediate attention. The plugin's design, while appearing to have few entry points, contains fundamental security flaws that could be leveraged by attackers.
Key Concerns
- SQL queries without prepared statements
- Flow with unsanitized paths
- Low percentage of properly escaped output
- No nonce checks
- Only one capability check
AlT Multiduplicator Security Vulnerabilities
AlT Multiduplicator Release Timeline
AlT Multiduplicator Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
AlT Multiduplicator Attack Surface
WordPress Hooks 5
Maintenance & Trust
AlT Multiduplicator Maintenance & Trust
Maintenance Signals
Community Trust
AlT Multiduplicator Alternatives
AlT Stick It
who-stick-it
"Who stick it" can make a sticky menu effect of any part on your website !
DeveloPress Sticky Footer Bar
developress-sticky-footer-bar
The "DeveloPress Sticky Footer Bar Pro" WordPress plugin elevates site interaction with a fixed, customizable footer bar.
Simple Sticky Header Menu
simple-sticky-header-menu
Make website header sticky by using this plugin, very simple way to use, just install plugin and activate it thats all. Also there is an option to sel …
Wp Scrollspy Menu
wp-scrollspy-menu
Scrolls the screen when you click a menu link See http://quasardesenvolvimento.com.br/wordpress-scrollspy-menu/ for full documentation.
Master Mega Menu
master-mega-menu-lite
Most advanced Elementor Mega Menu. Incredibly easy Mega Menu plugin will make your life easier.
AlT Multiduplicator Developer Profile
3 plugins · 30 total installs
How We Detect AlT Multiduplicator
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/alt-multiduplicator/js/multiduplicator.js/wp-content/plugins/alt-multiduplicator/js/multiduplicator.jsHTML / DOM Fingerprints
name="multiduplicator_source"name="multiduplicator_article[]"