cbnet Multi Author Comment Notification Security & Risk Analysis

wordpress.org/plugins/cbnet-multi-author-comment-notification

Send comment notification and comment moderation emails to multiple users. Select users individually or by user role, or send emails to arbitrary emai …

1K active installs v3.2 PHP + WP 3.7+ Updated Apr 13, 2016
authorcbnetcommentcommentsmulti
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is cbnet Multi Author Comment Notification Safe to Use in 2026?

Generally Safe

Score 85/100

cbnet Multi Author Comment Notification has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The plugin "cbnet-multi-author-comment-notification" v3.2 exhibits a generally strong security posture based on the static analysis. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant strength, indicating a minimal attack surface. Furthermore, the code signals show no dangerous functions, no direct SQL queries (all using prepared statements), and no file operations or external HTTP requests, all of which are excellent security practices. The presence of one capability check is also positive.

However, a notable concern arises from the low percentage of properly escaped output (17%). This suggests a potential for Cross-Site Scripting (XSS) vulnerabilities, especially if user-supplied data is directly outputted without adequate sanitization. The lack of nonce checks, while not directly tied to an attack surface in this analysis, can be a weakness in certain contexts if any unintended functionality were to be exposed. The vulnerability history is currently clean, with no known CVEs, which is a positive indicator of past security efforts or a lack of past exploitation. Overall, while the plugin has a robust foundation and minimal exposed entry points, the insufficient output escaping presents a tangible risk that should be addressed.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks detected
Vulnerabilities
None known

cbnet Multi Author Comment Notification Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

cbnet Multi Author Comment Notification Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

17% escaped12 total outputs
Attack Surface

cbnet Multi Author Comment Notification Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedcbnet-multi-author-comment-notification.php:39
filtercomment_notification_recipientscbnet-multi-author-comment-notification.php:142
filtercomment_moderation_recipientscbnet-multi-author-comment-notification.php:154
actionshow_user_profilecustom-user-meta.php:27
actionedit_user_profilecustom-user-meta.php:28
actionpersonal_options_updatecustom-user-meta.php:47
actionedit_user_profile_updatecustom-user-meta.php:48
actionadmin_initsettings.php:224
Maintenance & Trust

cbnet Multi Author Comment Notification Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 13, 2016
PHP min version
Downloads30K

Community Trust

Rating86/100
Number of ratings6
Active installs1K
Developer Profile

cbnet Multi Author Comment Notification Developer Profile

Chip Bennett

7 plugins · 3K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect cbnet Multi Author Comment Notification

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
cbnet_macn_comment_notify
FAQ

Frequently Asked Questions about cbnet Multi Author Comment Notification