
CellarWeb Multisite Site Notes and Site Expire Security & Risk Analysis
wordpress.org/plugins/cellarweb-multisite-site-notes-and-site-expireFor multisites, adds ability of the network super-admin to 'expire' a blog (subsite) automatically. Will redirect the expired site to anothe …
Is CellarWeb Multisite Site Notes and Site Expire Safe to Use in 2026?
Generally Safe
Score 92/100CellarWeb Multisite Site Notes and Site Expire has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "cellarweb-multisite-site-notes-and-site-expire" plugin v1.00 exhibits a generally positive security posture based on the static analysis. The absence of direct AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code demonstrates good practices by utilizing prepared statements for all SQL queries and including a nonce check. The lack of file operations and external HTTP requests also reduces potential avenues for exploitation.
However, a concern arises from the taint analysis, which identified one flow with an unsanitized path. While classified as low severity (0 critical, 0 high), unsanitized paths can still lead to vulnerabilities if they interact with sensitive operations or user-controlled input. The plugin also has a reasonably high percentage of properly escaped outputs (79%), but this means approximately 21% of outputs might not be adequately sanitized, potentially leading to XSS vulnerabilities if user-controlled data is outputted without proper escaping.
The plugin's vulnerability history is clean, with no known CVEs. This, combined with the limited attack surface and good SQL handling, suggests a developer who is mindful of security. The primary risk is the identified unsanitized path and the potential for XSS through less-than-perfect output escaping. The plugin's strengths lie in its minimal attack surface and strong data handling for SQL, while the weaknesses are confined to potential input sanitization gaps.
Key Concerns
- Unsanitized path in taint flow
- Incomplete output escaping (21%)
CellarWeb Multisite Site Notes and Site Expire Security Vulnerabilities
CellarWeb Multisite Site Notes and Site Expire Code Analysis
Output Escaping
Data Flow Analysis
CellarWeb Multisite Site Notes and Site Expire Attack Surface
WordPress Hooks 16
Maintenance & Trust
CellarWeb Multisite Site Notes and Site Expire Maintenance & Trust
Maintenance Signals
Community Trust
CellarWeb Multisite Site Notes and Site Expire Alternatives
No alternatives data available yet.
CellarWeb Multisite Site Notes and Site Expire Developer Profile
16 plugins · 1K total installs
How We Detect CellarWeb Multisite Site Notes and Site Expire
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/cellarweb-multisite-site-notes-and-site-expire/assets/banner-1000x200.jpgHTML / DOM Fingerprints
CWMN_headerCWMN_shadowCWMN_optionsCWMN_sidebarCWMN_footer<!-- not sure why this one is needed ... -->class='CWMN_header'alt=''class='CWMN_shadow'class="CWMN_options"class='CWMN_sidebar'class="CWMN_footer"