Domainer Security & Risk Analysis

wordpress.org/plugins/domainer

This plugin is no longer being developed.

10 active installs v1.2.1 PHP + WP + Updated Oct 18, 2024
domain-managementdomain-mappingmultisite
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Domainer Safe to Use in 2026?

Generally Safe

Score 92/100

Domainer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "domainer" v1.2.1 plugin exhibits a generally positive security posture, with no known vulnerabilities or CVEs recorded in its history. The static analysis indicates a small attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. This lack of direct entry points is a significant strength. However, the code analysis reveals concerning areas. While a majority of SQL queries use prepared statements, the 36% rate of improperly escaped output is a notable weakness. The taint analysis further highlights this, with two high-severity flows and four flows with unsanitized paths, indicating potential for injection vulnerabilities if these unsanitized paths are exposed.

The absence of a vulnerability history suggests good development practices in the past. However, the current code analysis, particularly the taint flows and output escaping, indicates potential for future vulnerabilities if not addressed. The plugin's strengths lie in its limited attack surface and a good approach to SQL query security. Its weaknesses stem from potential input sanitization and output escaping issues, which are critical for preventing common web vulnerabilities. Overall, while the plugin has a clean history, the current static analysis warrants attention to code quality regarding sanitization and escaping.

Key Concerns

  • High severity taint flows found
  • Unsanitized paths in taint flows
  • Low percentage of properly escaped output
Vulnerabilities
None known

Domainer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Domainer Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
11 prepared
Unescaped Output
21
12 escaped
Nonce Checks
6
Capability Checks
6
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

69% prepared16 total queries

Output Escaping

36% escaped33 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

6 flows4 with unsanitized paths
domains_manager (includes\class-domainer-manager.php:429)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Domainer Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Domainer Maintenance & Trust

Maintenance Signals

WordPress version tested0.0.0
Last updatedOct 18, 2024
PHP min version
Downloads5K

Community Trust

Rating86/100
Number of ratings12
Active installs10
Developer Profile

Domainer Developer Profile

Doug Wollison

7 plugins · 1K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Domainer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/domainer/assets/dist/css/domainer.css/wp-content/plugins/domainer/assets/dist/js/domainer.js
Version Parameters
domainer/assets/dist/css/domainer.css?ver=domainer/assets/dist/js/domainer.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Domainer :: Settings -->
Data Attributes
data-url
JS Globals
domainer_admindomainer_settings
Shortcode Output
<script class="domainer-auth-url"
FAQ

Frequently Asked Questions about Domainer