Doubly – Cross Domain Copy Paste for WordPress Security & Risk Analysis

wordpress.org/plugins/doubly

Easily move, duplicate, backup and copy paste content and designs between your WordPress websites in seconds.

10K active installs v1.0.47 PHP + WP 3.5+ Updated Dec 23, 2025
backupcopycross-domainmigratepaste
97
A · Safe
CVEs total1
Unpatched0
Last CVEDec 12, 2025
Safety Verdict

Is Doubly – Cross Domain Copy Paste for WordPress Safe to Use in 2026?

Generally Safe

Score 97/100

Doubly – Cross Domain Copy Paste for WordPress has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Dec 12, 2025Updated 3mo ago
Risk Assessment

The 'doubly' plugin v1.0.47 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and including a nonce check and capability check. The static analysis reveals no apparent direct entry points like AJAX handlers, REST API routes, or shortcodes that are unprotected, indicating a generally well-defined attack surface. However, significant concerns arise from the presence of two dangerous functions, 'unserialize' and 'assert'. The taint analysis, while showing no critical or high severity flows, does highlight three flows with unsanitized paths, suggesting potential avenues for injection if these paths are not adequately handled upstream. The vulnerability history is particularly concerning, with one known high severity CVE related to 'Deserialization of Untrusted Data'. The fact that this vulnerability is listed with a future date suggests a potential recurring issue or an oversight in tracking. This, coupled with the presence of 'unserialize', points to a high risk of deserialization vulnerabilities if user-supplied data is not rigorously validated before being processed by the 'unserialize' function.

In conclusion, while 'doubly' v1.0.47 has a low immediate attack surface and employs good practices in SQL and nonce handling, the use of 'unserialize' and 'assert', along with its past high-severity deserialization vulnerability, presents a substantial risk. The three unsanitized paths identified in taint analysis further amplify this risk. Developers should prioritize auditing and sanitizing all data passed to 'unserialize' and 'assert', and thoroughly investigate the root cause of the past deserialization vulnerability to prevent recurrence.

Key Concerns

  • Use of 'unserialize' function
  • Use of 'assert' function
  • Taint flow with unsanitized paths (3 detected)
  • Past high severity CVE (Deserialization of Untrusted Data)
  • Bundled Freemius library (potential for outdated versions)
Vulnerabilities
1

Doubly – Cross Domain Copy Paste for WordPress Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2025-14476high · 8.8Deserialization of Untrusted Data

Doubly <= 1.0.46 - Authenticated (Subscriber+) PHP Object Injection via ZIP File Import

Dec 12, 2025 Patched in 1.0.47 (25d)
Code Analysis
Analyzed Mar 16, 2026

Doubly – Cross Domain Copy Paste for WordPress Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
4 prepared
Unescaped Output
76
176 escaped
Nonce Checks
1
Capability Checks
1
File Operations
31
External Requests
1
Bundled Libraries
1

Dangerous Functions Found

unserialize$arrOutput = @unserialize($str, array('allowed_classes' => false));inc_php\functions.class.php:1043
assertassert($openingTag == $tagName); // check that tags are properly nested.inc_php\functions.class.php:1409

Bundled Libraries

Freemius1.0

SQL Query Safety

100% prepared4 total queries

Output Escaping

70% escaped252 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
<actions.class> (inc_php\actions.class.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Doubly – Cross Domain Copy Paste for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
filterwp_php_error_messageinc_php\actions.class.php:109
actioninitinc_php\admin.class.php:490
actioninitinc_php\admin.class.php:492
actionadmin_menuinc_php\admin.class.php:494
actionadmin_enqueue_scriptsinc_php\admin.class.php:497
actionadmin_enqueue_scriptsinc_php\admin.class.php:499
actionadmin_initinc_php\admin.class.php:502
actioncurrent_screeninc_php\admin.class.php:511
actionadmin_footerinc_php\admin.class.php:513
actionadmin_bar_menuinc_php\admin.class.php:516
actionadmin_initinc_php\admin_notices.class.php:349
actionadmin_noticesinc_php\admin_notices.class.php:351
actionadmin_print_stylesinc_php\admin_notices.class.php:353
actionadmin_bar_menuinc_php\front.class.php:315
actionwp_enqueue_scriptsinc_php\front.class.php:317
actionwp_footerinc_php\front.class.php:319
actioninitinc_php\front.class.php:355
filterupload_mimesinc_php\functions_wp.class.php:590
Maintenance & Trust

Doubly – Cross Domain Copy Paste for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedDec 23, 2025
PHP min version
Downloads118K

Community Trust

Rating94/100
Number of ratings13
Active installs10K
Developer Profile

Doubly – Cross Domain Copy Paste for WordPress Developer Profile

Unlimited Elements

3 plugins · 310K total installs

82
trust score
Avg Security Score
91/100
Avg Patch Time
53 days
View full developer profile
Detection Fingerprints

How We Detect Doubly – Cross Domain Copy Paste for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/doubly/assets/js/main.js/wp-content/plugins/doubly/assets/css/main.css
Version Parameters
doubly/assets/js/main.js?ver=doubly/assets/css/main.css?ver=

HTML / DOM Fingerprints

CSS Classes
doubly-front-top-panel__button_helpdoubly-front-top-panel__button_closedoubly-front-top-panel__button-copy-styledoubly-front-top-panel__button_update_imagesdoubly-button-copy__icon
Data Attributes
id="doubly_top_panel_button_help"id="doubly_top_panel_button_close"id="doubly_top_panel_button_update_images"
JS Globals
window.doubly_data
REST Endpoints
/wp-json/doubly/v1/export/wp-json/doubly/v1/import
FAQ

Frequently Asked Questions about Doubly – Cross Domain Copy Paste for WordPress