
Doubly – Cross Domain Copy Paste for WordPress Security & Risk Analysis
wordpress.org/plugins/doublyEasily move, duplicate, backup and copy paste content and designs between your WordPress websites in seconds.
Is Doubly – Cross Domain Copy Paste for WordPress Safe to Use in 2026?
Generally Safe
Score 97/100Doubly – Cross Domain Copy Paste for WordPress has a strong security track record. Known vulnerabilities have been patched promptly.
The 'doubly' plugin v1.0.47 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and including a nonce check and capability check. The static analysis reveals no apparent direct entry points like AJAX handlers, REST API routes, or shortcodes that are unprotected, indicating a generally well-defined attack surface. However, significant concerns arise from the presence of two dangerous functions, 'unserialize' and 'assert'. The taint analysis, while showing no critical or high severity flows, does highlight three flows with unsanitized paths, suggesting potential avenues for injection if these paths are not adequately handled upstream. The vulnerability history is particularly concerning, with one known high severity CVE related to 'Deserialization of Untrusted Data'. The fact that this vulnerability is listed with a future date suggests a potential recurring issue or an oversight in tracking. This, coupled with the presence of 'unserialize', points to a high risk of deserialization vulnerabilities if user-supplied data is not rigorously validated before being processed by the 'unserialize' function.
In conclusion, while 'doubly' v1.0.47 has a low immediate attack surface and employs good practices in SQL and nonce handling, the use of 'unserialize' and 'assert', along with its past high-severity deserialization vulnerability, presents a substantial risk. The three unsanitized paths identified in taint analysis further amplify this risk. Developers should prioritize auditing and sanitizing all data passed to 'unserialize' and 'assert', and thoroughly investigate the root cause of the past deserialization vulnerability to prevent recurrence.
Key Concerns
- Use of 'unserialize' function
- Use of 'assert' function
- Taint flow with unsanitized paths (3 detected)
- Past high severity CVE (Deserialization of Untrusted Data)
- Bundled Freemius library (potential for outdated versions)
Doubly – Cross Domain Copy Paste for WordPress Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Doubly <= 1.0.46 - Authenticated (Subscriber+) PHP Object Injection via ZIP File Import
Doubly – Cross Domain Copy Paste for WordPress Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Doubly – Cross Domain Copy Paste for WordPress Attack Surface
WordPress Hooks 18
Maintenance & Trust
Doubly – Cross Domain Copy Paste for WordPress Maintenance & Trust
Maintenance Signals
Community Trust
Doubly – Cross Domain Copy Paste for WordPress Alternatives
Live Copy Paste for Elementor – Cross Domain Copy Paste & Page Duplicator
live-copy-paste
The ultimate Elementor addon for cross-domain copying, magic copy buttons, and instant page duplication. Build websites faster with one-click design t …
Live Copy Paste – Ultimate Elementor Cross-Domain Design Transfer
live-copy
🎯 Instantly copy and paste Elementor designs across domains. Boost workflow, duplicate pages, and transfer layouts with perfect fidelity.
All-in-One WP Migration and Backup
all-in-one-wp-migration
Trusted by 60M+ sites: The gold standard for WordPress migration and backup. Migrate, backup, and restore your WordPress site with one click.
ManageWP Worker
worker
A better way to manage dozens of WordPress websites.
WPvivid — Backup, Migration & Staging
wpvivid-backuprestore
Migrate, staging, backup WordPress, all in one.
Doubly – Cross Domain Copy Paste for WordPress Developer Profile
3 plugins · 310K total installs
How We Detect Doubly – Cross Domain Copy Paste for WordPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/doubly/assets/js/main.js/wp-content/plugins/doubly/assets/css/main.cssdoubly/assets/js/main.js?ver=doubly/assets/css/main.css?ver=HTML / DOM Fingerprints
doubly-front-top-panel__button_helpdoubly-front-top-panel__button_closedoubly-front-top-panel__button-copy-styledoubly-front-top-panel__button_update_imagesdoubly-button-copy__iconid="doubly_top_panel_button_help"id="doubly_top_panel_button_close"id="doubly_top_panel_button_update_images"window.doubly_data/wp-json/doubly/v1/export/wp-json/doubly/v1/import