Dropdown multisite selector Security & Risk Analysis

wordpress.org/plugins/dropdown-multisite-selector

Gives you the resources to make select field with redirecting options to a given URLs.

1K active installs v0.9.4 PHP 7.4.0+ WP 3.8+ Updated Mar 26, 2025
dropdown-menuedit-select-optionsflexible-selectmultisiteredirect
91
A · Safe
CVEs total2
Unpatched0
Last CVEMar 28, 2025
Safety Verdict

Is Dropdown multisite selector Safe to Use in 2026?

Generally Safe

Score 91/100

Dropdown multisite selector has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

2 known CVEsLast CVE: Mar 28, 2025Updated 1yr ago
Risk Assessment

The "dropdown-multisite-selector" plugin v0.9.4 exhibits a mixed security posture. On the positive side, the static analysis reveals good practices such as the absence of dangerous functions, all SQL queries using prepared statements, and a single nonce and capability check, indicating an attempt to secure entry points. There are no identified flows with unsanitized paths in the taint analysis, and the code does not perform file operations or external HTTP requests, minimizing certain attack vectors.

However, there are significant concerns. A substantial portion of output (68%) is not properly escaped, presenting a considerable Cross-Site Scripting (XSS) risk. While the static analysis shows zero unprotected entry points, the vulnerability history reveals two past medium-severity CVEs, both related to XSS. The fact that these vulnerabilities existed, even if currently patched, suggests a recurring weakness in output sanitization, which is further evidenced by the high percentage of unescaped output in the current version. The presence of past vulnerabilities, particularly of the same type as indicated by the unescaped output, should be a strong indicator of potential future issues if not addressed.

In conclusion, while the plugin has made efforts to secure its core functionality with prepared statements and checks, the lack of robust output escaping remains a critical security weakness. The historical pattern of XSS vulnerabilities reinforces this concern. Users should be cautious, as the potential for XSS attacks is high due to the unescaped output, and the plugin's past indicates a susceptibility to this type of vulnerability.

Key Concerns

  • High percentage of unescaped output
  • History of medium severity XSS vulnerabilities
Vulnerabilities
2 published

Dropdown multisite selector Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-31090medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Dropdown Multisite selector < 0.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting

Mar 28, 2025 Patched in 0.9.4 (6d)
CVE-2024-29910medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Dropdown Multisite selector <= 0.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode

Mar 25, 2024 Patched in 0.9.2.1 (5d)
Code Analysis
Analyzed Mar 16, 2026

Dropdown multisite selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
9 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

32% escaped28 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
dms_ajax_update_fields (functions\ajax.php:4)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Dropdown multisite selector Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 1

authwp_ajax_dms_add_fieldsfunctions\ajax.php:3

Shortcodes 2

[dms] functions\shortcodes.php:4
[dms_manual] functions\shortcodes.php:52
WordPress Hooks 6
actionplugins_loadeddropdown-multisite-selector.php:63
actionwidgets_initfunctions\widgets.php:51
actionplugins_loadedfunctions\wordpress.php:6
actionadmin_enqueue_scriptsfunctions\wordpress.php:15
actionwp_enqueue_scriptsfunctions\wordpress.php:41
actionadmin_menufunctions\wordpress.php:55
Maintenance & Trust

Dropdown multisite selector Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 26, 2025
PHP min version7.4.0
Downloads32K

Community Trust

Rating100/100
Number of ratings19
Active installs1K
Developer Profile

Dropdown multisite selector Developer Profile

alordiel

3 plugins · 1K total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
6 days
View full developer profile
Detection Fingerprints

How We Detect Dropdown multisite selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dropdown-multisite-selector/assets/js/dms-admin.js/wp-content/plugins/dropdown-multisite-selector/assets/css/dms-admin.css/wp-content/plugins/dropdown-multisite-selector/assets/js/dms-front.js/wp-content/plugins/dropdown-multisite-selector/assets/css/dms-front.css
Script Paths
/wp-content/plugins/dropdown-multisite-selector/assets/js/dms-admin.js/wp-content/plugins/dropdown-multisite-selector/assets/js/dms-front.js
Version Parameters
dropdown-multisite-selector/assets/js/dms-admin.js?ver=0.7.0dropdown-multisite-selector/assets/js/dms-front.js?ver=dropdown-multisite-selector/assets/css/dms-front.css?ver=

HTML / DOM Fingerprints

CSS Classes
dms-containerdms-selectopen-in-new-tab
Data Attributes
data-dms-tag-namedata-dms-valuedata-dms-siteurl
JS Globals
trans_str
Shortcode Output
<div class='dms-container'><label for='dms-select'><select class='dms-select'><option value=''>
FAQ

Frequently Asked Questions about Dropdown multisite selector