LH Multisite CORS Security & Risk Analysis

wordpress.org/plugins/lh-multisite-cors

Allows AJAX requests from other sites in your multisite network even if they are on another domain or subdomain

300 active installs v1.02 PHP + WP 3.6+ Updated Jul 30, 2022
ajaxcorsrest
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LH Multisite CORS Safe to Use in 2026?

Generally Safe

Score 85/100

LH Multisite CORS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "lh-multisite-cors" plugin v1.02 exhibits a generally strong security posture based on the provided static analysis. It demonstrates an absence of known vulnerabilities, dangerous functions, file operations, and external HTTP requests, which are positive indicators. The code also shows good practice in output escaping, with all outputs being properly escaped. However, there are significant concerns regarding the lack of explicit authorization checks across its attack surface and the presence of unsanitized paths identified in the taint analysis.

While the plugin reports zero AJAX handlers, REST API routes, shortcodes, or cron events as entry points, the taint analysis revealing two flows with unsanitized paths is a critical flag. This suggests that even without explicitly defined entry points like AJAX or REST API, there might be implicit ways data could be processed without proper sanitization, potentially leading to vulnerabilities if any of these paths are ever exposed or utilized differently. The complete absence of nonce and capability checks further amplifies this concern, as it means any potential data processing could be accessible without proper verification of user intent or permissions.

In conclusion, the plugin's clean vulnerability history and adherence to output escaping are commendable. Nevertheless, the presence of unsanitized taint flows and the lack of any capability or nonce checks present a notable risk. The developer should prioritize addressing these taint flows and implementing robust authorization mechanisms to ensure data integrity and prevent potential security breaches.

Key Concerns

  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

LH Multisite CORS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

LH Multisite CORS Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
add_header (lh-multisite-cors.php:112)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

LH Multisite CORS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_loadedlh-multisite-cors.php:245
filterembed_oembed_htmllh-multisite-cors.php:248
actionplugins_loadedlh-multisite-cors.php:271
Maintenance & Trust

LH Multisite CORS Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJul 30, 2022
PHP min version
Downloads12K

Community Trust

Rating74/100
Number of ratings3
Active installs300
Developer Profile

LH Multisite CORS Developer Profile

shawfactor

77 plugins · 15K total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect LH Multisite CORS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about LH Multisite CORS