Magic Sitemaps Security & Risk Analysis

wordpress.org/plugins/magic-sitemaps

Magic sitemaps for wallpaper blog, especially for blog that built with Magic WallPress.

10 active installs v1.0.1 PHP + WP 4.3+ Updated Mar 17, 2016
google-sitemapsimage-sitemapsseositemaps
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Magic Sitemaps Safe to Use in 2026?

Generally Safe

Score 85/100

Magic Sitemaps has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "magic-sitemaps" v1.0.1 plugin exhibits a mixed security posture. On the positive side, there are no known CVEs associated with this plugin, indicating a history of relative stability. The absence of dangerous functions, file operations, and external HTTP requests is also reassuring. Furthermore, all detected SQL queries are properly prepared, mitigating risks of SQL injection.

However, significant concerns arise from the static and taint analysis. While the attack surface is reported as zero, the taint analysis reveals two flows with unsanitized paths, which, though not currently classified as critical or high severity, represent potential avenues for code injection or manipulation if not addressed. The most concerning aspect is the low percentage of properly escaped output (39%). This suggests a high likelihood of cross-site scripting (XSS) vulnerabilities, where untrusted data could be rendered directly in the browser, allowing attackers to execute arbitrary JavaScript.

In conclusion, despite a clean vulnerability history and good practices in areas like SQL query handling, the high proportion of unescaped output is a major security weakness. The taint analysis findings, while not critical, also warrant attention. Developers should prioritize addressing the output escaping issues to significantly improve the plugin's security.

Key Concerns

  • Low output escaping percentage
  • Flows with unsanitized paths
Vulnerabilities
None known

Magic Sitemaps Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Magic Sitemaps Release Timeline

v1.0.1Current
v1.0
Code Analysis
Analyzed Mar 17, 2026

Magic Sitemaps Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

39% escaped28 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
index (sitemap-for-mwp.php:459)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Magic Sitemaps Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitsitemap-for-mwp.php:48
filtertemplate_redirectsitemap-for-mwp.php:49
filterquery_varssitemap-for-mwp.php:50
filterredirect_canonicalsitemap-for-mwp.php:51
actionadmin_menusitemap-for-mwp.php:52
Maintenance & Trust

Magic Sitemaps Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 17, 2016
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Magic Sitemaps Developer Profile

Pijar Inspirators

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Magic Sitemaps

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/magic-sitemaps/sitemap-xsl.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Magic Sitemaps