Multi-Author Override Security & Risk Analysis

wordpress.org/plugins/multi-author-override

This plugin adds an option to override this behaviour, so that the theme will behave either as a single author blog (even where there are multiple aut …

0 active installs v0.2 PHP + WP + Updated Jul 29, 2021
authors
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Multi-Author Override Safe to Use in 2026?

Generally Safe

Score 85/100

Multi-Author Override has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The static analysis of the "multi-author-override" v0.2 plugin reveals a concerning lack of security best practices despite a seemingly clean vulnerability history and a small attack surface. While the plugin boasts zero AJAX handlers, REST API routes, shortcodes, and cron events, it also exhibits a complete absence of capability checks and nonce verifications. This is particularly alarming given that 100% of its single output is not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of taint analysis results might be due to the limited functionality or analysis capabilities, but the presence of unprotected entry points (even if zero in count) combined with unescaped output presents a significant risk. The plugin's history of zero known CVEs is a positive sign, suggesting it may not have been a target or has not had critical flaws discovered. However, this does not negate the immediate risks identified in the static code analysis, especially the unescaped output which can be a severe security flaw.

Key Concerns

  • 100% of outputs are not properly escaped
  • 0 Nonce checks on potential entry points
  • 0 Capability checks on potential entry points
Vulnerabilities
None known

Multi-Author Override Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Multi-Author Override Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Multi-Author Override Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menumulti-author-override.php:27
actionadmin_initmulti-author-override.php:72
filteris_multi_authormulti-author-override.php:94
Maintenance & Trust

Multi-Author Override Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedJul 29, 2021
PHP min version
Downloads739

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Multi-Author Override Developer Profile

simonwood

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multi-Author Override

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Multi-Author Override