Multiple User Post Security & Risk Analysis

wordpress.org/plugins/multiple-user-post

assign users, delegate post, edit me, post relationship, one to many, many to many, user post, multiple posts, suggest edit, multiple edit.

10 active installs v2.0 PHP + WP + Updated Jul 5, 2016
admin-user-rolesmore-editorsmore-usersmultiple-user-postmultiple-user-to-single-post
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multiple User Post Safe to Use in 2026?

Generally Safe

Score 85/100

Multiple User Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "multiple-user-post" v2.0 plugin presents a mixed security posture. While it demonstrates good practices in avoiding dangerous functions, raw SQL queries, and external HTTP requests, significant concerns arise from its attack surface and output escaping. The plugin exposes two AJAX handlers, both of which lack authentication checks. This is a critical oversight that could allow unauthorized users to trigger plugin functionality. Furthermore, all three identified output instances are not properly escaped, leaving the plugin vulnerable to cross-site scripting (XSS) attacks where user-supplied data could be injected and executed in other users' browsers. The absence of any recorded vulnerabilities in its history is a positive sign, suggesting a generally stable codebase. However, this should not overshadow the immediate risks identified in the static analysis. The plugin's strengths lie in its SQL handling and lack of known CVEs, but the critical gaps in authorization and output sanitization pose a tangible threat that requires immediate attention.

Key Concerns

  • Unprotected AJAX handlers
  • Unescaped output
Vulnerabilities
None known

Multiple User Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Multiple User Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface
2 unprotected

Multiple User Post Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_multiple_user_post_getpagemultiple-user-post.php:31
noprivwp_ajax_multiple_user_post_getpagemultiple-user-post.php:32
WordPress Hooks 5
actionadmin_enqueue_scriptsmultiple-user-post.php:29
actionsave_postmultiple-user-post.php:133
actionadd_meta_boxesmultiple-user-post.php:140
actioninitmultiple-user-post.php:177
actioninitmultiple-user-post.php:180
Maintenance & Trust

Multiple User Post Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJul 5, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Multiple User Post Alternatives

No alternatives data available yet.

Developer Profile

Multiple User Post Developer Profile

Kapil Lohakare

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multiple User Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/multiple-user-post/js/jquery-ui.js/wp-content/plugins/multiple-user-post/js/custom.js
Script Paths
/wp-content/plugins/multiple-user-post/js/jquery-ui.js/wp-content/plugins/multiple-user-post/js/custom.js
Version Parameters
multiple-user-post/js/jquery-ui.js?ver=multiple-user-post/js/custom.js?ver=

HTML / DOM Fingerprints

CSS Classes
ui-widgetui-widget-content
Data Attributes
id="birds"id="log"data-wp-editor-id="user_editor_.*"
JS Globals
script_object
REST Endpoints
/wp-json/multiple-user-post/v1/some-endpoint
FAQ

Frequently Asked Questions about Multiple User Post