MultiSite Clone Duplicator Security & Risk Analysis

wordpress.org/plugins/multisite-clone-duplicator

Clones an existing site into a new one in a multisite installation : copies all posts, settings and files

100 active installs v1.5.3 PHP + WP 4.0.0+ Updated Nov 29, 2018
clonecopyduplicateduplicationduplicator
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEAug 29, 2025
Safety Verdict

Is MultiSite Clone Duplicator Safe to Use in 2026?

Use With Caution

Score 63/100

MultiSite Clone Duplicator has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Aug 29, 2025Updated 7yr ago
Risk Assessment

The multisite-clone-duplicator plugin v1.5.3 presents a mixed security profile. On the positive side, it demonstrates good practices by implementing nonce checks and capability checks for its entry points. The absence of file operations and external HTTP requests also reduces the attack surface. Furthermore, all SQL queries are secured using prepared statements, which is a significant strength. However, a notable concern is the low percentage of properly escaped output (33%). This suggests a potential for Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin's history of a medium-severity XSS CVE.

The vulnerability history indicates a pattern of past security weaknesses, specifically in improper input neutralization leading to XSS. The fact that one medium-severity CVE remains unpatched is a significant risk. While the static analysis didn't reveal critical taint flows or unsanitized paths, the unpatched XSS vulnerability combined with the low output escaping rate warrants careful attention. The plugin has a small attack surface with only one AJAX handler, and it is protected, which is good. However, the unpatched vulnerability is the most pressing issue, overshadowing the otherwise decent code security practices.

Key Concerns

  • Unpatched medium severity CVE
  • Low percentage of properly escaped output
Vulnerabilities
1 published

MultiSite Clone Duplicator Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-52760medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

MultiSite Clone Duplicator <= 1.5.3 - Reflected Cross-Site Scripting

Aug 29, 2025Unpatched
Version History

MultiSite Clone Duplicator Release Timeline

v1.5.3Current1 CVE
v1.5.21 CVE
v1.5.11 CVE
v1.5.01 CVE
v1.4.11 CVE
v1.4.01 CVE
v1.3.31 CVE
v1.3.21 CVE
v1.3.11 CVE
v1.31 CVE
v1.21 CVE
v1.11 CVE
v1.01 CVE
v0.2.01 CVE
Code Analysis
Analyzed Mar 16, 2026

MultiSite Clone Duplicator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
20
10 escaped
Nonce Checks
3
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

100% prepared2 total queries

Output Escaping

33% escaped30 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
mucd_fetch_sites (include\admin.php:216)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

MultiSite Clone Duplicator Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_mucd_fetch_sitesinclude\admin.php:20
WordPress Hooks 7
actionnetwork_admin_menuinclude\admin.php:15
actionadmin_initinclude\admin.php:17
filtermanage_sites_action_linksinclude\admin.php:28
actionadmin_bar_menuinclude\admin.php:30
actionwpmu_optionsinclude\admin.php:32
actionwpmuadmineditinclude\admin.php:34
actionadmin_initmultisite-clone-duplicator.php:63
Maintenance & Trust

MultiSite Clone Duplicator Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.0
Last updatedNov 29, 2018
PHP min version
Downloads242K

Community Trust

Rating88/100
Number of ratings87
Active installs100
Developer Profile

MultiSite Clone Duplicator Developer Profile

Globalis

4 plugins · 6K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MultiSite Clone Duplicator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/multisite-clone-duplicator/css/admin.css/wp-content/plugins/multisite-clone-duplicator/js/select2.min.js/wp-content/plugins/multisite-clone-duplicator/js/mucd-admin.js
Script Paths
/wp-content/plugins/multisite-clone-duplicator/js/select2.min.js/wp-content/plugins/multisite-clone-duplicator/js/mucd-admin.js
Version Parameters
multisite-clone-duplicator/css/admin.css?ver=multisite-clone-duplicator/js/select2.min.js?ver=multisite-clone-duplicator/js/mucd-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
mucd-notice-errormucd-notice-successmucd-button-duplicatemucd-disabledselect2-containerselect2-container--defaultselect2-container--belowselect2-container--open
Data Attributes
data-mucd-actiondata-mucd-confirm
JS Globals
mucd_ajaxurlmucd_site_listmucd_source_site
FAQ

Frequently Asked Questions about MultiSite Clone Duplicator