Multisite Cloner Security & Risk Analysis

wordpress.org/plugins/multisite-cloner

When creating a new blog on WordPress Multisite, copies all the posts, settings and files, from a selected blog into the new one.

100 active installs v0.2.2.1 PHP + WP 3.0+ Updated Nov 18, 2016
clonecopycopy-blogmultisitewpmu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multisite Cloner Safe to Use in 2026?

Generally Safe

Score 85/100

Multisite Cloner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The multisite-cloner plugin v0.2.2.1 exhibits a mixed security posture. While the static analysis indicates a very small attack surface with zero identified entry points and no external HTTP requests, several concerning code signals raise red flags. The presence of the dangerous `unserialize` function, coupled with 2 high-severity taint flows with unsanitized paths, points to a significant potential for remote code execution or data manipulation if these flows can be triggered by an attacker. The limited output escaping (22% proper) further exacerbates this risk, as sensitive data could be exposed. Notably, the plugin has no recorded vulnerability history, which might suggest it has not been widely targeted or thoroughly audited. However, this lack of history should not be interpreted as a guarantee of absolute security, especially given the identified code weaknesses. The absence of nonce and capability checks on any potential implicit entry points (even though none are explicitly listed in the attack surface) is also a concern that could be exploited if functionality is discovered that bypasses the listed entry points.

Key Concerns

  • High severity taint flows found
  • Unsanitized paths in taint flows
  • Dangerous unserialize function used
  • Low percentage of properly escaped output
  • No capability checks implemented
  • No nonce checks implemented
Vulnerabilities
None known

Multisite Cloner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Multisite Cloner Code Analysis

Dangerous Functions
1
Raw SQL Queries
4
9 prepared
Unescaped Output
7
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializeif ( is_string( $data ) && ( $unserialized = @unserialize( $data ) ) !== false ) {multisite-cloner.php:346

SQL Query Safety

69% prepared13 total queries

Output Escaping

22% escaped9 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
wp_mu_clone_settings (multisite-cloner.php:95)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Multisite Cloner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedmultisite-cloner.php:31
actionadmin_initmultisite-cloner.php:39
actionnetwork_admin_menumultisite-cloner.php:76
actionwpmu_new_blogmultisite-cloner.php:77
actionadmin_footermultisite-cloner.php:78
filtermanage_sites_action_linksmultisite-cloner.php:79
Maintenance & Trust

Multisite Cloner Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedNov 18, 2016
PHP min version
Downloads35K

Community Trust

Rating94/100
Number of ratings29
Active installs100
Developer Profile

Multisite Cloner Developer Profile

Manuel Razzari

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multisite Cloner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/multisite-cloner/css/settings.css/wp-content/plugins/multisite-cloner/js/settings.js
Script Paths
/wp-content/plugins/multisite-cloner/js/settings.js
Version Parameters
multisite-cloner/css/settings.css?ver=multisite-cloner/js/settings.js?ver=

HTML / DOM Fingerprints

CSS Classes
settings_page_wp_mu_clone_settings
HTML Comments
Copyright 2014 Tipit.net (email: manuel@tipit.net)
Data Attributes
data-cloner-source-blogdata-cloner-dest-blogdata-cloner-source-iddata-cloner-dest-id
JS Globals
multisite_cloner_var
FAQ

Frequently Asked Questions about Multisite Cloner