Multisite Enhancer Security & Risk Analysis

wordpress.org/plugins/multisite-enhancer

This plugins enhances the multisite network dashboard

0 active installs v0.3.2 PHP 7.2+ WP 3.5+ Updated Sep 6, 2019
msmultisitepostswpmu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Multisite Enhancer Safe to Use in 2026?

Generally Safe

Score 85/100

Multisite Enhancer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "multisite-enhancer" v0.3.2 plugin presents a mixed security posture. On the positive side, the static analysis reveals no dangerous functions, all SQL queries use prepared statements, and there are no recorded vulnerabilities or CVEs. This suggests a developer who is mindful of common security pitfalls. However, several areas raise concerns. The low percentage of properly escaped output (23%) is a significant weakness, indicating potential for Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the complete absence of nonce and capability checks, combined with a lack of authentication checks on potential entry points (though currently few), leaves the plugin vulnerable to unauthorized actions and privilege escalation if its attack surface were to expand or if these checks are bypassed.

The taint analysis showing zero flows, while seemingly positive, might be due to the limited nature of the analysis or the simplicity of the plugin's current functionality. The presence of file operations without explicit mention of sanitization or permission checks is also a potential risk, as is the sole shortcode which could be exploited if it handles user-supplied data without proper validation and sanitization.

In conclusion, while the plugin benefits from a clean vulnerability history and good SQL practices, the insufficient output escaping and the complete lack of nonces and capability checks represent notable security weaknesses. These could lead to serious vulnerabilities, particularly XSS, if user input is handled within the plugin's functions. The plugin needs significant improvements in input validation and output escaping to be considered secure.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
  • Potential file operation risks
Vulnerabilities
None known

Multisite Enhancer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Multisite Enhancer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

23% escaped13 total outputs
Attack Surface

Multisite Enhancer Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[show_sites] ms-enhancer.php:107
WordPress Hooks 8
actionnetwork_admin_menums-enhancer.php:81
actionwpmuadminresultms-enhancer.php:122
filterwpmu_blogs_columnsms-enhancer.php:131
filtermanage_sites-network_sortable_columnsms-enhancer.php:132
actionmanage_sites_custom_columnms-enhancer.php:141
actionwp_loadedms-enhancer.php:159
actionwp_loadedms-enhancer.php:179
filterwp_headms-enhancer.php:202
Maintenance & Trust

Multisite Enhancer Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedSep 6, 2019
PHP min version7.2
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Multisite Enhancer Developer Profile

Shrikrishna Meena

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multisite Enhancer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
subsites
Data Attributes
id="msehcr_FWELS"name="msehcr_FWELS"id="msehcr_allnet_sites"name="msehcr_allnet_sites"id="msehcr_headerscripts"name="msehcr_headerscripts"+1 more
Shortcode Output
<ul><li class="site-</a></li></ul>
FAQ

Frequently Asked Questions about Multisite Enhancer