Multisite New User Form Security & Risk Analysis

wordpress.org/plugins/multisite-new-user-form

This plugin allows you to create users with custom password on multisite website.

0 active installs v1.0 PHP + WP 4.6+ Updated Mar 20, 2018
multisitenetworknewpassworduser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Multisite New User Form Safe to Use in 2026?

Generally Safe

Score 85/100

Multisite New User Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The multisite-new-user-form v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. There are no identified vulnerabilities in its attack surface, such as AJAX handlers, REST API routes, shortcodes, or cron events, that lack proper authentication or permission checks. Furthermore, the code demonstrates good practices by exclusively using prepared statements for SQL queries, properly escaping all output, and implementing nonce and capability checks. The absence of file operations and external HTTP requests also reduces potential attack vectors.

However, a significant concern is the presence of the `unserialize` function. While not directly flagged as a vulnerability in the static analysis or taint analysis (which found no unsanitized flows), the use of `unserialize` with untrusted input is a well-known risk that can lead to remote code execution if the input is manipulated. The lack of vulnerability history for this plugin is positive, suggesting a history of secure development or limited exposure, but it does not negate the inherent risk associated with `unserialize`.

In conclusion, the plugin has many strengths, particularly in its handling of common web vulnerabilities. The primary weakness lies in the potential risk posed by the `unserialize` function, which, despite the absence of exploitable taint flows in this analysis, warrants caution and potential mitigation through careful input validation before deserialization.

Key Concerns

  • Presence of unserialize function
Vulnerabilities
None known

Multisite New User Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Multisite New User Form Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
8 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$transientMessage = unserialize($transientMessage);class\MultisiteNewUserForm.php:22

Output Escaping

100% escaped8 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
passwordFields (class\MultisiteNewUserForm.php:30)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Multisite New User Form Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_action_createuserclass\MultisiteNewUserForm.php:9
actionuser_new_formclass\MultisiteNewUserForm.php:10
actionadmin_noticesclass\MultisiteNewUserForm.php:11
Maintenance & Trust

Multisite New User Form Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 20, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Multisite New User Form Developer Profile

Robert Kampas

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multisite New User Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
custom-fieldswp-pwdpassword-input-wrapper
HTML Comments
<!-- #24364 workaround -->
Data Attributes
data-revealdata-pw
FAQ

Frequently Asked Questions about Multisite New User Form