Multisite User Sync Security & Risk Analysis

wordpress.org/plugins/multisite-user-sync

Multisite User Sync will automatically synchronize users to all sites in multisite. Roles of users will be same on everysite.

50 active installs v1.2 PHP 5.4+ WP 4.4+ Updated Aug 24, 2018
multisitemultisite-usermultisite-user-syncsyncuser-sync
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multisite User Sync Safe to Use in 2026?

Generally Safe

Score 85/100

Multisite User Sync has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "multisite-user-sync" plugin version 1.2 exhibits a strong security posture based on the provided static analysis. There are no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication checks. The code also avoids dangerous functions, file operations, and external HTTP requests, all of which are positive indicators. Furthermore, the absence of identified taint flows, including critical or high severity ones, suggests a low risk of remote code execution or arbitrary file access vulnerabilities.

However, a significant concern arises from the 100% of SQL queries not using prepared statements. This indicates a high risk of SQL injection vulnerabilities, especially if any of the query inputs are derived from user-supplied data. While the analysis reports properly escaped output, the lack of prepared statements bypasses a fundamental security measure for database interactions. The plugin also shows no evidence of nonce or capability checks, which are crucial for preventing CSRF attacks and ensuring proper authorization for sensitive operations, even if those operations aren't directly exposed through the identified entry points.

The vulnerability history is clean, with zero recorded CVEs. This, coupled with the absence of critical or high severity issues in the static analysis, paints a picture of a plugin that has, at least in this version, been developed with security in mind regarding exposed functionality. Nevertheless, the prevalence of raw SQL queries and the lack of authorization checks represent significant weaknesses that could be exploited if any user-controlled data ever reaches these SQL queries.

Key Concerns

  • SQL queries not using prepared statements
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Multisite User Sync Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Multisite User Sync Release Timeline

v1.2Current
v1.1
v0.3
Code Analysis
Analyzed Mar 16, 2026

Multisite User Sync Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries
Attack Surface

Multisite User Sync Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionset_user_rolemultisite-user-sync.php:34
actionwpmu_new_blogmultisite-user-sync.php:44
actionset_user_rolemultisite-user-sync.php:65
actionset_user_rolemultisite-user-sync.php:77
actionset_user_rolemultisite-user-sync.php:92
Maintenance & Trust

Multisite User Sync Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedAug 24, 2018
PHP min version5.4
Downloads12K

Community Trust

Rating88/100
Number of ratings14
Active installs50
Developer Profile

Multisite User Sync Developer Profile

Shamim Hasan

6 plugins · 5K total installs

78
trust score
Avg Security Score
86/100
Avg Patch Time
77 days
View full developer profile
Detection Fingerprints

How We Detect Multisite User Sync

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Multisite User Sync