Multistore Multivendor Security & Risk Analysis

wordpress.org/plugins/multistore-multivendor

This plugin allows you to show WooCommerce products on different domains or subdomains to make a multistore WooCommerce website.

20 active installs v1.1.2 PHP 7.4+ WP 5.0+ Updated Feb 17, 2024
multi-domainmulti-vendormultisitemultistorewoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multistore Multivendor Safe to Use in 2026?

Generally Safe

Score 85/100

Multistore Multivendor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "multistore-multivendor" plugin v1.1.2 exhibits a strong security posture based on the provided static analysis. There are no identified dangerous functions, all SQL queries are properly prepared, and all outputs are correctly escaped. The absence of file operations and external HTTP requests further contributes to a reduced attack surface. Taint analysis revealed no vulnerabilities, indicating that data flow within the plugin is managed securely. The plugin's vulnerability history is also clean, with no recorded CVEs, suggesting a history of secure development and maintenance.

While the static analysis results are overwhelmingly positive, the complete absence of nonce checks and capability checks across all entry points is a notable concern. Although the current attack surface is zero, any future introduction of AJAX handlers, REST API routes, or shortcodes without proper authentication and authorization mechanisms would immediately create a significant security risk. The plugin currently relies on the hope that no new entry points will be added without security considerations, which is not a robust long-term security strategy. Overall, the plugin demonstrates good internal code hygiene but lacks robust input validation and access control mechanisms that could be exploited if new features introduce new entry points.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Multistore Multivendor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Multistore Multivendor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries
Attack Surface

Multistore Multivendor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitindex.php:56
filterwp_dropdown_users_argsindex.php:59
filterpre_option_siteurlindex.php:61
filterpre_option_homeindex.php:62
actionwoocommerce_product_queryindex.php:66
filterwoocommerce_product_related_posts_queryindex.php:67
Maintenance & Trust

Multistore Multivendor Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedFeb 17, 2024
PHP min version7.4
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Multistore Multivendor Developer Profile

CodingMall.com

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multistore Multivendor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Multistore Multivendor