Restrict Multisite Widgets Security & Risk Analysis

wordpress.org/plugins/restrict-multisite-widgets

Allows network admins to restrict which widgets are available on sites, similar to themes.

10 active installs v1.1.4 PHP + WP 3.0+ Updated Unknown
multisiterestrictwidgets
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Restrict Multisite Widgets Safe to Use in 2026?

Generally Safe

Score 100/100

Restrict Multisite Widgets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "restrict-multisite-widgets" plugin, version 1.1.4, exhibits a generally strong security posture based on the static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events, coupled with the lack of identified dangerous functions, indicates a minimal attack surface. The use of prepared statements for all SQL queries and the presence of capability checks are positive security practices. However, the analysis reveals a significant weakness in output escaping, with less than half of the identified outputs being properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is reflected in these unescaped outputs.

The plugin's vulnerability history is clean, with no known CVEs recorded. This, combined with the zero taint flows and unsanitized paths, suggests a low likelihood of critical or high-severity vulnerabilities. Despite the clean history, the identified issue with output escaping warrants attention. While the attack surface is small, any vulnerability, especially one related to output manipulation, can still have a significant impact if exploitable. The plugin benefits from a focused functionality and a lack of complex entry points, but the unescaped output is a notable concern that needs to be addressed to ensure a more robust security profile.

Key Concerns

  • Poor output escaping
Vulnerabilities
None known

Restrict Multisite Widgets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Restrict Multisite Widgets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
4 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

44% escaped9 total outputs
Attack Surface

Restrict Multisite Widgets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionwidgets_initrestrict-multisite-widgets.php:18
actionwp_loadedrestrict-multisite-widgets.php:19
actionwp_register_sidebar_widgetrestrict-multisite-widgets.php:20
actionwp_unregister_sidebar_widgetrestrict-multisite-widgets.php:21
actionnetwork_admin_menurestrict-multisite-widgets.php:27
actionadmin_menurestrict-multisite-widgets.php:29
Maintenance & Trust

Restrict Multisite Widgets Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Restrict Multisite Widgets Developer Profile

Adam Harley (Kawauso)

8 plugins · 600 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Restrict Multisite Widgets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Restrict Multisite Widgets