Simple Multisite Sitemaps Security & Risk Analysis

wordpress.org/plugins/simple-multisite-sitemaps

This plugin, once activated, generates a sitemap.xml on-the-fly for every site in a multisite network.

10 active installs v1.1 PHP + WP 2.1+ Updated Unknown
google-sitemapsmultisitesitemapsxml-sitemaps
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Multisite Sitemaps Safe to Use in 2026?

Generally Safe

Score 100/100

Simple Multisite Sitemaps has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "simple-multisite-sitemaps" v1.1 plugin exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface, dangerous functions, raw SQL queries, or taint flows is a positive indicator. The plugin also has no recorded vulnerability history, which suggests a history of secure development or minimal exposure to attackers.

However, a significant concern arises from the output escaping analysis, where 0% of the identified outputs are properly escaped. This means that data being displayed to users might not be sanitized, potentially opening the door for Cross-Site Scripting (XSS) vulnerabilities. While no direct XSS is flagged by taint analysis, unescaped output is a common precursor. The lack of any nonce or capability checks, coupled with zero AJAX, REST API, or shortcode entry points, is unusual and could indicate that the plugin's functionality is entirely handled through means not captured by this specific analysis or is very limited.

In conclusion, while the plugin's lack of known vulnerabilities and absence of dangerous code signals are strengths, the complete lack of output escaping is a critical weakness that requires immediate attention. The limited attack surface and lack of recorded vulnerabilities are good, but the unescaped output presents a tangible risk that could be exploited.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

Simple Multisite Sitemaps Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Multisite Sitemaps Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Simple Multisite Sitemaps Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitsimple-multisite-sitemaps.php:45
filtergenerate_rewrite_rulessimple-multisite-sitemaps.php:57
actiondo_feed_sitemapsimple-multisite-sitemaps.php:64
actiondo_robotstxtsimple-multisite-sitemaps.php:70
Maintenance & Trust

Simple Multisite Sitemaps Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedUnknown
PHP min version
Downloads8K

Community Trust

Rating84/100
Number of ratings5
Active installs10
Developer Profile

Simple Multisite Sitemaps Developer Profile

luckyduck.networks

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Multisite Sitemaps

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
License: GPLSimple Multisite SitemapsCopyright (C) 2012, Jan Brinkmannhttp://the-luckyduck.de+13 more
FAQ

Frequently Asked Questions about Simple Multisite Sitemaps