Multisite Theme Statistics Security & Risk Analysis

wordpress.org/plugins/wordpress-mu-theme-stats

Adds theme usage statistics within your network, shows themes by user and most popular themes.

10 active installs v2.8.3 PHP + WP 3.0+ Updated Aug 6, 2015
multisitenetworkstatisticsstatstheme
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multisite Theme Statistics Safe to Use in 2026?

Generally Safe

Score 85/100

Multisite Theme Statistics has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "wordpress-mu-theme-stats" v2.8.3 plugin demonstrates a generally strong security posture, particularly in its handling of entry points and SQL queries. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly reduces the potential attack surface. Furthermore, the plugin correctly utilizes prepared statements for its single SQL query, a crucial practice for preventing SQL injection vulnerabilities. The lack of reported CVEs and historical vulnerabilities also suggests a history of responsible development and security awareness.

However, a significant concern arises from the output escaping. With 10 total outputs and 0% properly escaped, this presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from user input or external sources without proper sanitization and escaping could be exploited to inject malicious scripts. While the taint analysis shows no unsanitized flows, this is likely due to the limited scope of the analysis (0 flows analyzed). The absence of nonce checks and the single capability check on a critical function without further context also warrant caution, as they could represent missed opportunities for robust access control.

In conclusion, while the plugin excels in minimizing its attack surface and secure database interactions, the complete lack of output escaping is a critical weakness that needs immediate attention. The vulnerability history is a positive indicator, but the current code analysis reveals a glaring security flaw. Addressing the output escaping issue should be the highest priority to mitigate XSS risks.

Key Concerns

  • 0% output escaping
  • No nonce checks on potential sensitive actions
  • Single capability check on a potentially sensitive action
Vulnerabilities
None known

Multisite Theme Statistics Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Multisite Theme Statistics Release Timeline

v2.8.3Current
v2.8.2
v2.8.1
v2.8
Code Analysis
Analyzed Apr 16, 2026

Multisite Theme Statistics Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped10 total outputs
Attack Surface

Multisite Theme Statistics Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionnetwork_admin_menura-theme-stats.php:32
actionadmin_menura-theme-stats.php:34
actionplugins_loadedra-theme-stats.php:35
actionadmin_headra-theme-stats.php:51
actionadmin_headra-theme-stats.php:57
Maintenance & Trust

Multisite Theme Statistics Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedAug 6, 2015
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Multisite Theme Statistics Developer Profile

Ron Rennick

13 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multisite Theme Statistics

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
ra-hide
HTML Comments
<!-- function ra_show(id, newclass) { var el = document.getElementById(id); if(el) { if(newclass) { if(el.className==newclass) el.className="ra-hide"; else el.className=newclass; } else { if(el.className=="") el.className="ra-hide"; else el.className=""; } } } -->
Data Attributes
onclick
JS Globals
ra_show
FAQ

Frequently Asked Questions about Multisite Theme Statistics