WP Multi Author Security & Risk Analysis

wordpress.org/plugins/wp-multi-author

One post, multiple contributors!

90 active installs v1.0.1 PHP + WP 4.0+ Updated Feb 22, 2020
authorcontributorsmultiplepost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Multi Author Safe to Use in 2026?

Generally Safe

Score 85/100

WP Multi Author has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "wp-multi-author" v1.0.1 plugin exhibits a generally good security posture, with no known vulnerabilities or critical static analysis findings. The plugin effectively utilizes nonce checks and capability checks for its single AJAX handler, and there are no obvious attack vectors through REST API, shortcodes, or cron events. The code also demonstrates a reasonable approach to output escaping, with a high percentage of outputs being properly sanitized. This suggests developers have prioritized core security practices.

However, a notable area for improvement lies in the handling of SQL queries. While the plugin uses prepared statements for half of its queries, the remaining 50% are not explicitly detailed. This presents a potential risk if these non-prepared queries are susceptible to SQL injection, especially if they involve user-supplied data. The absence of taint analysis results is also worth noting, though this could simply mean no exploitable flows were detected by the tools used, rather than a complete absence of potential issues. The use of an older version of Select2 (v3.5.2) is a minor concern, as outdated libraries can sometimes harbor their own security vulnerabilities.

Overall, "wp-multi-author" v1.0.1 is a relatively secure plugin with a clean vulnerability history. The primary area of concern is the potential for unaddressed SQL injection risks in non-prepared queries and the use of an outdated bundled library. Addressing these would significantly strengthen its security profile.

Key Concerns

  • SQL queries not using prepared statements
  • Bundled outdated library (Select2 v3.5.2)
Vulnerabilities
None known

WP Multi Author Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Multi Author Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
3
13 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select23.5.2

SQL Query Safety

50% prepared2 total queries

Output Escaping

81% escaped16 total outputs
Attack Surface

WP Multi Author Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_get_contributors_listincludes\class-backend.php:27
WordPress Hooks 7
actionadd_meta_boxesincludes\class-backend.php:26
actionsave_post_postincludes\class-backend.php:28
filteruser_search_columnsincludes\class-backend.php:112
filterthe_contentincludes\class-frontend.php:27
actionplugins_loadedincludes\class-main.php:58
actionadmin_enqueue_scriptsincludes\class-main.php:59
actionwp_enqueue_scriptsincludes\class-main.php:60
Maintenance & Trust

WP Multi Author Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedFeb 22, 2020
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs90
Developer Profile

WP Multi Author Developer Profile

aagjalpankaj

1 plugin · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Multi Author

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-multi-author/assets/css/backend.css/wp-content/plugins/wp-multi-author/assets/js/backend.js/wp-content/plugins/wp-multi-author/assets/css/frontend.css
Script Paths
/wp-content/plugins/wp-multi-author/assets/js/backend.js
Version Parameters
wp-multi-author/assets/css/backend.css?ver=wp-multi-author/assets/js/backend.js?ver=wp-multi-author/assets/css/frontend.css?ver=

HTML / DOM Fingerprints

CSS Classes
wpmat-select2wpmat-contributors-wrapper
HTML Comments
<!-- Required CSS and JS --><!-- Security pass 1 - Nonce verification. --><!-- Security pass 2 - Check if current user is allowed to manage contributors or not. --><!-- Security pass 3 - Validate contributors ID. -->+3 more
Data Attributes
data-placeholderdata-actiondata-multipledata-allow_cleardata-selected
JS Globals
wpmatBackend
REST Endpoints
/wp-json/wp-multi-author/v1/get_contributors_list
FAQ

Frequently Asked Questions about WP Multi Author