WP Multisite User Sync/Unsync Security & Risk Analysis

wordpress.org/plugins/wp-multisite-user-sync

Sync/unsync users from one site (blog) to the other sites (blogs) in your WordPress Multisite Network.

800 active installs v1.5.0 PHP + WP 4.1+ Updated Dec 12, 2025
multisitesyncsync-userunsyncunsync-user
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Multisite User Sync/Unsync Safe to Use in 2026?

Generally Safe

Score 100/100

WP Multisite User Sync/Unsync has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The static analysis of wp-multisite-user-sync v1.5.0 reveals a plugin with a seemingly strong security posture in several key areas. The absence of dangerous functions, file operations, external HTTP requests, and the complete absence of any recorded vulnerabilities (CVEs) are positive indicators. Furthermore, all identified output operations are properly escaped, and there are no identified taint flows, suggesting that user input is handled securely to prevent common injection attacks. The zero-day attack surface from AJAX, REST API, shortcodes, and cron events without authentication checks is also a very good sign.

However, a significant concern arises from the presence of a single SQL query that does not utilize prepared statements. While the query count is low, the lack of prepared statements for any SQL query is a potential risk that could lead to SQL injection vulnerabilities if the input used within that query is not meticulously sanitized and validated elsewhere. The complete lack of nonce checks and capability checks across any entry points, even though the attack surface is currently reported as zero, suggests a potential weakness if new entry points were to be introduced or discovered without proper security considerations. The vulnerability history being completely clear is reassuring, but it's important to note that this doesn't negate the risks identified in the code analysis itself.

In conclusion, the plugin demonstrates good practices in output escaping and avoids common plugin vulnerabilities like dangerous functions and external requests. The major weakness lies in the un-prepared SQL query. The absence of checks like nonces and capabilities across potential (even if currently non-existent) entry points is also a concern that could be addressed proactively. The clean vulnerability history is a positive but should be viewed in conjunction with the identified code-level risks.

Key Concerns

  • Raw SQL query without prepared statements
  • Lack of nonce checks on potential entry points
  • Lack of capability checks on potential entry points
Vulnerabilities
None known

WP Multisite User Sync/Unsync Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Multisite User Sync/Unsync Release Timeline

v1.5.0Current
v1.4.0
v1.3.0
v1.2.0
v1.1.0
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

WP Multisite User Sync/Unsync Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
25 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

100% escaped25 total outputs
Attack Surface

WP Multisite User Sync/Unsync Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_enqueue_scriptswp-multisite-user-sync.php:16
actionshow_user_profilewp-multisite-user-sync.php:26
actionedit_user_profilewp-multisite-user-sync.php:27
actionedit_user_profile_updatewp-multisite-user-sync.php:99
actionprofile_updatewp-multisite-user-sync.php:100
actionnetwork_admin_menuwp-multisite-user-sync.php:147
Maintenance & Trust

WP Multisite User Sync/Unsync Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 12, 2025
PHP min version
Downloads76K

Community Trust

Rating84/100
Number of ratings18
Active installs800
Developer Profile

WP Multisite User Sync/Unsync Developer Profile

Obtain Infotech

2 plugins · 2K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
440 days
View full developer profile
Detection Fingerprints

How We Detect WP Multisite User Sync/Unsync

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-multisite-user-sync/assets/js/wmus-script.js
Script Paths
/wp-content/plugins/wp-multisite-user-sync/assets/js/wmus-script.js

HTML / DOM Fingerprints

CSS Classes
wmus-check-uncheckwmus-sites
FAQ

Frequently Asked Questions about WP Multisite User Sync/Unsync