
Wpi Multiple Contributors Security & Risk Analysis
wordpress.org/plugins/wpi-multiple-contributorsThis plugin facilitates in assigning and displaying more than one author on a post.
Is Wpi Multiple Contributors Safe to Use in 2026?
Generally Safe
Score 100/100Wpi Multiple Contributors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wpi-multiple-contributors" plugin version 1.0 exhibits a strong security posture based on the provided static analysis. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the presence of nonce and capability checks, coupled with the use of prepared statements for all SQL queries, indicates a good understanding of secure WordPress development practices. The lack of any identified dangerous functions, file operations, or external HTTP requests further reinforces this positive assessment.
The taint analysis revealing zero flows, especially with no unsanitized paths or critical/high severity issues, is a significant strength. This suggests that data handling within the plugin is likely robust and resistant to common injection attacks. The vulnerability history also shows a clean record, with no known CVEs, which is highly encouraging. However, the only area of concern is the output escaping, with 0% properly escaped outputs. This means that any data outputted by the plugin to the user interface is not being sanitized, creating a potential for Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is ever displayed.
In conclusion, the plugin demonstrates excellent security fundamentals in most areas, particularly in limiting its attack surface and preventing SQL injection. The clean vulnerability history is a testament to its current state of security. The sole weakness lies in output escaping, which represents a moderate risk and should be addressed to achieve a fully secure implementation.
Key Concerns
- 0% output escaping
Wpi Multiple Contributors Security Vulnerabilities
Wpi Multiple Contributors Code Analysis
Output Escaping
Wpi Multiple Contributors Attack Surface
WordPress Hooks 4
Maintenance & Trust
Wpi Multiple Contributors Maintenance & Trust
Maintenance Signals
Community Trust
Wpi Multiple Contributors Alternatives
Co-Authors Plus
co-authors-plus
Assign multiple bylines to posts, pages, and custom post types with a search-as-you-type input box.
Molongui Authorship – Author Boxes, Guest Authors & Co-Authors for WordPress
molongui-authorship
All-in-One Authorship Solution: Seamless Author Box, Guest Authors, and Co-Authors to enhance your site's authority, credibility, engagement, and SEO.
ThemeRuby Multi Authors – Assign Multiple Writers to Posts
themeruby-multi-authors
A lightweight plugin that allows you to assign multiple writers to posts, fast and easy to use.
Molongui Post Contributors: Multi-Role Contributor Attribution
molongui-post-contributors
Easily add reviewers, fact-checkers, illustrators, and any other attribution to your WordPress posts and display them towards the post author.
Genesis Co-Authors Plus
genesis-co-authors-plus
Enables full support for the Co-Authors Plus plugin in Genesis.
Wpi Multiple Contributors Developer Profile
1 plugin · 10 total installs
How We Detect Wpi Multiple Contributors
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wpi-multiple-contributors/wordpress-contributors/css/authorstyle.cssHTML / DOM Fingerprints
contributorboxcontributorlabellist-grouplist-group-itemtwocolname="custom-meta-box[]"valuechecked="checked"