Wpi Multiple Contributors Security & Risk Analysis

wordpress.org/plugins/wpi-multiple-contributors

This plugin facilitates in assigning and displaying more than one author on a post.

10 active installs v1.0 PHP + WP 4.4.1+ Updated Unknown
co-authorsmultiple-contributorspost-co-authors
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Wpi Multiple Contributors Safe to Use in 2026?

Generally Safe

Score 100/100

Wpi Multiple Contributors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wpi-multiple-contributors" plugin version 1.0 exhibits a strong security posture based on the provided static analysis. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the presence of nonce and capability checks, coupled with the use of prepared statements for all SQL queries, indicates a good understanding of secure WordPress development practices. The lack of any identified dangerous functions, file operations, or external HTTP requests further reinforces this positive assessment.

The taint analysis revealing zero flows, especially with no unsanitized paths or critical/high severity issues, is a significant strength. This suggests that data handling within the plugin is likely robust and resistant to common injection attacks. The vulnerability history also shows a clean record, with no known CVEs, which is highly encouraging. However, the only area of concern is the output escaping, with 0% properly escaped outputs. This means that any data outputted by the plugin to the user interface is not being sanitized, creating a potential for Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is ever displayed.

In conclusion, the plugin demonstrates excellent security fundamentals in most areas, particularly in limiting its attack surface and preventing SQL injection. The clean vulnerability history is a testament to its current state of security. The sole weakness lies in output escaping, which represents a moderate risk and should be addressed to achieve a fully secure implementation.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

Wpi Multiple Contributors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wpi Multiple Contributors Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Wpi Multiple Contributors Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadd_meta_boxeswp-contributors-init.php:11
actionsave_postwp-contributors-init.php:13
actionwp_enqueue_scriptswp-contributors-init.php:15
filterthe_contentwp-contributors-init.php:17
Maintenance & Trust

Wpi Multiple Contributors Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Wpi Multiple Contributors Developer Profile

prajakta ghole

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wpi Multiple Contributors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpi-multiple-contributors/wordpress-contributors/css/authorstyle.css

HTML / DOM Fingerprints

CSS Classes
contributorboxcontributorlabellist-grouplist-group-itemtwocol
Data Attributes
name="custom-meta-box[]"valuechecked="checked"
FAQ

Frequently Asked Questions about Wpi Multiple Contributors