wpMandrill Multisite Security & Risk Analysis

wordpress.org/plugins/wpmandrill-multisite

Automatically propagates the wpMandrill settings from the main site to all subsites, still allowing each subsite to manually override them.

10 active installs v1.0.3 PHP + WP 3.0+ Updated Apr 11, 2016
mailmandrillmultisitewpmandrillwp_mail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is wpMandrill Multisite Safe to Use in 2026?

Generally Safe

Score 85/100

wpMandrill Multisite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'wpmandrill-multisite' plugin v1.0.3 exhibits a strong security posture. The static analysis reveals no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that are exposed to potential attacks. Furthermore, the code signals indicate a complete absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and a concerning lack of nonce and capability checks across all analyzed code paths. This suggests a robustly developed plugin that adheres to many WordPress security best practices.

The taint analysis also shows no identified flows with unsanitized paths, reinforcing the conclusion that there are no apparent code-level vulnerabilities in this version. The vulnerability history is equally positive, with zero known CVEs, unpatched vulnerabilities, or recorded common vulnerability types. This lack of past security issues further bolsters confidence in the plugin's current security state. However, the absence of nonce and capability checks, while not directly leading to exploitable issues in this specific analysis, represents a potential weakness that could be exploited if new entry points were introduced or existing ones were overlooked in a future update. This lack of these checks is a missed opportunity to enhance security layers.

In conclusion, the 'wpmandrill-multisite' plugin v1.0.3 appears to be highly secure with no exploitable vulnerabilities detected in this analysis. Its zero-attack surface, clean code signals, and lack of vulnerability history are significant strengths. The primary, albeit minor, area for improvement lies in the implementation of nonce and capability checks to add an extra layer of defense and ensure forward compatibility with evolving WordPress security standards. The overall risk associated with this plugin is therefore very low.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

wpMandrill Multisite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

wpMandrill Multisite Release Timeline

v1.0.3Current
v1.0.2
v1.0.1
v1.0
Code Analysis
Analyzed Apr 16, 2026

wpMandrill Multisite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

wpMandrill Multisite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_loadedwpmandrill-multisite.php:29
Maintenance & Trust

wpMandrill Multisite Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 11, 2016
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

wpMandrill Multisite Developer Profile

Marin Atanasov

8 plugins · 4K total installs

90
trust score
Avg Security Score
86/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect wpMandrill Multisite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpmandrill-multisite/wpmandrill-multisite.php

HTML / DOM Fingerprints

JS Globals
wp_mandrill_multisite
FAQ

Frequently Asked Questions about wpMandrill Multisite