WPML2WPMSLS Security & Risk Analysis

wordpress.org/plugins/wpml2wpmsls

Convert posts from an existing WPML multilingual site via WP Import/Export to a WPMS (Network) with Language Switcher so easily it feels like magic!

10 active installs v0.2.0 PHP + WP 5.2+ Updated Aug 4, 2020
bilingualconverti18lnmultilingualwpml
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPML2WPMSLS Safe to Use in 2026?

Generally Safe

Score 85/100

WPML2WPMSLS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "wpml2wpmsls" v0.2.0 plugin presents a concerning security posture, primarily due to a complete lack of output escaping. While the static analysis reveals no immediate critical vulnerabilities such as dangerous functions, SQL injection risks, or unsanitized file operations, the 100% unescaped output is a significant oversight. This means any dynamic data rendered by the plugin could be susceptible to cross-site scripting (XSS) attacks if user-supplied input is involved. The absence of any known CVEs and a clean vulnerability history is positive, suggesting a diligent approach to security in past development or a very limited feature set. However, the lack of comprehensive security checks like nonces and capability checks, coupled with zero identified attack surface entries in the static analysis, might indicate a very basic plugin or an incomplete static analysis. The absence of any taint flows or attack vectors in the static analysis should be viewed with caution, as this could simply mean the plugin's functionality does not lend itself to such vulnerabilities or that the analysis was limited.

In conclusion, the plugin's primary weakness lies in its output handling. While it avoids common critical vulnerabilities, the unescaped output creates a substantial XSS risk. The limited attack surface and clean vulnerability history are strengths, but they do not negate the critical need for proper output sanitization. Until this is addressed, the plugin should be considered a moderate risk, with the potential for XSS exploitation.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

WPML2WPMSLS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WPML2WPMSLS Release Timeline

v0.2.0Current
v0.1
Code Analysis
Analyzed Mar 17, 2026

WPML2WPMSLS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

0% escaped10 total outputs
Attack Surface

WPML2WPMSLS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initwpml2wpmsls.php:60
actionadmin_menuwpml2wpmsls.php:62
actionadmin_initwpml2wpmsls.php:64
actionplugin_action_linkswpml2wpmsls.php:66
actioninitwpml2wpmsls.php:473
Maintenance & Trust

WPML2WPMSLS Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedAug 4, 2020
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

WPML2WPMSLS Developer Profile

Jamie O

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPML2WPMSLS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WPML2WPMSLS