
WPMS Site Maintenance Mode Security & Risk Analysis
wordpress.org/plugins/wpms-site-maintenance-modeProvides an interface to make a WPMS network unavailable to everyone during maintenance, except the admin.
Is WPMS Site Maintenance Mode Safe to Use in 2026?
Generally Safe
Score 85/100WPMS Site Maintenance Mode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wpms-site-maintenance-mode" v1.0.3 plugin exhibits a strong security posture based on the provided static analysis. The absence of direct attack vectors such as AJAX handlers, REST API routes, shortcodes, and cron events is commendable. Furthermore, the code signals indicate a general adherence to secure coding practices, with no dangerous functions, file operations, or external HTTP requests identified. The presence of a nonce check, even with a limited attack surface, is a positive sign.
However, there are areas for improvement that introduce minor risks. The single SQL query is not using prepared statements, which could be a vulnerability if the query involves user-supplied data, albeit the lack of other entry points mitigates this risk significantly. The output escaping is also not fully implemented, with only 33% of outputs properly escaped, leaving a potential for cross-site scripting (XSS) vulnerabilities if the unescaped outputs are rendered with user-controllable data. The complete lack of capability checks is a concern for any plugin that might handle sensitive operations, though in this specific case, the limited functionality might render this less critical. The vulnerability history being clear of any known CVEs is a significant strength, suggesting the plugin has been relatively well-maintained or has not attracted significant security scrutiny in the past.
In conclusion, the plugin is generally secure due to its minimal attack surface and the absence of critical coding flaws. The primary concerns lie in the non-prepared SQL query and the incomplete output escaping. The lack of vulnerability history is a positive indicator of stability. Developers should address the identified output escaping issues and consider preparing the SQL query to further harden the plugin.
Key Concerns
- SQL query not using prepared statements
- Only 33% of outputs properly escaped
- No capability checks found
WPMS Site Maintenance Mode Security Vulnerabilities
WPMS Site Maintenance Mode Code Analysis
SQL Query Safety
Output Escaping
WPMS Site Maintenance Mode Attack Surface
WordPress Hooks 2
Maintenance & Trust
WPMS Site Maintenance Mode Maintenance & Trust
Maintenance Signals
Community Trust
WPMS Site Maintenance Mode Alternatives
WPMS Sidebar Login Widget
wpms-sidebar-login-widget
Adds a sidebar widget to the main site of a WPMU/WPMS install.
Limit Blogs Per User
limit-blogs-per-user
This plugin is for WordPress Multisite and/or WordPress Multisite+buddypress based social network.It limits the number of blogs a user can create.
Advanced Export for WP & WPMU
advanced-export-for-wp-wpmu
Adds an Advanced Export to the Tools menu which allows selective exporting of pages, posts, specific categories and/or post statuses by date.
Multisite Plugin Manager
multisite-plugin-manager
The essential plugin for every multisite install! Manage plugin access permissions across your entire multisite network.
BuddyPress Russian Months
buddypress-russian-months
Plugin will transform wrong months' cases (in date) to proper ones (according Russian grammar rules).
WPMS Site Maintenance Mode Developer Profile
5 plugins · 130 total installs
How We Detect WPMS Site Maintenance Mode
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wpms-site-maintenance-mode/css/style.css/wp-content/plugins/wpms-site-maintenance-mode/images/coffee_machine-256.pngwpms-site-maintenance-mode/css/style.css?ver=wpms-site-maintenance-mode/images/coffee_machine-256.png?ver=HTML / DOM Fingerprints
motivation-maker