WPMU Ldap Authentication Security & Risk Analysis

wordpress.org/plugins/wpmuldap

A plugin to override the core WordPress authentication method in order to use a LDAP server for authentication. Currently only supported on MultiSite …

60 active installs v5.1 PHP 7.4+ WP 5.2+ Updated Dec 29, 2025
authenticationldapmultisite
99
A · Safe
CVEs total1
Unpatched0
Last CVEAug 21, 2025
Safety Verdict

Is WPMU Ldap Authentication Safe to Use in 2026?

Generally Safe

Score 99/100

WPMU Ldap Authentication has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Aug 21, 2025Updated 3mo ago
Risk Assessment

The static analysis of wpmuldap v5.1 presents a seemingly robust security posture, with no identified entry points like AJAX handlers, REST API routes, or shortcodes that lack authorization checks. The code signals also indicate positive practices, such as the absence of dangerous functions, 100% use of prepared statements for SQL queries, and proper output escaping. Furthermore, there are no detected file operations, external HTTP requests, or indications of missing nonce or capability checks. The taint analysis shows no identified vulnerabilities.

However, the plugin's vulnerability history reveals a past medium-severity vulnerability, specifically identified as Cross-Site Request Forgery (CSRF), with the last occurrence dated August 21, 2025. While this vulnerability is currently marked as patched, its existence, even at a medium severity, suggests potential areas for improvement in input validation and authorization mechanisms that might have been overlooked in previous versions or could be reintroduced. The absence of any other recorded CVEs is a positive indicator, but the singular past CSRF vulnerability warrants a cautious approach.

In conclusion, wpmuldap v5.1 demonstrates strong adherence to secure coding practices in its current state based on the static analysis. The lack of exploitable attack surfaces and positive code signals are significant strengths. The primary concern stems from the historical existence of a CSRF vulnerability, even though it's patched. This past issue, coupled with the fact that it was the only recorded vulnerability, implies that the development team has addressed past security concerns, but it's crucial to remain vigilant for any regressions or new vulnerabilities that might emerge. Overall, the plugin appears to be in a good security state, but the historical data necessitates continued monitoring.

Key Concerns

  • Past medium severity vulnerability recorded
Vulnerabilities
1

WPMU Ldap Authentication Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-48343medium · 6.1Cross-Site Request Forgery (CSRF)

WPMU Ldap Authentication <= 5.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Aug 21, 2025 Patched in 5.1 (139d)
Code Analysis
Analyzed Mar 16, 2026

WPMU Ldap Authentication Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WPMU Ldap Authentication Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 19
actionadmin_initldap_auth.php:23
actionnetwork_admin_menuldap_auth.php:24
actionadmin_menuldap_auth.php:25
actionnetwork_admin_menuldap_auth.php:26
actionadmin_menuldap_auth.php:27
actionnetwork_admin_menuldap_auth.php:28
actionedit_user_profileldap_auth.php:38
actionedit_user_profile_updateldap_auth.php:39
actionshow_user_profileldap_auth.php:40
actionpersonal_options_updateldap_auth.php:41
actionsignup_headerldap_auth.php:48
actionlogin_headldap_auth.php:49
filterauthenticateldap_auth.php:56
filterwp_authenticate_userldap_auth.php:57
actionauthenticateldap_auth.php:59
filterlogin_urlldap_auth.php:60
filtershow_password_fieldsldap_auth.php:64
filtershow_adduser_fieldsldap_auth.php:67
actionwp_before_admin_bar_renderldap_auth.php:70
Maintenance & Trust

WPMU Ldap Authentication Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedDec 29, 2025
PHP min version7.4
Downloads13K

Community Trust

Rating86/100
Number of ratings3
Active installs60
Developer Profile

WPMU Ldap Authentication Developer Profile

Aaron Axelsen

3 plugins · 170 total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
139 days
View full developer profile
Detection Fingerprints

How We Detect WPMU Ldap Authentication

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpmuldap/css/style.css/wp-content/plugins/wpmuldap/js/wpmu_ldap.js
Script Paths
/wp-content/plugins/wpmuldap/js/wpmu_ldap.js
Version Parameters
wpmuldap/css/style.css?ver=wpmuldap/js/wpmu_ldap.js?ver=

HTML / DOM Fingerprints

CSS Classes
ldap-options-wrapperldap-form-field
HTML Comments
<!-- *** End Admin Config Functions *** --><!-- *** Begin User Auth Functions *** -->
Data Attributes
data-ldap-enableddata-ldap-dn
JS Globals
window.wpmuldap_ajax_urlvar ldapConfig = {
Shortcode Output
[wpmuldap_user_sync][wpmuldap_ldap_sync]
FAQ

Frequently Asked Questions about WPMU Ldap Authentication