
YD Network-wide Options Security & Risk Analysis
wordpress.org/plugins/yd-wpmu-sitewide-optionsThis plugin has been thoroughly tested and is fully compatible with WordPress 3.0x multisite or with WPMU 2.9.
Is YD Network-wide Options Safe to Use in 2026?
Generally Safe
Score 85/100YD Network-wide Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The yd-wpmu-sitewide-options plugin, version 4.0.1, exhibits a mixed security posture. On one hand, the absence of known CVEs, direct SQL injection vulnerabilities, and reliance on prepared statements are positive indicators. The attack surface is also reported as zero, suggesting no readily exploitable entry points like AJAX handlers, REST API routes, or shortcodes that lack proper authentication.
However, significant concerns arise from the static code analysis. The presence of two instances of the `unserialize` function is a critical risk, as it can lead to Remote Code Execution if untrusted data is passed to it. Furthermore, the output escaping is severely lacking, with only 5% of outputs being properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis showing two flows with unsanitized paths, even without critical or high severity flags, reinforces the possibility of untrusted data being processed insecurely.
While the vulnerability history is clean, this does not negate the risks identified in the code analysis. The lack of nonce checks and capability checks, combined with the dangerous use of `unserialize` and poor output escaping, creates a precarious security situation. The plugin has potential weaknesses that could be exploited if an attacker can control the data passed to the `unserialize` function or inject malicious scripts through unescaped output.
Key Concerns
- Dangerous function: unserialize used
- Low output escaping (5%)
- Taint analysis: unsanitized paths found
- No nonce checks
- No capability checks
YD Network-wide Options Security Vulnerabilities
YD Network-wide Options Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
YD Network-wide Options Attack Surface
WordPress Hooks 6
Maintenance & Trust
YD Network-wide Options Maintenance & Trust
Maintenance Signals
Community Trust
YD Network-wide Options Alternatives
Admin Menu Editor
admin-menu-editor
Lets you edit the WordPress admin menu. You can re-order, hide or rename menus, add custom menus and more.
Disable User Gravatar
disable-user-gravatar
Stops WordPress from grabbing a user avatar using their registrated email from gravatar.com.
Network Username Restrictions Override
network-username-restrictions-override
Override restrictions on WordPress network usernames.
GP – GeePress
gp
All the tools you need to integrate your WordPress and Google+.
YD WPMU Bloglist Widget
yd-wpmu-bloglist-widget
Sidebar widget and template function to display an ordered blog list of subsites (with post count) on a page of the WordPress MU main site.
YD Network-wide Options Developer Profile
14 plugins · 180 total installs
How We Detect YD Network-wide Options
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/yd-wpmu-sitewide-options/yd-wpmuso.css/wp-content/plugins/yd-wpmu-sitewide-options/yd-wpmuso.js/wp-content/plugins/yd-wpmu-sitewide-options/yd-wpmuso.jsyd-wpmuso.css?ver=yd-wpmuso.js?ver=HTML / DOM Fingerprints
yd-wpmuso-settings<!-- YD Network-wide Options Settings -->data-yd-wpmuso-debug-enabledyd_wpmuso_admin_urlyd_wpmuso_ajax_object