YD Network-wide Options Security & Risk Analysis

wordpress.org/plugins/yd-wpmu-sitewide-options

This plugin has been thoroughly tested and is fully compatible with WordPress 3.0x multisite or with WPMU 2.9.

30 active installs v4.0.1 PHP + WP 2.9.1+ Updated Jan 31, 2012
adminautomaticmuwordpress-muwpmu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is YD Network-wide Options Safe to Use in 2026?

Generally Safe

Score 85/100

YD Network-wide Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The yd-wpmu-sitewide-options plugin, version 4.0.1, exhibits a mixed security posture. On one hand, the absence of known CVEs, direct SQL injection vulnerabilities, and reliance on prepared statements are positive indicators. The attack surface is also reported as zero, suggesting no readily exploitable entry points like AJAX handlers, REST API routes, or shortcodes that lack proper authentication.

However, significant concerns arise from the static code analysis. The presence of two instances of the `unserialize` function is a critical risk, as it can lead to Remote Code Execution if untrusted data is passed to it. Furthermore, the output escaping is severely lacking, with only 5% of outputs being properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis showing two flows with unsanitized paths, even without critical or high severity flags, reinforces the possibility of untrusted data being processed insecurely.

While the vulnerability history is clean, this does not negate the risks identified in the code analysis. The lack of nonce checks and capability checks, combined with the dangerous use of `unserialize` and poor output escaping, creates a precarious security situation. The plugin has potential weaknesses that could be exploited if an attacker can control the data passed to the `unserialize` function or inject malicious scripts through unescaped output.

Key Concerns

  • Dangerous function: unserialize used
  • Low output escaping (5%)
  • Taint analysis: unsanitized paths found
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

YD Network-wide Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

YD Network-wide Options Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
7 prepared
Unescaped Output
96
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializeif( is_string( $option->option_value ) ) $uns = unserialize( $option->option_value );yd-wpmu-sitewide-options.php:605
unserializeif( is_string( $uns ) && $uns2 = unserialize( $uns ) ) $uns = $uns2; //double serialized...yd-wpmu-sitewide-options.php:609

SQL Query Safety

100% prepared7 total queries

Output Escaping

5% escaped101 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
yd_wpmuso_options (yd-wpmu-sitewide-options.php:158)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

YD Network-wide Options Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninityd-wpmu-sitewide-options.php:136
actionadmin_menuyd-wpmu-sitewide-options.php:147
filterplugin_row_metayd-wpmu-sitewide-options.php:662
actionwp_footeryd-wpmu-sitewide-options.php:689
actionplugins_loadedyd-wpmu-sitewide-options.php:750
actionwpmu_new_blogyd-wpmu-sitewide-options.php:888
Maintenance & Trust

YD Network-wide Options Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJan 31, 2012
PHP min version
Downloads30K

Community Trust

Rating88/100
Number of ratings8
Active installs30
Developer Profile

YD Network-wide Options Developer Profile

Yann at WP&Co

14 plugins · 180 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect YD Network-wide Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/yd-wpmu-sitewide-options/yd-wpmuso.css/wp-content/plugins/yd-wpmu-sitewide-options/yd-wpmuso.js
Script Paths
/wp-content/plugins/yd-wpmu-sitewide-options/yd-wpmuso.js
Version Parameters
yd-wpmuso.css?ver=yd-wpmuso.js?ver=

HTML / DOM Fingerprints

CSS Classes
yd-wpmuso-settings
HTML Comments
<!-- YD Network-wide Options Settings -->
Data Attributes
data-yd-wpmuso-debug-enabled
JS Globals
yd_wpmuso_admin_urlyd_wpmuso_ajax_object
FAQ

Frequently Asked Questions about YD Network-wide Options