Admin Restriction Security & Risk Analysis

wordpress.org/plugins/admin-restriction

Disables updating the WordPress Core plus plugin and theme installation, updating and removal for all users except the administrator user with ID 1.

10 active installs v1.1.2 PHP + WP 3.0+ Updated Aug 25, 2023
plugin-deleteplugin-installplugin-updatewordpress-core-update
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Admin Restriction Safe to Use in 2026?

Generally Safe

Score 85/100

Admin Restriction has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "admin-restriction" plugin v1.1.2 exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The attack surface is entirely absent of entry points, with no AJAX handlers, REST API routes, shortcodes, or cron events present. Crucially, all identified code signals indicate adherence to secure coding practices, with no dangerous functions, all SQL queries using prepared statements, and all outputs properly escaped. Furthermore, there are no file operations or external HTTP requests, and the absence of nonce checks and capability checks might be explained by the lack of entry points requiring them.

The taint analysis shows zero flows, further reinforcing the perception of a clean and secure codebase. The plugin also has a perfect vulnerability history, with no known CVEs ever recorded. This indicates a highly reliable plugin with a track record of security. The lack of common vulnerability types and the absence of any recorded past vulnerabilities suggest proactive security measures and thorough development practices by the plugin authors.

In conclusion, this plugin appears to be extremely secure, demonstrating excellent security practices and a clean history. The absence of any exploitable entry points or code vulnerabilities is a significant strength. While the lack of specific security checks like nonces or capabilities might warrant a closer look in more complex plugins, in this context, with zero attack surface, it's likely an indication of the plugin's limited functionality and therefore limited need for such checks. Overall, this plugin presents a very low security risk.

Vulnerabilities
None known

Admin Restriction Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Admin Restriction Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Admin Restriction Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuadmin-restriction.php:20
filterpre_site_transient_update_coreadmin-restriction.php:21
filterplugin_action_linksadmin-restriction.php:22
filteruser_has_capadmin-restriction.php:23
Maintenance & Trust

Admin Restriction Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedAug 25, 2023
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Admin Restriction Developer Profile

Barry Kooij

8 plugins · 62K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
1432 days
View full developer profile
Detection Fingerprints

How We Detect Admin Restriction

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/admin-restriction/admin-restriction.php
Version Parameters
admin-restriction.php?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Admin Restriction