BEAPI – Maintenance Mode Security & Risk Analysis

wordpress.org/plugins/beapi-maintenance-mode

Puts your WordPress site into maintenance mode by sending a 'Error 503: Access Denied/Forbidden' status to all unauthenticated clients.

100 active installs v1.0.5 PHP 5.6+ WP 4.7+ Updated Apr 2, 2019
503admindevelopmentmaintenanceunder-construction
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BEAPI – Maintenance Mode Safe to Use in 2026?

Generally Safe

Score 85/100

BEAPI – Maintenance Mode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "beapi-maintenance-mode" plugin v1.0.5 exhibits a strong security posture based on the provided static analysis. It demonstrates excellent adherence to secure coding practices, with no identified dangerous functions, SQL injection vulnerabilities, or unsanitized taint flows. The plugin also correctly implements output escaping and utilizes prepared statements for its SQL queries, further mitigating common risks.

The lack of any recorded vulnerabilities in its history, including critical or high severity issues, is a significant positive indicator. This suggests a well-maintained and thoroughly tested codebase. The plugin's minimal attack surface, with zero entry points found to be unprotected, is another notable strength.

While the static analysis reveals no immediate security concerns, the presence of file operations without further context warrants a minor note. However, given the overall clean analysis and vulnerability history, the plugin appears to be a secure option. The absence of any vulnerabilities in its history strongly suggests a responsible development and maintenance approach.

Vulnerabilities
None known

BEAPI – Maintenance Mode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

BEAPI – Maintenance Mode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

BEAPI – Maintenance Mode Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_initbeapi-maintenance-mode.php:52
actionplugins_loadedbeapi-maintenance-mode.php:61
actionget_headerclasses\main.php:23
filterstatus_headerclasses\main.php:24
actiondo_feed_rdfclasses\main.php:26
actiondo_feed_rssclasses\main.php:27
actiondo_feed_rss2classes\main.php:28
actiondo_feed_atomclasses\main.php:29
actionadmin_noticescompat.php:29
Maintenance & Trust

BEAPI – Maintenance Mode Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedApr 2, 2019
PHP min version5.6
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

BEAPI – Maintenance Mode Developer Profile

BE API

5 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BEAPI – Maintenance Mode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/beapi-maintenance-mode/assets/css/maintenance.css/wp-content/plugins/beapi-maintenance-mode/assets/js/maintenance.js
Script Paths
/wp-content/plugins/beapi-maintenance-mode/assets/js/maintenance.js
Version Parameters
beapi-maintenance-mode/assets/css/maintenance.css?ver=beapi-maintenance-mode/assets/js/maintenance.js?ver=

HTML / DOM Fingerprints

JS Globals
BEAPI_Maintenance_Mode_Url
FAQ

Frequently Asked Questions about BEAPI – Maintenance Mode