BP Disable Activation Reloaded Security & Risk Analysis

wordpress.org/plugins/bp-disable-activation-reloaded

Based on crashutah, apeatling plugin Disables the activation email and automatically activates new users in BuddyPress under a standard WP install and …

900 active installs v1.2.1 PHP + WP 3.6+ Updated Aug 14, 2014
activationbuddypresswpmu
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is BP Disable Activation Reloaded Safe to Use in 2026?

Use With Caution

Score 63/100

BP Disable Activation Reloaded has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 22, 2025Updated 11yr ago
Risk Assessment

The "bp-disable-activation-reloaded" plugin version 1.2.1 exhibits a mixed security posture. On the positive side, the static analysis shows a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are accessible without authentication or proper permission checks. Furthermore, the code doesn't appear to utilize dangerous functions, perform file operations, make external HTTP requests, or bundle external libraries, which are generally good practices.

However, there are significant concerns, particularly regarding output escaping and SQL query security. A concerning 82% of output is not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. While SQL queries are used, only 50% are prepared, leaving potential for SQL injection if the other 50% are handling user-supplied data unsafely. The lack of any nonce or capability checks across the board is also a significant weakness, especially when combined with the output escaping issues.

The plugin's vulnerability history is a major red flag. With one known medium-severity CVE that is currently unpatched, and a pattern of previous CSRF vulnerabilities, it indicates a history of security flaws that have not been fully addressed. This suggests a potential lack of robust security testing or developer attention to security best practices. The unpatched CVE is the most immediate and critical concern, as it represents a known exploit that could be leveraged against users of this plugin.

Key Concerns

  • Unpatched Medium CVE
  • High percentage of unescaped output (82%)
  • 50% of SQL queries not using prepared statements
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
1

BP Disable Activation Reloaded Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-57983medium · 4.3Cross-Site Request Forgery (CSRF)

BP Disable Activation Reloaded <= 1.2.1 - Cross-Site Request Forgery

Sep 22, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

BP Disable Activation Reloaded Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
2 prepared
Unescaped Output
40
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared4 total queries

Output Escaping

18% escaped49 total outputs
Attack Surface

BP Disable Activation Reloaded Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_menubp-disable-activation-loader.php:116
actioninitbp-disable-activation-loader.php:119
actionbp_initbp-disable-activation-loader.php:121
actionbp_core_signup_userbp-disable-activation-loader.php:143
filterbp_registration_needs_activationbp-disable-activation-loader.php:144
filterbp_core_signup_send_activation_keybp-disable-activation-loader.php:145
filterwpmu_signup_user_notificationbp-disable-activation-loader.php:152
actionadmin_initWP_Plugin_Base.class.php:80
actioninitWP_Plugin_Base.class.php:87
filterplugin_action_linksWP_Plugin_Base.class.php:90
Maintenance & Trust

BP Disable Activation Reloaded Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedAug 14, 2014
PHP min version
Downloads27K

Community Trust

Rating100/100
Number of ratings19
Active installs900
Developer Profile

BP Disable Activation Reloaded Developer Profile

Damian

6 plugins · 34K total installs

64
trust score
Avg Security Score
79/100
Avg Patch Time
181 days
View full developer profile
Detection Fingerprints

How We Detect BP Disable Activation Reloaded

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bp-disable-activation-reloaded/css/bp-disable-activation-reloaded.css/wp-content/plugins/bp-disable-activation-reloaded/js/bp-disable-activation-reloaded.js
Script Paths
/wp-content/plugins/bp-disable-activation-reloaded/js/bp-disable-activation-reloaded.js
Version Parameters
bp-disable-activation-reloaded/css/bp-disable-activation-reloaded.css?ver=bp-disable-activation-reloaded/js/bp-disable-activation-reloaded.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- BP Disable Activation Reloaded -->
FAQ

Frequently Asked Questions about BP Disable Activation Reloaded