CC-Disable-Users Security & Risk Analysis

wordpress.org/plugins/cc-disable-users

This plugin allows to disable the access to WordPress Dashboard for selected user accounts.

10 active installs v1.2.2 PHP 7.0+ WP 4.9.6+ Updated Mar 14, 2022
authorblockdashboarddisableuser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CC-Disable-Users Safe to Use in 2026?

Generally Safe

Score 85/100

CC-Disable-Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "cc-disable-users" plugin version 1.2.2 exhibits a strong security posture in several key areas, particularly concerning its attack surface and data handling. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits potential entry points for attackers. Furthermore, all detected SQL queries utilize prepared statements, which is excellent practice for preventing SQL injection vulnerabilities. The plugin also demonstrates capability checks, indicating an awareness of user roles and permissions.

However, a critical concern arises from the complete lack of output escaping (0% properly escaped). This means that any dynamic data outputted by the plugin is not sanitized, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Attackers could potentially inject malicious scripts into the WordPress admin area or even into publicly visible content if the plugin's output is displayed there. While there's no known vulnerability history, the lack of output escaping is a significant oversight that overshadows the otherwise positive aspects of the code analysis.

In conclusion, while the plugin excels at limiting its attack surface and securing database interactions, the severe deficiency in output escaping presents a substantial security risk. The absence of any recorded vulnerabilities in its history might be due to its limited functionality or obscurity, but it does not mitigate the inherent danger of unescaped output. Users should be aware of this XSS risk and consider whether the plugin's functionality justifies the potential security exposure.

Key Concerns

  • No output escaping
Vulnerabilities
None known

CC-Disable-Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

CC-Disable-Users Release Timeline

v1.2.2Current
v1.2.1
v1.2.0
v1.1.0
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

CC-Disable-Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Attack Surface

CC-Disable-Users Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

CC-Disable-Users Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 14, 2022
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CC-Disable-Users Developer Profile

Clearcode

19 plugins · 220 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CC-Disable-Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cc-disable-users/assets/css/style.css

HTML / DOM Fingerprints

Data Attributes
name="disable_user"
Shortcode Output
<p>Access to wp-admin for this user is currently restricted.</p>
FAQ

Frequently Asked Questions about CC-Disable-Users