Compatibility Mode Disabler Security & Risk Analysis

wordpress.org/plugins/compatibility-mode-disabler

Disable Compatibility Mode in Internet Explorer for intranet sites. Also starts Chrome Frame if present.

10 active installs v1.0.0 PHP + WP 2.8.0+ Updated Aug 22, 2017
chrome-framecompatibility-modeinternet-explorer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Compatibility Mode Disabler Safe to Use in 2026?

Generally Safe

Score 85/100

Compatibility Mode Disabler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "compatibility-mode-disabler" v1.0.0 plugin exhibits an excellent security posture based on the provided static analysis. The complete absence of identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and taint flows is highly commendable. Furthermore, the lack of any known CVEs, both historical and current, suggests a mature and well-maintained codebase. The plugin also demonstrates good security practices by not exposing any direct entry points like AJAX handlers, REST API routes, or shortcodes without proper authentication or permission checks (as indicated by the 0 unprotected entry points). This suggests the plugin is likely designed to be passive or interact in ways that don't expose it to common attack vectors.

While the static analysis and vulnerability history paint a very positive picture, it's important to acknowledge the complete absence of nonce and capability checks. Although the current attack surface is zero, this could represent a potential future risk if the plugin were to be expanded or modified without incorporating these crucial security mechanisms. The lack of these checks, even with no current exploitable entry points, is a minor weakness in an otherwise robust security profile. In conclusion, this plugin appears to be very secure and well-developed, with its primary strength being the complete lack of identifiable vulnerabilities in its current version. The only area for potential improvement is the consistent implementation of nonce and capability checks for any future development.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Compatibility Mode Disabler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Compatibility Mode Disabler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Compatibility Mode Disabler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterwp_headerscompatibility_mode_disabler.php:11
Maintenance & Trust

Compatibility Mode Disabler Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedAug 22, 2017
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Compatibility Mode Disabler Developer Profile

canis1980

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Compatibility Mode Disabler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Compatibility Mode Disabler