Core Updates Permission Security & Risk Analysis

wordpress.org/plugins/core-updates-permission

Disables the theme, plugin and core update checking, the related cronjobs and notification system by default. Provides the ability to give certain adm …

10 active installs v1.4.0.1 PHP + WP 2.8+ Updated Sep 5, 2013
coredisablethemeupdates
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Core Updates Permission Safe to Use in 2026?

Generally Safe

Score 85/100

Core Updates Permission has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "core-updates-permission" plugin v1.4.0.1 exhibits a generally good security posture in terms of its attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without proper authentication or permission checks. Furthermore, the absence of known CVEs and a clean vulnerability history indicates a commitment to security maintenance. The use of prepared statements for all SQL queries is a significant strength, preventing common SQL injection vulnerabilities.

However, several concerning signals are present in the static analysis. The presence of the `create_function` function, while potentially used in ways that don't immediately lead to vulnerability, is a known deprecated and potentially risky function that can be leveraged for code injection if not handled with extreme care. More critically, the analysis reveals that 100% of identified outputs are not properly escaped. This is a significant concern as it exposes the plugin to Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the WordPress admin area or even the front-end, depending on where the output is displayed.

The plugin's vulnerability history is clean, which is positive. This, combined with the limited attack surface and secure SQL practices, suggests that the developers are likely diligent about security. However, the unescaped output is a notable weakness that, if exploited, could lead to serious security compromises. The use of `create_function` is also a red flag that warrants attention.

Key Concerns

  • 100% of outputs are not properly escaped
  • Use of deprecated and potentially risky 'create_function'
Vulnerabilities
None known

Core Updates Permission Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Core Updates Permission Code Analysis

Dangerous Functions
6
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter( 'pre_transient_update_themes', create_function( '$a', "return null;" ) );core-updates-permission.php:103
create_functionadd_filter( 'pre_site_transient_update_themes', create_function( '$a', "return null;" ) );core-updates-permission.php:107
create_functionadd_action( 'pre_transient_update_plugins', array(&$this, create_function( '$a', "return null;" )) )core-updates-permission.php:113
create_functionadd_filter( 'pre_site_transient_update_plugins', create_function( '$a', "return null;" ) );core-updates-permission.php:117
create_functionadd_filter( 'pre_transient_update_core', create_function( '$a', "return null;" ) );core-updates-permission.php:123
create_functionadd_filter( 'pre_site_transient_update_core', create_function( '$a', "return null;" ) );core-updates-permission.php:127

Output Escaping

0% escaped1 total outputs
Attack Surface

Core Updates Permission Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionshow_user_profilecore-updates-permission.php:75
actionedit_user_profilecore-updates-permission.php:76
actionpersonal_options_updatecore-updates-permission.php:77
actionedit_user_profile_updatecore-updates-permission.php:78
actionwidgets_initcore-updates-permission.php:83
actionadmin_headcore-updates-permission.php:96
actionadmin_initcore-updates-permission.php:97
filterpre_transient_update_themescore-updates-permission.php:103
filterpre_site_transient_update_themescore-updates-permission.php:107
actionpre_transient_update_pluginscore-updates-permission.php:113
filterpre_site_transient_update_pluginscore-updates-permission.php:117
filterpre_transient_update_corecore-updates-permission.php:123
filterpre_site_transient_update_corecore-updates-permission.php:127
Maintenance & Trust

Core Updates Permission Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 5, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Core Updates Permission Developer Profile

Mike Auteri

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Core Updates Permission

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
button-wrapper
HTML Comments
<!-- Core Updates Permission --><!-- Forked from `Disable All WordPress Updates` pluggin. The one significant difference is that this plugin also allows you to pick and choose administrators that *can* have the ability to make updates. --><!-- Define the plugin version --><!-- The WP_Core_Updates_Permission class -->+29 more
Data Attributes
name="allow_core_updates"id="allow-core-updates-y"id="allow-core-updates-n"
FAQ

Frequently Asked Questions about Core Updates Permission