
Core Updates Permission Security & Risk Analysis
wordpress.org/plugins/core-updates-permissionDisables the theme, plugin and core update checking, the related cronjobs and notification system by default. Provides the ability to give certain adm …
Is Core Updates Permission Safe to Use in 2026?
Generally Safe
Score 85/100Core Updates Permission has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "core-updates-permission" plugin v1.4.0.1 exhibits a generally good security posture in terms of its attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without proper authentication or permission checks. Furthermore, the absence of known CVEs and a clean vulnerability history indicates a commitment to security maintenance. The use of prepared statements for all SQL queries is a significant strength, preventing common SQL injection vulnerabilities.
However, several concerning signals are present in the static analysis. The presence of the `create_function` function, while potentially used in ways that don't immediately lead to vulnerability, is a known deprecated and potentially risky function that can be leveraged for code injection if not handled with extreme care. More critically, the analysis reveals that 100% of identified outputs are not properly escaped. This is a significant concern as it exposes the plugin to Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the WordPress admin area or even the front-end, depending on where the output is displayed.
The plugin's vulnerability history is clean, which is positive. This, combined with the limited attack surface and secure SQL practices, suggests that the developers are likely diligent about security. However, the unescaped output is a notable weakness that, if exploited, could lead to serious security compromises. The use of `create_function` is also a red flag that warrants attention.
Key Concerns
- 100% of outputs are not properly escaped
- Use of deprecated and potentially risky 'create_function'
Core Updates Permission Security Vulnerabilities
Core Updates Permission Code Analysis
Dangerous Functions Found
Output Escaping
Core Updates Permission Attack Surface
WordPress Hooks 13
Maintenance & Trust
Core Updates Permission Maintenance & Trust
Maintenance Signals
Community Trust
Core Updates Permission Alternatives
Disable Updates for WordPress Core, Plugins and Themes
disable-updates
Disables the WordPress update checking and notification system for all core, plugin and theme updates.
Disable Auto Update Emails and Block Updates for Plugins, WP Core, and Themes
disable-email-notification-for-auto-updates
This plugin disables email notifications for auto-updates and blocks updates for specific plugins, hide plugins, WordPress core, and themes.
Disable All Updates & Notifications
disable-all-updates
Disable Wordpress, Themes & Plugins Updates along with their update notifications.
Disable Complete WP Updates
disable-complete-wp-updates
Completely Disable theme, plugin and core update checking, the related cronjobs and notification system.
Disable Plugins, Themes and Core Updates
disable-wp-automatic-updates
This plugin disable plugins, themes and core updates for WordPress and also the notifications.
Core Updates Permission Developer Profile
1 plugin · 10 total installs
How We Detect Core Updates Permission
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
button-wrapper<!-- Core Updates Permission --><!-- Forked from `Disable All WordPress Updates` pluggin. The one significant difference is that this plugin also allows you to pick and choose administrators that *can* have the ability to make updates. --><!-- Define the plugin version --><!-- The WP_Core_Updates_Permission class -->+29 morename="allow_core_updates"id="allow-core-updates-y"id="allow-core-updates-n"