Custom Disable Feeds Security & Risk Analysis

wordpress.org/plugins/custom-disable-feeds

Disable Wordpress feeds except from Homepage

10 active installs v0.9.0 PHP + WP + Updated Nov 16, 2020
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Disable Feeds Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Disable Feeds has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The custom-disable-feeds plugin v0.9.0 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, reliance on prepared statements for any potential SQL queries, and proper output escaping are positive indicators. Furthermore, the plugin has no recorded vulnerability history, including no known CVEs, which suggests a track record of secure development or minimal exposure to vulnerabilities.

However, the analysis reveals significant concerns regarding the lack of security checks on its entry points. With zero AJAX handlers, REST API routes, shortcodes, and cron events, there are no entry points to analyze, which paradoxically means there are also zero unprotected entry points. This could be interpreted in two ways: either the plugin is so minimalist that it has no functionality that requires security checks, or the analysis is incomplete. If the plugin does indeed have functionality, the complete absence of capability checks and nonce checks on any potential entry points (even if not explicitly identified in this analysis) represents a potential risk if any user-controllable data is processed. This could leave it open to various attacks if functionality were to be added or modified in the future without proper security controls.

In conclusion, while the current state of the plugin appears secure due to its apparent simplicity and clean code signals, the complete lack of any identified security checks on potential entry points is a notable weakness. This doesn't necessarily indicate an immediate vulnerability, but it highlights a gap that could become a problem if the plugin's functionality expands. The lack of vulnerability history is a positive sign, but it should not be a substitute for robust security practices.

Key Concerns

  • No capability checks identified
  • No nonce checks identified
Vulnerabilities
None known

Custom Disable Feeds Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Custom Disable Feeds Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Custom Disable Feeds Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actiondo_feedplugin.php:15
actiondo_feed_rdfplugin.php:16
actiondo_feed_rssplugin.php:17
actiondo_feed_rss2plugin.php:18
actiondo_feed_atomplugin.php:19
actiondo_feed_rss2_commentsplugin.php:20
actiondo_feed_atom_commentsplugin.php:21
actionwpplugin.php:23
Maintenance & Trust

Custom Disable Feeds Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedNov 16, 2020
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Custom Disable Feeds Alternatives

No alternatives data available yet.

Developer Profile

Custom Disable Feeds Developer Profile

David Garcia

11 plugins · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Disable Feeds

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
Feeds are disabled, please visit the <a href="
FAQ

Frequently Asked Questions about Custom Disable Feeds