Demo Mode Security & Risk Analysis

wordpress.org/plugins/demo-mode

This plugin adds an additional authentication layer to your WordPress installation to put the site into a demo- or maintainance-mode.

10 active installs v1.2 PHP + WP 2.1+ Updated Nov 18, 2007
accessadmindeveloping
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Demo Mode Safe to Use in 2026?

Generally Safe

Score 85/100

Demo Mode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 18yr ago
Risk Assessment

The "demo-mode" plugin v1.2 exhibits a strong security posture based on the provided static analysis, with no identified dangerous functions, SQL queries using prepared statements, or unescaped output. The absence of file operations, external HTTP requests, and a limited attack surface with no apparent entry points further contribute to this positive assessment. The vulnerability history is also clean, with no known CVEs, suggesting a well-maintained and secure plugin.

However, the taint analysis reveals two flows with unsanitized paths, both categorized as high severity. While these don't directly translate to direct attack vectors due to the lack of exploitable entry points and other security checks, they represent potential weaknesses that could be leveraged if other vulnerabilities were present or introduced in future versions. The complete absence of nonce and capability checks on the (non-existent) entry points is also a notable point. While not a direct risk in this specific version due to the lack of exposed entry points, it indicates a potential lack of defensive programming practices that could become a concern if the plugin evolves to include more interactive features.

Key Concerns

  • High severity taint flow with unsanitized path
  • High severity taint flow with unsanitized path
  • No nonce checks on potential entry points
  • No capability checks on potential entry points
Vulnerabilities
None known

Demo Mode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Demo Mode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
dprx_auth (demo-mode.php:17)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Demo Mode Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitdemo-mode.php:13
Maintenance & Trust

Demo Mode Maintenance & Trust

Maintenance Signals

WordPress version tested2.2.2
Last updatedNov 18, 2007
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Demo Mode Developer Profile

Roland Rust

9 plugins · 180 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Demo Mode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="dprx_username"name="dprx_password"
FAQ

Frequently Asked Questions about Demo Mode