Disable Application Passwords Security & Risk Analysis

wordpress.org/plugins/disable-application-passwords

Activate this plugin to disable the Application Passwords feature that was added in WP v5.6.

2K active installs v2.4 PHP 5.6.20+ WP 5.6+ Updated Jan 28, 2026
applicationdisablepasswords
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable Application Passwords Safe to Use in 2026?

Generally Safe

Score 100/100

Disable Application Passwords has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The plugin "disable-application-passwords" v2.4 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, external HTTP requests, file operations, or SQL queries suggests a straightforward and secure implementation. The fact that all SQL queries (though none were detected) would be handled with prepared statements, and all outputs are properly escaped, indicates good coding practices. Furthermore, the complete lack of any recorded vulnerabilities in its history, including CVEs, is a significant positive indicator, suggesting a well-maintained and secure plugin over time.

However, the static analysis reveals a notable lack of security checks. With zero entry points (AJAX, REST API, shortcodes, cron events) and zero capability checks or nonce checks, the plugin doesn't appear to expose any user-facing functionality that requires these security measures. While this contributes to its clean analysis, it also means that if any such functionality were to be added in the future without proper security implementations, it would represent a new and unaddressed risk. The absence of taint analysis flows is also noted, which is generally positive, but it's also a reflection of the plugin's minimal attack surface and limited functionality.

In conclusion, "disable-application-passwords" v2.4 is currently a highly secure plugin, characterized by its minimal attack surface, clean code signals, and a flawless vulnerability history. The lack of security checks is not a concern in its current state due to its apparent limited scope. The primary strength lies in its apparent simplicity and lack of any historical or static analysis red flags. The only potential weakness is the assumption that any future expansion of its functionality would be implemented with the same rigorous security standards.

Vulnerabilities
None known

Disable Application Passwords Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable Application Passwords Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable Application Passwords Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterwp_is_application_passwords_availabledisable-application-passwords.php:40
Maintenance & Trust

Disable Application Passwords Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 28, 2026
PHP min version5.6.20
Downloads44K

Community Trust

Rating100/100
Number of ratings8
Active installs2K
Developer Profile

Disable Application Passwords Developer Profile

Jeff Starr

30 plugins · 1.2M total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
328 days
View full developer profile
Detection Fingerprints

How We Detect Disable Application Passwords

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable Application Passwords