Disable Feeds Security & Risk Analysis

wordpress.org/plugins/disable-feeds

Disables all RSS/Atom/RDF feeds on your WordPress site.

30K active installs v1.4.4 PHP + WP 4.0+ Updated Mar 30, 2018
atomdisablefeedsrdfrss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable Feeds Safe to Use in 2026?

Generally Safe

Score 85/100

Disable Feeds has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'disable-feeds' plugin v1.4.4 exhibits a generally good security posture based on the static analysis provided. The absence of dangerous functions, SQL queries not using prepared statements, file operations, and external HTTP requests is a significant strength. Furthermore, the plugin has no known vulnerabilities, indicating a history of stability and potentially good security practices from the developer.

However, there are notable areas of concern. The analysis reveals that 100% of the observed outputs are not properly escaped. This is a critical security weakness that could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly outputted without sanitization. Additionally, the taint analysis identified two flows with unsanitized paths, which, while not rated as critical or high severity in this specific scan, warrants attention as it suggests potential pathways for malicious input to affect program execution.

In conclusion, while the plugin's core functionality appears to be implemented securely, the lack of output escaping presents a significant risk. The unsanitized paths, though not explicitly severe, also suggest potential improvements. Addressing the output escaping issue should be a priority to mitigate XSS risks. The clean vulnerability history is positive, but it should not lead to complacency, especially given the identified code concerns.

Key Concerns

  • 100% of outputs unescaped
  • 2 flows with unsanitized paths
Vulnerabilities
None known

Disable Feeds Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable Feeds Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
redirect_feed (disable-feeds.php:115)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Disable Feeds Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initdisable-feeds.php:29
actionwp_loadeddisable-feeds.php:32
actiontemplate_redirectdisable-feeds.php:33
filterbbp_requestdisable-feeds.php:34
actionplugins_loadeddisable-feeds.php:37
Maintenance & Trust

Disable Feeds Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 30, 2018
PHP min version
Downloads216K

Community Trust

Rating94/100
Number of ratings31
Active installs30K
Developer Profile

Disable Feeds Developer Profile

WPDeveloper

46 plugins · 4.0M total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
163 days
View full developer profile
Detection Fingerprints

How We Detect Disable Feeds

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
disable_feeds_redirect_yesdisable_feeds_redirect_nodisable_feeds_allow_main
FAQ

Frequently Asked Questions about Disable Feeds