Disable Password Reset Security & Risk Analysis

wordpress.org/plugins/disable-password-reset

Enhance security of your blogs by preventing password reset over email function.

1K active installs v1.0 PHP + WP 3.1+ Updated Nov 10, 2016
disablepasswordreset
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Disable Password Reset Safe to Use in 2026?

Generally Safe

Score 85/100

Disable Password Reset has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "disable-password-reset" v1.0 plugin exhibits a very limited attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This significantly reduces the potential for external exploitation through common WordPress entry points. The plugin also demonstrates good practices in its handling of SQL queries, with all queries utilizing prepared statements, and its output escaping, with all outputs being properly escaped. Furthermore, the absence of file operations and external HTTP requests further enhances its security profile. The vulnerability history shows no recorded CVEs, indicating a clean track record.

However, the static analysis did identify one significant concern: the use of the `create_function` construct. This is a deprecated and potentially insecure function in PHP, and its presence, even if seemingly isolated in this context, raises a flag. While taint analysis and the overall vulnerability history are clean, this specific code signal points to a potential, albeit not immediately exploitable, weakness that could be a vector for future issues or be misused in conjunction with other vulnerabilities. The lack of nonce and capability checks on any potential entry points (though there are none identified) is a common WordPress security recommendation, and its absence here is noted, though less critical given the minimal attack surface.

In conclusion, the plugin is in a generally good security posture due to its minimal attack surface and adherence to secure coding practices for SQL and output handling. The lack of historical vulnerabilities is a strong positive. The primary weakness lies in the use of `create_function`, which represents a minor but notable risk that could be addressed. The absence of formal checks on entry points is less of a concern in this specific case due to the plugin's design.

Key Concerns

  • Use of deprecated/insecure create_function
Vulnerabilities
None known

Disable Password Reset Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable Password Reset Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter('login_errors',create_function('$a', "return 'Operation failed!';"));disablepassword.php:15
Attack Surface

Disable Password Reset Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterallow_password_resetdisablepassword.php:14
filterlogin_errorsdisablepassword.php:15
Maintenance & Trust

Disable Password Reset Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedNov 10, 2016
PHP min version
Downloads11K

Community Trust

Rating80/100
Number of ratings4
Active installs1K
Developer Profile

Disable Password Reset Developer Profile

Dugonja

2 plugins · 1K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
2351 days
View full developer profile
Detection Fingerprints

How We Detect Disable Password Reset

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable Password Reset