Disable Post Functionnality Security & Risk Analysis

wordpress.org/plugins/disable-post-fonctionnality

Disabled (hide) the Post functionnality of Wordpress.

10 active installs v1.0 PHP + WP 3.0.0+ Updated Jan 22, 2012
disablepost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Disable Post Functionnality Safe to Use in 2026?

Generally Safe

Score 85/100

Disable Post Functionnality has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'disable-post-fonctionnality' plugin v1.0 presents a mixed security posture. On the positive side, the plugin demonstrates strong adherence to secure coding practices by avoiding dangerous functions, not performing file operations or external HTTP requests, and using prepared statements exclusively for its SQL queries. It also includes a substantial number of capability checks (10), indicating an effort to restrict access to its features. Furthermore, the absence of known vulnerabilities and CVEs is a very positive indicator of its historical security.

However, a significant concern arises from the complete lack of output escaping across all 16 identified output instances. This represents a critical weakness that could lead to cross-site scripting (XSS) vulnerabilities if any of the data being output is user-controlled or originates from an untrusted source. While the attack surface appears minimal and there are no recorded taint flows with unsanitized paths, the unescaped output is a substantial risk that undermines the otherwise sound practices observed in other areas. The plugin's historical lack of vulnerabilities is encouraging, but the current state of its output handling requires immediate attention to mitigate potential security threats.

Key Concerns

  • All outputs are unescaped
Vulnerabilities
None known

Disable Post Functionnality Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Disable Post Functionnality Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 17, 2026

Disable Post Functionnality Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
0 escaped
Nonce Checks
0
Capability Checks
10
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped16 total outputs
Attack Surface

Disable Post Functionnality Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menudisable-post-fonctionnality.php:219
actionwp_dashboard_setupdisable-post-fonctionnality.php:220
actionadmin_headdisable-post-fonctionnality.php:221
Maintenance & Trust

Disable Post Functionnality Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 22, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Disable Post Functionnality Developer Profile

Aurélien LWS

10 plugins · 78K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
222 days
View full developer profile
Detection Fingerprints

How We Detect Disable Post Functionnality

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
b_pagesb-tagsb-commentsb_approvedb-waitingb-spamtotal-countapproved-count+3 more
FAQ

Frequently Asked Questions about Disable Post Functionnality