Disable Users Security & Risk Analysis

wordpress.org/plugins/disable-users

This plugin gives you the ability to disable specific user accounts via a profile setting.

2K active installs v1.0.5 PHP + WP 4.0.0+ Updated Nov 28, 2017
disableloginusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable Users Safe to Use in 2026?

Generally Safe

Score 85/100

Disable Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'disable-users' plugin v1.0.5 demonstrates a strong security posture based on the provided static analysis. The absence of any identified attack surface entry points, dangerous functions, raw SQL queries, or unescaped output suggests a well-developed and secure codebase. The 100% usage of prepared statements for SQL and proper output escaping are excellent security practices. Furthermore, the lack of any historical vulnerabilities, including critical or high-severity ones, indicates a history of responsible development and maintenance. The presence of capability checks, even without explicit nonce checks on AJAX or REST API routes (which are absent), shows an understanding of WordPress security principles.

While the static analysis is highly positive, the complete absence of any identified taint flows and the limited number of analyzed flows (0) could be interpreted in two ways: either the code is exceptionally robust against taint, or the analysis tools were not able to fully explore the code's potential interactions. The total absence of AJAX handlers, REST API routes, shortcodes, cron events, and file operations significantly limits the potential attack vectors, contributing to its strong security. This plugin appears to be a secure option for its intended purpose, with no immediate security concerns identified from the provided data.

Vulnerabilities
None known

Disable Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable Users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninitinit.php:38
actionshow_user_profileinit.php:39
actionedit_user_profileinit.php:40
actionpersonal_options_updateinit.php:41
actionedit_user_profile_updateinit.php:42
actionwp_logininit.php:43
actionmanage_users_custom_columninit.php:44
actionadmin_footer-users.phpinit.php:45
filterlogin_messageinit.php:48
filtermanage_users_columnsinit.php:49
Maintenance & Trust

Disable Users Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedNov 28, 2017
PHP min version
Downloads40K

Community Trust

Rating94/100
Number of ratings18
Active installs2K
Developer Profile

Disable Users Developer Profile

Jared Atchison

8 plugins · 53K total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Disable Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/disable-users/css/style.css
Version Parameters
disable-users/style.css?ver=ja_disable_users

HTML / DOM Fingerprints

CSS Classes
column-ja_user_disabled
FAQ

Frequently Asked Questions about Disable Users