Disable WordPress "Gutenberg" Update Security & Risk Analysis

wordpress.org/plugins/disable-wp-5x-update-nag

Disable the update to Wordpress 5.X (Gutenberg), while keeping the possibility of automatic updates and lower than 5.X.

10 active installs v1.0.1 PHP + WP 3.0+ Updated Feb 16, 2019
autoupdatergutenbergupdate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable WordPress "Gutenberg" Update Safe to Use in 2026?

Generally Safe

Score 85/100

Disable WordPress "Gutenberg" Update has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin 'disable-wp-5x-update-nag' v1.0.1 exhibits a strong security posture based on the provided static analysis. It demonstrates excellent coding practices with no identified dangerous functions, all SQL queries utilizing prepared statements, and 100% properly escaped output. Furthermore, the absence of file operations, external HTTP requests, and taint analysis findings with unsanitized paths indicates a robust approach to preventing common web vulnerabilities. The plugin also shows no known historical CVEs, suggesting a consistent track record of security.

While the plugin's core functionality appears secure, a notable concern is the complete lack of any security checks, including nonce or capability checks, across all entry points. Although the static analysis indicates zero entry points in this specific scan, a plugin's architecture can evolve. If any future entry points (AJAX, REST API, shortcodes, cron events) are introduced, they would be entirely unprotected, presenting a significant risk. The absence of these fundamental WordPress security mechanisms is a potential weakness that could be exploited if the attack surface were to expand or if specific interaction methods were leveraged without proper authentication and authorization.

In conclusion, 'disable-wp-5x-update-nag' v1.0.1 is commendably built with secure coding practices for the analyzed code. However, the complete absence of any authorization or nonce checks across its entry points, even if currently minimal, represents a fundamental security gap that warrants attention. This could leave the plugin vulnerable to unauthorized actions if its interaction points are expanded or exploited in ways not immediately apparent from the static analysis.

Key Concerns

  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Disable WordPress "Gutenberg" Update Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Disable WordPress "Gutenberg" Update Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable WordPress "Gutenberg" Update Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtersite_transient_update_coredisable-wp-5x-update-nag.php:29
actionadmin_initdisable-wp-5x-update-nag.php:62
Maintenance & Trust

Disable WordPress "Gutenberg" Update Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 16, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Disable WordPress "Gutenberg" Update Developer Profile

RVOLA

3 plugins · 7K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
279 days
View full developer profile
Detection Fingerprints

How We Detect Disable WordPress "Gutenberg" Update

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable WordPress "Gutenberg" Update