Disable XML-RPC Security & Risk Analysis

wordpress.org/plugins/disable-xml-rpc

Disables the XML-RPC API in WordPress 3.5+, which is enabled by default.

200K active installs v1.0.1 PHP + WP 3.5+ Updated Dec 3, 2025
xmlrpc
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable XML-RPC Safe to Use in 2026?

Generally Safe

Score 100/100

Disable XML-RPC has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "disable-xml-rpc" plugin v1.0.1 demonstrates an excellent security posture based on the provided static analysis. The plugin has zero identified entry points for attack, no dangerous functions, no raw SQL queries, and all outputs are properly escaped. Furthermore, there are no file operations, external HTTP requests, or bundled libraries that could introduce vulnerabilities. The absence of taint analysis findings reinforces this positive assessment.

The vulnerability history is also clean, with no known CVEs recorded for this plugin. This suggests a history of secure development practices and potentially active maintenance and patching if issues were ever discovered. The lack of common vulnerability types further supports the idea that the developers are adhering to secure coding principles.

Overall, this plugin appears to be highly secure. The only potential area for consideration, though not a direct finding in this analysis, is the complete lack of capability checks and nonce checks. While this is not a concern for a plugin designed to *disable* a feature and therefore has no user-facing functionality or data manipulation, it's a good general practice to be aware of. However, based strictly on the provided data, the risk assessment for this plugin is very low.

Vulnerabilities
None known

Disable XML-RPC Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Disable XML-RPC Release Timeline

v1.0.1Current
v1.0
Code Analysis
Analyzed Mar 16, 2026

Disable XML-RPC Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable XML-RPC Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterxmlrpc_enableddisable-xml-rpc.php:29
Maintenance & Trust

Disable XML-RPC Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version
Downloads617K

Community Trust

Rating86/100
Number of ratings29
Active installs200K
Developer Profile

Disable XML-RPC Developer Profile

Phil Erb

1 plugin · 200K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Disable XML-RPC

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable XML-RPC