Disable XMLRPC Methods Security & Risk Analysis

wordpress.org/plugins/disable-xml-rpc-methods

this plugin allows you to only enable/disable the specific XML-RPC methods you need.

10 active installs v1.0 PHP + WP + Updated Mar 30, 2011
disablexml-rpc-methods
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable XMLRPC Methods Safe to Use in 2026?

Generally Safe

Score 85/100

Disable XMLRPC Methods has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "disable-xml-rpc-methods" plugin v1.0 demonstrates a generally strong security posture by avoiding common attack vectors. The static analysis reveals no exposed AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero-total attack surface and zero unprotected entry points. Furthermore, the plugin utilizes prepared statements for all its SQL queries and has no file operations or external HTTP requests, which are all positive security indicators. The presence of a nonce check also suggests an attempt to mitigate CSRF vulnerabilities.

However, a significant concern arises from the output escaping analysis, where 100% of the eight total outputs are not properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis also identified one flow with an unsanitized path, which, while not classified as critical or high severity in this report, warrants attention as it could potentially be exploited. The plugin's vulnerability history is clean, with no recorded CVEs, suggesting a history of good security practices or limited exposure. Despite the lack of historical vulnerabilities and a minimal attack surface, the unescaped output is a critical weakness that must be addressed.

Key Concerns

  • All outputs are unescaped
  • Flow with unsanitized path
Vulnerabilities
None known

Disable XMLRPC Methods Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Disable XMLRPC Methods Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
dsxmlrpc_options_page (disable-xmlrpc-methods.php:73)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Disable XMLRPC Methods Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterplugin_action_linksdisable-xmlrpc-methods.php:22
filterxmlrpc_methodsdisable-xmlrpc-methods.php:24
actionadmin_initdisable-xmlrpc-methods.php:28
actionadmin_menudisable-xmlrpc-methods.php:30
Maintenance & Trust

Disable XMLRPC Methods Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMar 30, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Disable XMLRPC Methods Developer Profile

Leon

2 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Disable XMLRPC Methods

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/disable-xml-rpc-methods/css/style.css
Script Paths
/wp-content/plugins/disable-xml-rpc-methods/js/scripts.js
Version Parameters
disable-xml-rpc-methods/css/style.css?ver=disable-xml-rpc-methods/js/scripts.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Security check. Not authorized to enable/disable XML-RPC! -->
Data Attributes
name="dsxmlrpcData[id="dsxmlrpcData[
JS Globals
dsxmlrpccheckAlluncheckAll
FAQ

Frequently Asked Questions about Disable XMLRPC Methods