DisableMU Security & Risk Analysis

wordpress.org/plugins/disablemu

Redefines the location of the /mu-plugins directory to ensure that no code published to the default location will automatically run on your website.

10 active installs v1.1 PHP + WP 3.0.1+ Updated Feb 9, 2016
adminmu-pluginssecurity
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DisableMU Safe to Use in 2026?

Generally Safe

Score 85/100

DisableMU has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "disablemu" plugin v1.1 exhibits a strong security posture. The absence of any identified dangerous functions, unsanitized taint flows, raw SQL queries, or unescaped output is highly positive. The plugin also demonstrates good practices by avoiding external HTTP requests and not bundling libraries, which can introduce their own vulnerabilities. Furthermore, the complete lack of known CVEs and a clean vulnerability history suggest a well-maintained and secure codebase over time.

However, a significant concern arises from the lack of any detected nonce checks or capability checks across all identified entry points. While the attack surface is currently zero, if any future functionality were to be introduced that interacts with the WordPress core or user data, the absence of these critical security measures would leave the plugin highly vulnerable to unauthorized actions and potential security breaches. The plugin's reliance on its current minimal attack surface to maintain security, without implementing standard WordPress security checks, presents a potential future risk.

In conclusion, the plugin is currently secure due to its minimal functionality and lack of exploitable code patterns. Its historical security record is excellent. The primary weakness lies in the complete omission of nonce and capability checks, which is a fundamental WordPress security best practice. This oversight, while not currently leading to exploitable vulnerabilities, represents a significant technical debt and a potential future security risk should the plugin's functionality expand.

Key Concerns

  • No Nonce Checks
  • No Capability Checks
Vulnerabilities
None known

DisableMU Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

DisableMU Release Timeline

v1.1Current
v1.0
Code Analysis
Analyzed Mar 16, 2026

DisableMU Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0
Attack Surface

DisableMU Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

DisableMU Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedFeb 9, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

DisableMU Developer Profile

Dave McHale

5 plugins · 90K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DisableMU

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Definitions by DisableMU plugin --><!-- END Definitions by DisableMU plugin -->
FAQ

Frequently Asked Questions about DisableMU