Disallow Pwned Password Security & Risk Analysis

wordpress.org/plugins/disallow-pwned-passwords

Disallow WordPress and WooCommerce users using pwned passwords.

10 active installs v0.3.2 PHP 7.0+ WP 4.9.8+ Updated Feb 19, 2019
authenticationhave-i-been-pwnedhibppasswordsecurity
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disallow Pwned Password Safe to Use in 2026?

Generally Safe

Score 85/100

Disallow Pwned Password has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'disallow-pwned-passwords' plugin v0.3.2 exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface points, dangerous functions, unsanitized taint flows, or logged vulnerabilities suggests a development process that prioritizes security best practices. The plugin demonstrates adherence to secure coding by exclusively using prepared statements for SQL queries, properly escaping all output, and performing no file operations. The single external HTTP request is a point to note, but without further context on its purpose, it's difficult to assess its inherent risk. The lack of any recorded CVEs, especially critical or high severity ones, further reinforces its current secure state. While the plugin shows considerable strengths, the absence of nonce and capability checks, while not currently leading to exploitable issues due to the lack of entry points, is a potential area for future concern should the plugin's functionality evolve to include user-interactive endpoints. Overall, this plugin is currently assessed as highly secure, with its primary potential weakness being the lack of explicit security checks on the single external HTTP request and a general absence of authorization mechanisms that would be crucial if the attack surface were to expand.

Key Concerns

  • No capability checks implemented
  • No nonce checks implemented
  • External HTTP request without context
Vulnerabilities
None known

Disallow Pwned Password Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Disallow Pwned Password Release Timeline

v0.3.2Current
v0.3.1
v0.3.0
Code Analysis
Analyzed Apr 16, 2026

Disallow Pwned Password Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Disallow Pwned Password Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedsrc/Plugin.php:45
actionplugins_loadedsrc/Plugin.php:50
Maintenance & Trust

Disallow Pwned Password Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedFeb 19, 2019
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Disallow Pwned Password Developer Profile

Itineris Limited

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Disallow Pwned Password

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disallow Pwned Password