FeedDisabler Plugin Security & Risk Analysis

wordpress.org/plugins/feed-disabler

Disables all feeds (rdf, rss, rss2, atom).

40 active installs v0.5 PHP + WP 2.6+ Updated Sep 9, 2008
atomfeedrdfrssrss2
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FeedDisabler Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

FeedDisabler Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The "feed-disabler" plugin version 0.5 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is commendable. Furthermore, the plugin has no known vulnerabilities, CVEs, or recorded historical issues, which is a significant positive indicator. The static analysis also reports zero attack surface points (AJAX, REST API, shortcodes, cron events) and zero taint flows, suggesting a well-contained and secure codebase with no obvious pathways for malicious input to exploit the system.

However, the complete lack of nonce and capability checks, combined with zero identified entry points and zero total flows analyzed in taint analysis, presents a peculiar situation. While a zero attack surface is ideal, it's unusual for a plugin to have absolutely no interactive components or data processing that would require such checks. This could indicate either an extremely simple plugin with minimal functionality that doesn't necessitate these security measures, or it could suggest that the analysis might have missed potential interaction points or that the plugin's intended functionality is so limited that it doesn't trigger common security analysis heuristics. Without further context on the plugin's purpose and actual code, it's difficult to definitively assess the risk associated with these missing checks. Nonetheless, the current data points towards a very low risk profile, largely due to the absence of known issues and the clean static analysis report. The primary area of potential, albeit unproven, concern lies in the complete absence of certain security mechanisms which might be due to a lack of complex functionality rather than deliberate omission of necessary checks.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

FeedDisabler Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FeedDisabler Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

FeedDisabler Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actiondo_feedfeeddisabler.php:14
actiondo_feed_rdffeeddisabler.php:15
actiondo_feed_rssfeeddisabler.php:16
actiondo_feed_rss2feeddisabler.php:17
actiondo_feed_atomfeeddisabler.php:18
Maintenance & Trust

FeedDisabler Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested2.6
Last updatedSep 9, 2008
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

FeedDisabler Plugin Developer Profile

tcloninger

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FeedDisabler Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about FeedDisabler Plugin