Forbidden Author Words Security & Risk Analysis

wordpress.org/plugins/forbidden-author-words

Use this plugin to restrict Authors to use of some words that should not used.

10 active installs v2.0.0 PHP + WP 5.0+ Updated Jan 5, 2021
forbidden-author-wordspost-title-reviewrestrict-post-contentrestrict-post-titlerestrict-words-in-post-titles
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Forbidden Author Words Safe to Use in 2026?

Generally Safe

Score 85/100

Forbidden Author Words has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'forbidden-author-words' v2.0.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, dangerous functions, unsanitized taint flows, raw SQL queries, or unescaped output signals diligent development practices. The plugin also has no recorded vulnerability history, which further reinforces its apparent security. The single capability check indicates that at least some administrative control is likely enforced for any relevant functionality, which is a positive sign. However, the lack of nonce checks on AJAX handlers and the absence of REST API routes are notable omissions. While the current analysis shows zero unprotected entry points, this could change if the plugin were to evolve and introduce new functionalities that utilize these often-exploited mechanisms without proper security. The vulnerability history is clean, but this could also be attributed to a small user base or a lack of targeted analysis rather than inherent invulnerability. Overall, the plugin appears secure for its current functionality, but developers should remain vigilant about implementing proper security measures like nonce checks if the plugin's scope expands.

Key Concerns

  • No nonce checks on AJAX handlers
  • No REST API routes with permission callbacks
Vulnerabilities
None known

Forbidden Author Words Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Forbidden Author Words Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Forbidden Author Words Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuclasses\class.forbidden.words.php:12
actionadmin_initclasses\class.forbidden.words.php:13
actiontransition_post_statusclasses\class.forbidden.words.php:14
actionadmin_noticesclasses\class.forbidden.words.php:15
Maintenance & Trust

Forbidden Author Words Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedJan 5, 2021
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Forbidden Author Words Alternatives

No alternatives data available yet.

Developer Profile

Forbidden Author Words Developer Profile

Yogesh Pawar

11 plugins · 600 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Forbidden Author Words

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/forbidden-author-words/js/forbidden-author-words.js
Script Paths
/wp-content/plugins/forbidden-author-words/js/forbidden-author-words.js
Version Parameters
forbidden-author-words/js/forbidden-author-words.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Forbidden Author Words