FS Disable Users Security & Risk Analysis

wordpress.org/plugins/fs-disable-users

Disable selected users from various site activities including preventing them from logging in, resetting passwords, and creating application passwords …

50 active installs v1.1.1 PHP 7.3+ WP 5.6+ Updated Apr 2, 2023
user
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FS Disable Users Safe to Use in 2026?

Generally Safe

Score 85/100

FS Disable Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "fs-disable-users" v1.1.1 plugin exhibits a strong security posture based on the provided static analysis. It demonstrates excellent practices by having zero unprotected entry points, including AJAX handlers, REST API routes, shortcodes, and cron events. Furthermore, the code signals indicate a lack of dangerous functions, all SQL queries are properly prepared, and all output is correctly escaped, which significantly reduces the risk of common web vulnerabilities like SQL injection and XSS. The presence of nonce and capability checks further reinforces its security measures.

The taint analysis shows zero flows with unsanitized paths, indicating no apparent vulnerabilities related to data handling from untrusted sources. The plugin's vulnerability history is clean, with no recorded CVEs. This clean history, combined with the robust static analysis findings, suggests a well-developed and securely coded plugin.

Overall, the plugin appears to be secure and well-maintained. The complete absence of identified vulnerabilities and the strong adherence to secure coding practices in the static analysis are positive indicators. There are no immediate security concerns identified from the provided data.

Vulnerabilities
None known

FS Disable Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

FS Disable Users Release Timeline

v1.1.1Current
v1.1.0
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

FS Disable Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
8 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped8 total outputs
Attack Surface

FS Disable Users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_enqueue_scriptssrc\WP\Asset.php:11
filterauthenticatesrc\WP\Auth.php:14
filterallow_password_resetsrc\WP\Auth.php:15
filterwp_is_application_passwords_available_for_usersrc\WP\Auth.php:16
filterwp_stream_connectorssrc\WP\Stream\Stream.php:12
filteruser_row_actionssrc\WP\User.php:19
filterbulk_actions-userssrc\WP\User.php:20
filterhandle_bulk_actions-userssrc\WP\User.php:21
actionadmin_noticessrc\WP\User.php:22
actionpersonal_optionssrc\WP\User.php:25
Maintenance & Trust

FS Disable Users Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedApr 2, 2023
PHP min version7.3
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

FS Disable Users Developer Profile

Firdaus Zahari

4 plugins · 110 total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect FS Disable Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fs-disable-users/assets/dist/css/admin.css
Version Parameters
fs-disable-users/assets/dist/css/admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
fsdu-admin-wrap
FAQ

Frequently Asked Questions about FS Disable Users