Generate Disable Mobile Security & Risk Analysis

wordpress.org/plugins/generate-disable-mobile

Disable mobile functionality in GeneratePress

100 active installs v0.1 PHP + WP 4.0+ Updated May 23, 2015
disable-mobilegeneratepress
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Generate Disable Mobile Safe to Use in 2026?

Generally Safe

Score 85/100

Generate Disable Mobile has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "generate-disable-mobile" v0.1 plugin exhibits a generally strong security posture based on the provided static analysis. There are no identified attack surface entry points, no dangerous functions used, and all SQL queries, although present, are properly prepared. Furthermore, the absence of known CVEs and a clean vulnerability history is highly positive, suggesting either diligent development practices or a lack of significant testing and public exposure.

However, a significant concern arises from the code analysis indicating that 100% of the single output found is not properly escaped. This presents a potential cross-site scripting (XSS) vulnerability if the output contains user-controlled data. The lack of any capability checks or nonce checks, while not directly exploitable due to the absence of unprotected entry points, suggests a potential weakness if future versions introduce new functionalities that create an attack surface without adequate security measures.

In conclusion, while the plugin currently appears to be secure due to its limited scope and lack of known vulnerabilities, the unescaped output is a critical oversight that needs immediate attention. The absence of any recorded vulnerabilities could also indicate a lack of rigorous security auditing, and the plugin's minimal feature set currently masks potential weaknesses in its security implementation.

Key Concerns

  • Unescaped output found
Vulnerabilities
None known

Generate Disable Mobile Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Generate Disable Mobile Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Generate Disable Mobile Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_enqueue_scriptsgenerate-disable-mobile.php:18
actionafter_setup_themegenerate-disable-mobile.php:60
actionwp_headgenerate-disable-mobile.php:72
Maintenance & Trust

Generate Disable Mobile Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 23, 2015
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Generate Disable Mobile Developer Profile

Tom

9 plugins · 890K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
166 days
View full developer profile
Detection Fingerprints

How We Detect Generate Disable Mobile

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/generate-disable-mobile/css/unsemantic-grid-no-mobile.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Generate Disable Mobile