Conditionnal Maintenance Mode for WordPress Security & Risk Analysis

wordpress.org/plugins/maintenance-mode-based-on-user-roles

This plugin allows the administrator to enable or disable maintenance mode for selected user roles and customize the maintenance message.

0 active installs v2.0.0 PHP + WP 4.0+ Updated Nov 26, 2025
custom-messagemaintenance-modeuser-roles
99
A · Safe
CVEs total1
Unpatched0
Last CVENov 24, 2025
Safety Verdict

Is Conditionnal Maintenance Mode for WordPress Safe to Use in 2026?

Generally Safe

Score 99/100

Conditionnal Maintenance Mode for WordPress has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Nov 24, 2025Updated 4mo ago
Risk Assessment

The 'maintenance-mode-based-on-user-roles' plugin v2.0.0 demonstrates a generally good security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points significantly reduces its attack surface. The code analysis also reveals positive indicators such as 100% of SQL queries using prepared statements, a high rate of output escaping (90%), and the presence of nonce and capability checks. Taint analysis showing zero flows with unsanitized paths is also a strong positive sign.

However, a historical vulnerability is a notable concern. The plugin has a total of 1 known CVE, which, while currently unpatched, was in the medium severity category. The fact that it's listed as a past vulnerability does not eliminate the risk if the plugin has not been updated since its last recorded issue. The specific type of past vulnerability being CSRF is something to be mindful of, though the current analysis doesn't reveal any immediate CSRF risks in the code itself. The lack of critical or high-severity historical issues is a positive indicator, suggesting that past issues were addressed or were not severe.

In conclusion, the plugin shows strong adherence to many security best practices, particularly in its limited attack surface and secure coding practices for SQL and output handling. The primary weakness lies in the historical vulnerability, which warrants attention to ensure the current version has addressed this or similar risks. The plugin's strengths outweigh its weaknesses, but proactive monitoring of its vulnerability history is recommended.

Key Concerns

  • Historical medium severity CVE
Vulnerabilities
1

Conditionnal Maintenance Mode for WordPress Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-12586medium · 4.3Cross-Site Request Forgery (CSRF)

Conditional Maintenance Mode for WordPress <= 1.0.0 - Cross-Site Request Forgery

Nov 24, 2025 Patched in 2.0.0 (8d)
Code Analysis
Analyzed Mar 17, 2026

Conditionnal Maintenance Mode for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
19 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

90% escaped21 total outputs
Attack Surface

Conditionnal Maintenance Mode for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwp_dashboard_setupMaintenance_mode.php:32
actionadmin_menuMaintenance_mode.php:34
actionadmin_initMaintenance_mode.php:61
actionadmin_noticesMaintenance_mode.php:98
actiontemplate_redirectMaintenance_mode.php:170
actionadmin_bar_menuMaintenance_mode.php:242
actioninitMaintenance_mode.php:245
Maintenance & Trust

Conditionnal Maintenance Mode for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 26, 2025
PHP min version
Downloads907

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Conditionnal Maintenance Mode for WordPress Developer Profile

Walid Sadfi

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Conditionnal Maintenance Mode for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/maintenance-mode-based-on-user-roles/styles_admin.css

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="mm_settings[status]"name="mm_settings[roles][]"name="mm_settings[mode_type]"name="mm_settings[message]"name="mm_settings[page]"
FAQ

Frequently Asked Questions about Conditionnal Maintenance Mode for WordPress