PhpSword Disable Comments Security & Risk Analysis

wordpress.org/plugins/phpsword-disable-comments

Disable Comments from your WordPress website.

500 active installs v1.1 PHP + WP 3.5+ Updated Jul 31, 2022
comment-plugincommentsdisable-commentsphpswordwordpress
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is PhpSword Disable Comments Safe to Use in 2026?

Generally Safe

Score 85/100

PhpSword Disable Comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "phpsword-disable-comments" v1.1 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any identified attack surface (AJAX, REST API, shortcodes, cron events) significantly reduces the potential for external exploitation. Furthermore, the code signals show no dangerous functions, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are all positive indicators of secure coding practices.

The primary area of concern lies within the output escaping. With only 29% of the 7 total outputs properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data or data processed by the plugin could potentially be injected with malicious scripts that would then be executed in the context of a logged-in user's browser. The lack of nonce and capability checks, while not directly exploitable due to the absence of an attack surface, indicates a potential weakness if the plugin were to be extended or its attack surface increased in the future.

The plugin's vulnerability history is completely clear, with no recorded CVEs. This, combined with the static analysis findings, suggests a well-maintained and relatively safe plugin. However, the limited output escaping remains a notable weakness that could be exploited if the plugin's functionality were to interact with user-controllable data in a way that leads to output. Overall, while the plugin benefits from a minimal attack surface and secure data handling for SQL, the prevalent risk of XSS due to insufficient output escaping warrants attention.

Key Concerns

  • Output escaping is poorly implemented
Vulnerabilities
None known

PhpSword Disable Comments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PhpSword Disable Comments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

PhpSword Disable Comments Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuindex.php:356
actionadmin_initindex.php:360
actionadmin_bar_menuindex.php:363
actionadmin_menuindex.php:364
actionadmin_menuindex.php:365
actionadmin_menuindex.php:366
actionget_headerindex.php:369
Maintenance & Trust

PhpSword Disable Comments Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedJul 31, 2022
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings2
Active installs500
Developer Profile

PhpSword Disable Comments Developer Profile

Pradnyankur Nikam

3 plugins · 910 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PhpSword Disable Comments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/phpsword-disable-comments/images/phpswcf.png

HTML / DOM Fingerprints

Data Attributes
id="wrap"id="PhpswDCForm"
FAQ

Frequently Asked Questions about PhpSword Disable Comments