Restrict Password Changes – MultiSite Security & Risk Analysis

wordpress.org/plugins/restrict-password-changes-multisite

Restricts multisite password changes to super admins only.

10 active installs v0.1 PHP + WP 3.0+ Updated Jan 25, 2011
change-passwordmultisitepasswordrestrict
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Restrict Password Changes – MultiSite Safe to Use in 2026?

Generally Safe

Score 85/100

Restrict Password Changes – MultiSite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The static analysis of the "restrict-password-changes-multisite" v0.1 plugin reveals an exceptionally clean codebase from a security perspective. There are no identified attack vectors through AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code demonstrates excellent security practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and properly escaping all output. No file operations or external HTTP requests are made, and importantly, there are no detected taint flows, indicating that user-supplied data is not being mishandled in a way that could lead to vulnerabilities. The plugin also has no recorded vulnerability history, with zero known CVEs. This combination of a minimal attack surface, robust coding practices, and a clean history suggests a very low immediate risk. However, the lack of any capability checks or nonce checks on potential entry points (though there are currently none detected) could become a concern if the plugin's functionality were to expand in the future without these safeguards being implemented. The version number, 0.1, also implies it is an early release, which often means it has not undergone extensive security auditing or real-world stress testing.

Vulnerabilities
None known

Restrict Password Changes – MultiSite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Restrict Password Changes – MultiSite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Restrict Password Changes – MultiSite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
filtergettexttr_restrict_password_changes.php:70
filtershow_password_fieldstr_restrict_password_changes.php:78
actionedit_user_profile_updatetr_restrict_password_changes.php:79
actionpersonal_options_updatetr_restrict_password_changes.php:80
filterallow_password_resettr_restrict_password_changes.php:81
actionlogin_headtr_restrict_password_changes.php:82
filterlogin_errorstr_restrict_password_changes.php:83
Maintenance & Trust

Restrict Password Changes – MultiSite Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJan 25, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Restrict Password Changes – MultiSite Developer Profile

Ryan Willis

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Restrict Password Changes – MultiSite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
License: GPL Restrict Password Changes (MultiSite) - Restricts password changes or resets to super administrators +20 more
FAQ

Frequently Asked Questions about Restrict Password Changes – MultiSite