
Wp Restricted Security & Risk Analysis
wordpress.org/plugins/wp-restrictedwp admin ban for all ip except one ip .
Is Wp Restricted Safe to Use in 2026?
Generally Safe
Score 85/100Wp Restricted has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-restricted" v0.2 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by having no known CVEs and no recorded vulnerabilities, suggesting a history of secure development or thorough vetting. The static analysis also shows no dangerous functions, external HTTP requests, file operations, or SQL injection vulnerabilities due to the exclusive use of prepared statements. However, significant concerns arise from the complete lack of output escaping and the presence of two taint flows with unsanitized paths. While the taint analysis did not flag critical or high severity issues, the mere existence of unsanitized paths is a notable risk, as it indicates potential avenues for malicious data to reach sensitive functions or be displayed without proper sanitization.
Furthermore, the plugin has a zero attack surface for entry points like AJAX, REST API, shortcodes, and cron events, which is a strength. However, this is overshadowed by the complete absence of capability checks and nonce checks across all code signals. This indicates a significant blind spot in authorization and protection against CSRF attacks. The lack of output escaping, in particular, leaves the plugin vulnerable to cross-site scripting (XSS) attacks, where unsanitized user input, even if not immediately leading to critical taint issues, could be injected into the output of the plugin's functionality.
In conclusion, while "wp-restricted" v0.2 boasts a clean vulnerability history and avoids common dangerous code patterns like raw SQL queries and external requests, its security is severely undermined by a complete lack of output escaping and authorization checks. The two unsanitized path taint flows, coupled with the absence of nonce checks, present a considerable risk of XSS and potential unauthorized actions. The plugin's strengths in SQL handling and lack of CVEs are overshadowed by these critical security oversights.
Key Concerns
- Unescaped output across all signals
- Taint flows with unsanitized paths
- Missing nonce checks
- Missing capability checks
Wp Restricted Security Vulnerabilities
Wp Restricted Release Timeline
Wp Restricted Code Analysis
Output Escaping
Data Flow Analysis
Wp Restricted Attack Surface
WordPress Hooks 2
Maintenance & Trust
Wp Restricted Maintenance & Trust
Maintenance Signals
Community Trust
Wp Restricted Alternatives
WP-Ban
wp-ban
Ban users by IP, IP Range, host name, user agent and referrer url from visiting your WordPress's blog.
Yaurau-Ip-Blocker
yaurau-ip-blocker
The plugin blocks IP-addresses on the entered IP-address, and temporarily blocks IP-addresses when exceeding the limit enter login and password and di …
BuddyPress Restrict Email Domains
buddypress-restrict-email-domains
This plugin enables restriction of email domains during user registration for a single (non-multisite) WordPress installation of BuddyPress
Notifier and IP Blocker
notifier-and-ip-blocker
Notify a user about when he sent comment or form via Contact Form 7 and automatically blocked spammer IP by notifier users.
CookieYes – Cookie Banner for Cookie Consent (Easy to setup GDPR/CCPA Compliant Cookie Notice)
cookie-law-info
Easily set up cookie banner or notice in WordPress, and policy pages for compliance with global cookie laws (GDPR, DSGVO, RGPD, CCPA/CPRA, etc).
Wp Restricted Developer Profile
1 plugin · 40 total installs
How We Detect Wp Restricted
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
window.location