Wp Restricted Security & Risk Analysis

wordpress.org/plugins/wp-restricted

wp admin ban for all ip except one ip .

40 active installs v0.2 PHP + WP 4.3+ Updated Jan 5, 2019
all-ip-restrictedbanbanneddeniedpermission
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wp Restricted Safe to Use in 2026?

Generally Safe

Score 85/100

Wp Restricted has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "wp-restricted" v0.2 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by having no known CVEs and no recorded vulnerabilities, suggesting a history of secure development or thorough vetting. The static analysis also shows no dangerous functions, external HTTP requests, file operations, or SQL injection vulnerabilities due to the exclusive use of prepared statements. However, significant concerns arise from the complete lack of output escaping and the presence of two taint flows with unsanitized paths. While the taint analysis did not flag critical or high severity issues, the mere existence of unsanitized paths is a notable risk, as it indicates potential avenues for malicious data to reach sensitive functions or be displayed without proper sanitization.

Furthermore, the plugin has a zero attack surface for entry points like AJAX, REST API, shortcodes, and cron events, which is a strength. However, this is overshadowed by the complete absence of capability checks and nonce checks across all code signals. This indicates a significant blind spot in authorization and protection against CSRF attacks. The lack of output escaping, in particular, leaves the plugin vulnerable to cross-site scripting (XSS) attacks, where unsanitized user input, even if not immediately leading to critical taint issues, could be injected into the output of the plugin's functionality.

In conclusion, while "wp-restricted" v0.2 boasts a clean vulnerability history and avoids common dangerous code patterns like raw SQL queries and external requests, its security is severely undermined by a complete lack of output escaping and authorization checks. The two unsanitized path taint flows, coupled with the absence of nonce checks, present a considerable risk of XSS and potential unauthorized actions. The plugin's strengths in SQL handling and lack of CVEs are overshadowed by these critical security oversights.

Key Concerns

  • Unescaped output across all signals
  • Taint flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Wp Restricted Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Wp Restricted Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Wp Restricted Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wpr_restricted_manage_fun (wp-restricted.php:30)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Wp Restricted Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitwp-restricted.php:12
actionadmin_menuwp-restricted.php:22
Maintenance & Trust

Wp Restricted Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 5, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Wp Restricted Developer Profile

Navdeep

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wp Restricted

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
window.location
FAQ

Frequently Asked Questions about Wp Restricted