Disable User Login Security & Risk Analysis

wordpress.org/plugins/wp-users-disable

The plug-in lists out all the existing users’ accounts and gives the ability to admin to disable specific user accounts via email address.

500 active installs v1.0.2 PHP + WP 4.0.0+ Updated Dec 2, 2024
disable-userwp-admin-disablewp-login-disable
71
B · Generally Safe
CVEs total1
Unpatched1
Last CVESep 14, 2022
Safety Verdict

Is Disable User Login Safe to Use in 2026?

Mostly Safe

Score 71/100

Disable User Login is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Sep 14, 2022Updated 1yr ago
Risk Assessment

The "wp-users-disable" v1.0.2 plugin exhibits a mixed security posture. On the positive side, static analysis reveals a strong adherence to secure coding practices regarding output escaping, with 100% of outputs being properly escaped. Additionally, the absence of dangerous functions, file operations, and external HTTP requests is commendable. The plugin also shows some awareness of security by including nonce checks and bundling a commonly used library like Select2.

However, significant concerns arise from the vulnerability history. The presence of one unpatched medium severity CVE, specifically related to Missing Authorization, is a critical red flag. This indicates a past flaw that has not been remediated, leaving users exposed to known attack vectors. Furthermore, while the static analysis shows no direct unprotected AJAX handlers or REST API routes, the lack of capability checks on the AJAX handlers is a potential weakness. This suggests that although nonces might be present, the authorization logic itself might be insufficient, potentially allowing lower-privileged users to perform actions they shouldn't if the nonces are compromised or bypassed.

In conclusion, the plugin has some good security fundamentals in place, particularly in output handling. However, the unpatched medium severity vulnerability and the absence of capability checks on AJAX handlers are substantial weaknesses that overshadow these strengths. The history of Missing Authorization vulnerabilities is particularly worrying and requires immediate attention to ensure user data and site integrity.

Key Concerns

  • Unpatched medium severity CVE
  • Missing capability checks on AJAX handlers
Vulnerabilities
1

Disable User Login Security Vulnerabilities

CVEs by Year

1 CVE in 2022 · unpatched
2022
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2022-2350medium · 5.3Missing Authorization

Disable User Login <= 1.0.1 - Missing Authorization to Unauthenticated Settings Update

Sep 14, 2022Unpatched
Code Analysis
Analyzed Mar 17, 2026

Disable User Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
3 prepared
Unescaped Output
0
49 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

43% prepared7 total queries

Output Escaping

100% escaped49 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
dwul_enable_user_email (class-dwul-user-register-ajax-callback.php:197)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Disable User Login Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_dwul_action_callbackclass-dwul-user-register-ajax-callback.php:22
noprivwp_ajax_dwul_action_callbackclass-dwul-user-register-ajax-callback.php:23
authwp_ajax_dwul_enable_user_emailclass-dwul-user-register-ajax-callback.php:24
noprivwp_ajax_dwul_enable_user_emailclass-dwul-user-register-ajax-callback.php:25
WordPress Hooks 5
actionadmin_enqueue_scriptsclass-dwul-user-register-ajax-callback.php:26
actionwp_loginclass-dwul-user-register-ajax-callback.php:27
filterlogin_messageclass-dwul-user-register-ajax-callback.php:28
actionadmin_menuclass-dwul-user-register-block.php:21
filterplugin_action_linksinit-field.php:46
Maintenance & Trust

Disable User Login Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 2, 2024
PHP min version
Downloads11K

Community Trust

Rating96/100
Number of ratings6
Active installs500
Developer Profile

Disable User Login Developer Profile

brainvireinfo

14 plugins · 7K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
14 days
View full developer profile
Detection Fingerprints

How We Detect Disable User Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-users-disable/assets/css/admin-user-disable.css/wp-content/plugins/wp-users-disable/assets/css/select2.min.css/wp-content/plugins/wp-users-disable/assets/js/select2.min.js/wp-content/plugins/wp-users-disable/assets/js/admin-user-disable.js
Script Paths
/wp-content/plugins/wp-users-disable/assets/js/admin-user-disable.js
Version Parameters
wp-users-disable/assets/css/admin-user-disable.css?ver=wp-users-disable/assets/css/select2.min.css?ver=wp-users-disable/assets/js/select2.min.js?ver=wp-users-disable/assets/js/admin-user-disable.js?ver=

HTML / DOM Fingerprints

JS Globals
backend_custom_object
FAQ

Frequently Asked Questions about Disable User Login