A Year Before Security & Risk Analysis

wordpress.org/plugins/a-year-before

"A Year Before" shows a list of articles, which were written a certain time ago. So you can show in a history, what happend in your blog in …

50 active installs v1.0.3 PHP + WP 2.8.0+ Updated May 19, 2019
datehistorypoststimewidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is A Year Before Safe to Use in 2026?

Generally Safe

Score 85/100

A Year Before has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The plugin 'a-year-before' v1.0.3 exhibits a mixed security posture. On one hand, the absence of known vulnerabilities and CVEs, along with the proper use of prepared statements for SQL queries, suggests a degree of attention to common security pitfalls. The static analysis also indicates no obvious external HTTP requests or file operations, which are often vectors for compromise.

However, significant concerns arise from the code signals. The presence of the 'create_function' dangerous function is a critical red flag, as it can lead to arbitrary code execution if not handled with extreme care, although the static analysis did not reveal any direct taint flows originating from it. Furthermore, a very low percentage of output escaping (6%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce checks and capability checks on entry points (even though the attack surface is reported as zero) leaves potential for future vulnerabilities if the attack surface grows without proper security measures being implemented.

Given the lack of reported vulnerabilities historically, it's possible that the dangerous function is not being exploited, and the XSS issues are either not triggered or have not been discovered. Nevertheless, the identified code weaknesses represent substantial potential risks. The plugin's strengths lie in its SQL handling and lack of historical exploits, while its weaknesses are concentrated in output escaping and the use of dangerous functions.

Key Concerns

  • Low output escaping percentage
  • Use of dangerous function 'create_function'
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

A Year Before Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

A Year Before Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
1 prepared
Unescaped Output
17
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("ayb_posts_class");'));ayb_posts.php:373

SQL Query Safety

100% prepared1 total queries

Output Escaping

6% escaped18 total outputs
Attack Surface

A Year Before Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterplugin_row_metaayb_posts.php:41
actionwidgets_initayb_posts.php:373
Maintenance & Trust

A Year Before Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMay 19, 2019
PHP min version
Downloads18K

Community Trust

Rating84/100
Number of ratings5
Active installs50
Developer Profile

A Year Before Developer Profile

Ralf

1 plugin · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect A Year Before

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/a-year-before/a-year-before.php/wp-content/plugins/a-year-before/ayb-posts.php

HTML / DOM Fingerprints

CSS Classes
ayb_posts
FAQ

Frequently Asked Questions about A Year Before