Archives by Category and Date Security & Risk Analysis

wordpress.org/plugins/archives-by-category-and-date

This plugin shows archives in a categorized way that is archives are categorized under category name and date.

90 active installs v1.0.4 PHP 5.6+ WP 3.5+ Updated Jul 3, 2023
archivescategorydatefilter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Archives by Category and Date Safe to Use in 2026?

Generally Safe

Score 85/100

Archives by Category and Date has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "archives-by-category-and-date" v1.0.4 plugin demonstrates a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis shows no dangerous functions, no unescaped file operations, no external HTTP requests, and critically, no raw SQL queries – all queries utilize prepared statements. This adherence to secure coding practices is commendable and indicates a proactive approach to security by the developers.

However, the analysis does reveal some areas for improvement. While the number of output escapes is relatively low (18 total), a significant portion (22%) are not properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if the unescaped output is rendered in the browser, especially if the input is user-controllable. The lack of nonce checks and capability checks, while not directly indicating a vulnerability in the absence of entry points, suggests a potential weakness if new entry points are added in future versions without corresponding security measures. The vulnerability history is a blank slate, with zero known CVEs, which is an excellent indicator of a well-maintained and secure plugin over time.

In conclusion, the plugin's strengths lie in its minimal attack surface and its secure handling of database operations. The primary concern is the unescaped output, which represents a potential XSS risk. The absence of any historical vulnerabilities is a significant positive, but the lack of robust authorization checks on the few existing code signals could be a future concern. Overall, the plugin is likely safe to use for its current functionality, but the unescaped output warrants attention.

Key Concerns

  • Unescaped output found
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Archives by Category and Date Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Archives by Category and Date Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
14 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

78% escaped18 total outputs
Attack Surface

Archives by Category and Date Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_enqueue_scriptsarchives-category-date.php:40
actionpre_get_postsarchives-category-date.php:112
actionwidgets_initwidget\acd-widget.php:140
Maintenance & Trust

Archives by Category and Date Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedJul 3, 2023
PHP min version5.6
Downloads5K

Community Trust

Rating50/100
Number of ratings2
Active installs90
Developer Profile

Archives by Category and Date Developer Profile

WEN Solutions

47 plugins · 26K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
112 days
View full developer profile
Detection Fingerprints

How We Detect Archives by Category and Date

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/archives-by-category-and-date/css/acd-style.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Archives by Category and Date