Auto Future Date Security & Risk Analysis

wordpress.org/plugins/auto-future-date

Adds an "Auto" link to your post page that will automatically schedule your next post based on the most recent post.

30 active installs v0.5.2 PHP + WP 3.0.0+ Updated Mar 18, 2012
datefuturefuture-datepostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Auto Future Date Safe to Use in 2026?

Generally Safe

Score 85/100

Auto Future Date has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The auto-future-date plugin v0.5.2 exhibits a mixed security posture. While it demonstrates good practices by avoiding dangerous functions, performing all SQL queries using prepared statements, and having no recorded vulnerabilities, there are significant concerns arising from the static analysis. The presence of an unprotected AJAX handler is a critical security weakness, creating a direct attack vector that could be exploited if not properly secured by the application layer or subsequent sanitization within the handler itself. The lack of nonce checks and capability checks on this entry point further exacerbates this risk.

Additionally, the output escaping is only 40% effective, meaning a portion of the plugin's output is not properly sanitized, potentially leading to cross-site scripting (XSS) vulnerabilities. The absence of taint analysis results and the small attack surface might mask deeper issues, but the identified unprotected AJAX handler and insufficient output escaping are immediate red flags. The plugin's clean vulnerability history is positive but does not negate the risks identified in the current code analysis.

Key Concerns

  • Unprotected AJAX handler found
  • Output escaping at 40%
  • No nonce checks on AJAX handler
  • No capability checks on AJAX handler
Vulnerabilities
None known

Auto Future Date Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Auto Future Date Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

40% escaped10 total outputs
Attack Surface
1 unprotected

Auto Future Date Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_afd_get_dateautoFutureDate.php:48
WordPress Hooks 5
actionadmin_print_scripts-post-new.phpautoFutureDate.php:44
actionadmin_print_scripts-post.phpautoFutureDate.php:45
actionadmin_print_scripts-settings_page_afd-optionsautoFutureDate.php:46
actionadmin_menuautoFutureDate.php:51
filterpre_update_option_afd_optionsautoFutureDate.php:52
Maintenance & Trust

Auto Future Date Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedMar 18, 2012
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs30
Developer Profile

Auto Future Date Developer Profile

Aelora

4 plugins · 550 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Future Date

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/auto-future-date/help.png
Script Paths
/wp-content/plugins/auto-future-date/autoFutureDate.js

HTML / DOM Fingerprints

Data Attributes
id="afd_minTime"id="afd_minFormatted"id="afd_maxTime"id="afd_maxFormatted"
REST Endpoints
/wp-ajax.php?action=afd_get_date
FAQ

Frequently Asked Questions about Auto Future Date