Auto Post Publisher Security & Risk Analysis

wordpress.org/plugins/auto-post-publisher

Automatically publishes scheduled posts that may have missed their scheduled time.

20 active installs v1.8 PHP 8.2+ WP 5.0+ Updated Jan 1, 2026
auto-publishautomaticpost-managementscheduled-postsscheduler
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Auto Post Publisher Safe to Use in 2026?

Generally Safe

Score 100/100

Auto Post Publisher has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "auto-post-publisher" plugin version 1.8 exhibits a strong security posture. The absence of any identified dangerous functions, unsanitized taint flows, or raw SQL queries is highly commendable. Furthermore, all SQL queries are properly prepared, and all identified output operations are correctly escaped, indicating good developer practices in handling data. The plugin also demonstrates awareness of WordPress security mechanisms by including at least one capability check.

However, there are areas for improvement. The complete lack of nonce checks on AJAX handlers, REST API routes, shortcodes, and cron events, combined with zero identified entry points needing authentication, raises a concern. While the current analysis found no unprotected entry points, this could indicate a very limited attack surface or simply that the analysis missed potential avenues for interaction. The vulnerability history is clean, which is a significant positive, suggesting a history of secure development. Nevertheless, the absence of nonce checks is a potential weakness that could be exploited if any new entry points are introduced or discovered that bypass existing checks.

In conclusion, "auto-post-publisher" v1.8 appears to be a securely coded plugin with robust data handling. The lack of any historical vulnerabilities is a strong indicator of its reliability. The primary area of potential weakness lies in the absence of nonce checks, which, while not leading to any identified issues in this specific version, is a standard security practice that should be implemented to proactively defend against future threats, especially as the plugin evolves.

Key Concerns

  • No nonce checks on AJAX, REST, shortcodes, or cron
Vulnerabilities
None known

Auto Post Publisher Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Auto Post Publisher Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
11 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

100% escaped11 total outputs
Attack Surface

Auto Post Publisher Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_headauto-post-publisher.php:24
actionadmin_menuauto-post-publisher.php:25
actionadmin_initauto-post-publisher.php:26
actionsave_postauto-post-publisher.php:29
actiondelete_postauto-post-publisher.php:30
Maintenance & Trust

Auto Post Publisher Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 1, 2026
PHP min version8.2
Downloads669

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Auto Post Publisher Developer Profile

ExertLogics

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Post Publisher

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/auto-post-publisher/assets/css/admin-style.css/wp-content/plugins/auto-post-publisher/assets/js/admin-script.js
Script Paths
/wp-content/plugins/auto-post-publisher/assets/js/admin-script.js
Version Parameters
auto-post-publisher/assets/css/admin-style.css?ver=auto-post-publisher/assets/js/admin-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wrapform-table
Data Attributes
name="auto_post_publisher_settings"id="auto_post_publisher_settings"value="auto_post_publisher_settings"name="auto_post_publisher_settings[post_types][]"
FAQ

Frequently Asked Questions about Auto Post Publisher