Automatic Post Date Filler Security & Risk Analysis

wordpress.org/plugins/automatic-post-date-filler

Automatically sets custom date and time when editing posts.

100 active installs v1.2 PHP + WP 3.0+ Updated Apr 30, 2016
automaticcustomdatedefaultfuture
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Automatic Post Date Filler Safe to Use in 2026?

Generally Safe

Score 85/100

Automatic Post Date Filler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'automatic-post-date-filler' v1.2 plugin exhibits a generally positive security posture, primarily due to its minimal attack surface and the absence of known vulnerabilities. The static analysis indicates no exposed entry points like AJAX handlers, REST API routes, shortcodes, or cron events that lack proper authentication or permission checks. This significantly reduces the likelihood of external actors directly exploiting the plugin. Furthermore, the absence of critical or high-severity taint flows suggests that data processed by the plugin is likely handled safely, and there are no obvious paths for malicious input to lead to code execution or sensitive data compromise. The lack of file operations and external HTTP requests also contributes to its security.

However, there are notable areas of concern within the code. The fact that 100% of SQL queries are not using prepared statements is a significant risk. This opens the door to potential SQL injection vulnerabilities, especially if the data used in these queries originates from user input or other untrusted sources. Additionally, the very low percentage (6%) of properly escaped output is alarming. This indicates a high probability of cross-site scripting (XSS) vulnerabilities, where malicious scripts could be injected into the user interface through the plugin's output. The complete absence of nonce checks, while not a direct entry point risk, means that any actions performed by the plugin could theoretically be initiated by unauthorized users if an attacker could trick a logged-in user into performing them, though the lack of entry points mitigates this considerably.

In conclusion, while the plugin has a strong defense against direct external attacks due to its limited attack surface and clean vulnerability history, the internal code practices, specifically regarding SQL query preparation and output escaping, present significant risks. These weaknesses could be exploited if an attacker finds a way to introduce malicious data into the plugin's processing or if other vulnerabilities exist that allow for interaction with these unhardened code segments. Addressing the SQL and XSS risks is paramount to improving the plugin's overall security.

Key Concerns

  • 100% of SQL queries not using prepared statements
  • Only 6% of outputs properly escaped (high XSS risk)
  • 0 Nonce checks
  • 2 Capability checks (potential privilege escalation risk if unhandled)
Vulnerabilities
None known

Automatic Post Date Filler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Automatic Post Date Filler Release Timeline

v1.2Current
v1.1
Code Analysis
Analyzed Mar 16, 2026

Automatic Post Date Filler Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
16
1 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

6% escaped17 total outputs
Attack Surface

Automatic Post Date Filler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_menuautomatic-post-date-filler.php:46
actionadmin_noticesautomatic-post-date-filler.php:47
actionadmin_initautomatic-post-date-filler.php:48
actionplugins_loadedautomatic-post-date-filler.php:52
filterplugin_row_metaautomatic-post-date-filler.php:110
actionadmin_enqueue_scriptsautomatic-post-date-filler.php:114
actionadmin_headautomatic-post-date-filler.php:118
actionadmin_initautomatic-post-date-filler.php:351
actionadmin_enqueue_scriptsautomatic-post-date-filler.php:888
actionadmin_print_footer_scriptsautomatic-post-date-filler.php:889
Maintenance & Trust

Automatic Post Date Filler Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedApr 30, 2016
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings6
Active installs100
Developer Profile

Automatic Post Date Filler Developer Profile

Devtard

2 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Automatic Post Date Filler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/automatic-post-date-filler/css/admin.css/wp-content/plugins/automatic-post-date-filler/js/admin.js
Script Paths
/wp-content/plugins/automatic-post-date-filler/js/admin.js
Version Parameters
automatic-post-date-filler/css/admin.css?ver=automatic-post-date-filler/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
apdf_note
Data Attributes
data-apdf-settings
JS Globals
apdf_settings_object
FAQ

Frequently Asked Questions about Automatic Post Date Filler