
Automatic Post Date Filler Security & Risk Analysis
wordpress.org/plugins/automatic-post-date-fillerAutomatically sets custom date and time when editing posts.
Is Automatic Post Date Filler Safe to Use in 2026?
Generally Safe
Score 85/100Automatic Post Date Filler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'automatic-post-date-filler' v1.2 plugin exhibits a generally positive security posture, primarily due to its minimal attack surface and the absence of known vulnerabilities. The static analysis indicates no exposed entry points like AJAX handlers, REST API routes, shortcodes, or cron events that lack proper authentication or permission checks. This significantly reduces the likelihood of external actors directly exploiting the plugin. Furthermore, the absence of critical or high-severity taint flows suggests that data processed by the plugin is likely handled safely, and there are no obvious paths for malicious input to lead to code execution or sensitive data compromise. The lack of file operations and external HTTP requests also contributes to its security.
However, there are notable areas of concern within the code. The fact that 100% of SQL queries are not using prepared statements is a significant risk. This opens the door to potential SQL injection vulnerabilities, especially if the data used in these queries originates from user input or other untrusted sources. Additionally, the very low percentage (6%) of properly escaped output is alarming. This indicates a high probability of cross-site scripting (XSS) vulnerabilities, where malicious scripts could be injected into the user interface through the plugin's output. The complete absence of nonce checks, while not a direct entry point risk, means that any actions performed by the plugin could theoretically be initiated by unauthorized users if an attacker could trick a logged-in user into performing them, though the lack of entry points mitigates this considerably.
In conclusion, while the plugin has a strong defense against direct external attacks due to its limited attack surface and clean vulnerability history, the internal code practices, specifically regarding SQL query preparation and output escaping, present significant risks. These weaknesses could be exploited if an attacker finds a way to introduce malicious data into the plugin's processing or if other vulnerabilities exist that allow for interaction with these unhardened code segments. Addressing the SQL and XSS risks is paramount to improving the plugin's overall security.
Key Concerns
- 100% of SQL queries not using prepared statements
- Only 6% of outputs properly escaped (high XSS risk)
- 0 Nonce checks
- 2 Capability checks (potential privilege escalation risk if unhandled)
Automatic Post Date Filler Security Vulnerabilities
Automatic Post Date Filler Release Timeline
Automatic Post Date Filler Code Analysis
SQL Query Safety
Output Escaping
Automatic Post Date Filler Attack Surface
WordPress Hooks 10
Maintenance & Trust
Automatic Post Date Filler Maintenance & Trust
Maintenance Signals
Community Trust
Automatic Post Date Filler Alternatives
Auto Schedule
auto-scheduling
Wordpress plugin to automatically set your post schedule.
SNY Auto Featured Image
wp-auto-featured-image
Automatically set a default featured image for posts, pages, or custom post types when none is assigned.
Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories
post-expirator
PublishPress Future can make scheduled changes to your content. You can unpublish posts, move posts to a new status, update the categories, and more.
Change WordPress Login Logo
change-login-logo
Upload your logo for WordPress login page instead of the usual WordPress logo with simple settings.
Meks Time Ago
meks-time-ago
Automatically change your post date display to "time ago" format like 1 hour ago, 3 days ago, etc...
Automatic Post Date Filler Developer Profile
2 plugins · 2K total installs
How We Detect Automatic Post Date Filler
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/automatic-post-date-filler/css/admin.css/wp-content/plugins/automatic-post-date-filler/js/admin.js/wp-content/plugins/automatic-post-date-filler/js/admin.jsautomatic-post-date-filler/css/admin.css?ver=automatic-post-date-filler/js/admin.js?ver=HTML / DOM Fingerprints
apdf_notedata-apdf-settingsapdf_settings_object