Blog Post Reading Time Security & Risk Analysis

wordpress.org/plugins/blog-post-reading-time

Display estimated reading time and let your visitors listen to blog posts with a built-in text-to-speech option. Boost engagement by helping readers c …

20 active installs v2.1 PHP 7.2+ WP 5.0+ Updated Sep 4, 2025
estimated-read-timelisten-articlepost-reading-timereading-timetext-to-speech
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Blog Post Reading Time Safe to Use in 2026?

Generally Safe

Score 100/100

Blog Post Reading Time has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8mo ago
Risk Assessment

The "blog-post-reading-time" plugin v2.1 demonstrates a generally strong security posture based on the provided static analysis. It effectively utilizes prepared statements for any SQL queries and ensures all output is properly escaped, which are critical good practices for preventing common web vulnerabilities like SQL injection and Cross-Site Scripting (XSS). The absence of dangerous functions, file operations, and external HTTP requests further reduces the potential attack surface. The plugin also has no recorded vulnerability history, suggesting a commitment to security or a lack of past exploitable issues.

However, the analysis reveals a significant concern: the complete absence of nonce checks and capability checks for its entry points, which are the two shortcodes. While the static analysis indicates zero unprotected entry points, this is likely due to the fact that shortcodes themselves don't inherently require these checks in the same way as AJAX or REST endpoints. Nevertheless, shortcodes can still be a vector for unintended actions or information leakage if not handled with care, especially if they interact with user-provided data or perform sensitive operations. The lack of these fundamental WordPress security mechanisms for even the shortcode entry points is a notable weakness.

In conclusion, the plugin excels in core secure coding practices for data handling and output. Its vulnerability-free history is a positive indicator. The primary weakness lies in the missed opportunity to implement standard WordPress security checks (nonces and capabilities) on its shortcode entry points, which could be a concern if the shortcodes perform actions that might be susceptible to manipulation. The overall risk is moderate due to the strong foundation but the absence of these checks.

Key Concerns

  • Missing nonce checks on shortcodes
  • Missing capability checks on shortcodes
Vulnerabilities
None known

Blog Post Reading Time Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Blog Post Reading Time Release Timeline

v2.1Current
v1.1
Code Analysis
Analyzed Apr 16, 2026

Blog Post Reading Time Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
34 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped34 total outputs
Attack Surface

Blog Post Reading Time Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[bprt_post_reading_time] includes/class-bprt-shortcode.php:7
[bprt_post_listen] includes/class-bprt-shortcode.php:8
WordPress Hooks 6
actionplugins_loadedblog-post-reading-time.php:24
filterthe_titleincludes/class-bprt-core.php:8
filterthe_contentincludes/class-bprt-core.php:9
actionwp_enqueue_scriptsincludes/class-bprt-enqueue.php:8
actionadmin_menuincludes/class-bprt-settings.php:8
actionadmin_initincludes/class-bprt-settings.php:9
Maintenance & Trust

Blog Post Reading Time Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 4, 2025
PHP min version7.2
Downloads374

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Blog Post Reading Time Developer Profile

Rathod Narendrasinh

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Blog Post Reading Time

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blog-post-reading-time/assets/css/bprt-style.css
Version Parameters
bprt-style?ver=blog-post-reading-time/assets/css/bprt-style.css?ver=

HTML / DOM Fingerprints

Shortcode Output
[bprt_post_reading_time][bprt_post_listen]
FAQ

Frequently Asked Questions about Blog Post Reading Time