Calendar Posts Security & Risk Analysis

wordpress.org/plugins/calendar-posts

A powerful yet simple plugin for adding calendar functionality to posts. Great for using posts as events and calendar inputs.

10 active installs v0.7.1 PHP + WP 2.8+ Updated May 18, 2011
calendarcalendar-postseventspostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Calendar Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Calendar Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'calendar-posts' plugin v0.7.1 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to modern WordPress security practices by utilizing prepared statements for all SQL queries, including a nonce check and a capability check. Furthermore, the static analysis found no critical or high-severity taint flows, suggesting that user-controlled input is generally handled safely in these critical areas. The complete absence of known CVEs also points to a generally secure history, implying diligent maintenance or a lack of targeted exploits.

However, several concerning code signals warrant attention. The presence of the `create_function` is a significant risk, as it's considered deprecated and can lead to severe security vulnerabilities if used with unsanitized input. Equally concerning is the fact that 100% of output operations are not properly escaped. This means any dynamic content displayed by the plugin is susceptible to Cross-Site Scripting (XSS) attacks, allowing attackers to inject malicious code into the user's browser. The bundling of an outdated jQuery version (v1.4.2) also introduces potential risks, as older library versions often contain known vulnerabilities.

In conclusion, while the plugin scores well on foundational security elements like SQL sanitization and authentication checks, the critical issues of unescaped output and the use of `create_function`, coupled with an outdated library, present significant security weaknesses. The lack of historical vulnerabilities is a positive indicator, but the identified code signals necessitate immediate attention to prevent potential exploitation.

Key Concerns

  • 100% of outputs not properly escaped
  • Dangerous function: create_function
  • Bundled outdated library: jQuery v1.4.2
Vulnerabilities
None known

Calendar Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Calendar Posts Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
15
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('','return register_widget("CalendarPosts");'));calendar-posts.php:451

Bundled Libraries

jQuery1.4.2

Output Escaping

0% escaped15 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<calendar-posts> (calendar-posts.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Calendar Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwidgets_initcalendar-posts.php:451
actionsave_postcalendar-posts.php:452
actionadmin_menucalendar-posts.php:453
Maintenance & Trust

Calendar Posts Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMay 18, 2011
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Calendar Posts Developer Profile

swedish boy

3 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Calendar Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/calendar-posts/jquery.datepick.package/redmond.datepick.css/wp-content/plugins/calendar-posts/jquery.datepick.package/ui-redmond.datepick.css/wp-content/plugins/calendar-posts/jquery.datepick.package/redmond/ui.datepicker.css/wp-content/plugins/calendar-posts/jquery.datepick.package/jquery-1.4.2.min.js/wp-content/plugins/calendar-posts/jquery.datepick.package/jquery.datepick.js/wp-content/plugins/calendar-posts/jquery.datepick.package/jquery.datepick.lang.min.js
Script Paths
/wp-content/plugins/calendar-posts/jquery.datepick.package/jquery-1.4.2.min.js/wp-content/plugins/calendar-posts/jquery.datepick.package/jquery.datepick.js/wp-content/plugins/calendar-posts/jquery.datepick.package/jquery.datepick.lang.min.js

HTML / DOM Fingerprints

CSS Classes
cp-postcp-datecp-authorcp-cat
Data Attributes
id="swecpdater_nonce"name="swecpdater_nonce"id="cp_dates"name="CP_dates"id="calendar_pickr"name="tid"+2 more
JS Globals
cp_langdatepick_package$j = jQuery.noConflict()
FAQ

Frequently Asked Questions about Calendar Posts