Calendario del Perú Security & Risk Analysis

wordpress.org/plugins/calendario-del-peru

Muestra eventos del día del Calendario peruano. Este plugin mostrará 5 titulares del Calendario, todos los días.

10 active installs v1 PHP + WP 4.1+ Updated Jul 14, 2021
calendarioeventosnoticiasperuperuanos
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Calendario del Perú Safe to Use in 2026?

Generally Safe

Score 85/100

Calendario del Perú has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "calendario-del-peru" v1 exhibits a mixed security posture. On one hand, it demonstrates good practices by not exposing any obvious attack vectors like AJAX handlers, REST API routes, or shortcodes without proper authentication or permission checks. The complete absence of direct SQL queries and the use of prepared statements for any database interactions are also significant strengths. However, the code analysis reveals critical weaknesses. The presence of the `unserialize` function without any apparent input validation or sanitization is a major concern, as it can lead to object injection vulnerabilities if the serialized data originates from an untrusted source. Furthermore, the fact that 100% of the identified output operations are not properly escaped poses a significant risk of Cross-Site Scripting (XSS) attacks. The lack of any recorded vulnerabilities in its history might suggest a small user base or a lack of focused security auditing, but it doesn't negate the risks identified in the static analysis. Therefore, while the plugin has a minimal attack surface, the identified code-level risks associated with `unserialize` and unescaped output are serious and require immediate attention.

Key Concerns

  • Unescaped output found
  • Dangerous function: unserialize used
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Calendario del Perú Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Calendario del Perú Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$result = unserialize(join('', file($cache_file)));parser.php:32

Output Escaping

0% escaped3 total outputs
Attack Surface

Calendario del Perú Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioncalendario_peruwp-xml-rss-parser.php:44
Maintenance & Trust

Calendario del Perú Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJul 14, 2021
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Calendario del Perú Developer Profile

deperucom

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Calendario del Perú

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<p><a href=""></a></p>
FAQ

Frequently Asked Questions about Calendario del Perú