Automatic Expiration for Categories Security & Risk Analysis

wordpress.org/plugins/categories-expiration-date

With this plugin you will be able to set an expiration date for certain categories assigned to posts and products.

10 active installs v0.1 PHP 5.6+ WP 4.0+ Updated Feb 11, 2025
categoriesexpirationexpirestaxonomiesterms
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Automatic Expiration for Categories Safe to Use in 2026?

Generally Safe

Score 92/100

Automatic Expiration for Categories has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "categories-expiration-date" v0.1 plugin exhibits a mixed security posture. On the positive side, it has a very small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed. Furthermore, the plugin demonstrates good practices by incorporating nonce checks and capability checks, indicating some awareness of secure WordPress development. However, the static analysis reveals significant concerns regarding the handling of SQL queries and output escaping. A substantial percentage of SQL queries are not using prepared statements, and a majority of output is not properly escaped, presenting potential risks for SQL injection and cross-site scripting (XSS) vulnerabilities respectively.

The taint analysis further amplifies these concerns, identifying two high-severity flows with unsanitized paths. While the plugin has no recorded vulnerability history, this does not negate the risks identified in the static and taint analysis. The absence of past vulnerabilities could be due to its low adoption, lack of targeted attacks, or simply that the identified vulnerabilities have not yet been discovered or exploited. The current version, 0.1, being a very early release, also suggests it might be undergoing active development where these security gaps might be addressed in later versions.

In conclusion, while the plugin has a limited attack surface and implements some basic security measures, the identified issues with unescaped output and unsanitized SQL queries are significant. These weaknesses, coupled with high-severity taint flows, warrant caution. Users should be aware of these potential vulnerabilities, and developers should prioritize addressing the unescaped output and unsanitized SQL query issues in future updates to improve the plugin's overall security.

Key Concerns

  • High severity taint flows with unsanitized paths
  • SQL queries not using prepared statements
  • Output not properly escaped
Vulnerabilities
None known

Automatic Expiration for Categories Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Automatic Expiration for Categories Release Timeline

v0.1Current
Code Analysis
Analyzed Mar 17, 2026

Automatic Expiration for Categories Code Analysis

Dangerous Functions
0
Raw SQL Queries
8
6 prepared
Unescaped Output
17
7 escaped
Nonce Checks
5
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

43% prepared14 total queries

Output Escaping

29% escaped24 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
bv_expired_categories_options (main.php:114)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Automatic Expiration for Categories Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedetc\install.php:23
actionsave_postmain.php:76
actionadmin_menumain.php:107
actionadmin_headmain.php:155
Maintenance & Trust

Automatic Expiration for Categories Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedFeb 11, 2025
PHP min version5.6
Downloads2K

Community Trust

Rating92/100
Number of ratings7
Active installs10
Developer Profile

Automatic Expiration for Categories Developer Profile

brightvesseldev

15 plugins · 48K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
277 days
View full developer profile
Detection Fingerprints

How We Detect Automatic Expiration for Categories

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/categories-expiration-date/assets/admin.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Automatic Expiration for Categories