Change Autosave Time Security & Risk Analysis

wordpress.org/plugins/change-autosave-interval

This plugin adds a new setting in the last position of Settings > General, this option will allow you to select the days that WordPress take to emp …

100 active installs v1.0.1 PHP 5.2.4+ WP 4.0+ Updated Feb 23, 2023
auto-saveautosavecontenttime
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Change Autosave Time Safe to Use in 2026?

Generally Safe

Score 85/100

Change Autosave Time has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

Based on the provided static analysis, the 'change-autosave-interval' plugin v1.0.1 exhibits a generally strong security posture. The plugin has a remarkably small attack surface with zero identified entry points, meaning there are no AJAX handlers, REST API routes, shortcodes, or cron events to exploit. Furthermore, the code demonstrates good practices by avoiding dangerous functions, using prepared statements for all SQL queries, and not performing file operations or external HTTP requests. The vulnerability history is also a significant strength, showing no known CVEs, which indicates a lack of historical security issues.

However, there are a couple of areas that warrant attention. The output escaping is not fully implemented, with 25% of outputs not being properly escaped. While the total number of outputs is small (4), this still represents a potential vector for cross-site scripting (XSS) vulnerabilities if any of those outputs handle user-supplied data. Additionally, the absence of nonce checks and capability checks across all entry points (though there are no entry points) is a notable absence of standard WordPress security measures. While the current lack of an attack surface mitigates this risk significantly, any future expansion of the plugin's functionality would require immediate implementation of these checks.

In conclusion, the 'change-autosave-interval' plugin v1.0.1 appears to be a secure plugin in its current state due to its minimal attack surface and lack of historical vulnerabilities. The primary weakness lies in the incomplete output escaping, which presents a low but present risk. The absence of common WordPress security checks (nonces, capabilities) is less of a concern given the zero attack surface, but it signifies a potential area for improvement if the plugin evolves.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Change Autosave Time Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Change Autosave Time Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

Change Autosave Time Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedchange-autosave-interval.php:14
actionadmin_initchange-autosave-interval.php:19
actionplugins_loadedchange-autosave-interval.php:20
Maintenance & Trust

Change Autosave Time Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedFeb 23, 2023
PHP min version5.2.4
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Change Autosave Time Developer Profile

Carlos Martínez Romero

9 plugins · 5K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Change Autosave Time

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
description
Data Attributes
name="cmr_cwasi_settings[one]"value="
FAQ

Frequently Asked Questions about Change Autosave Time