
Change Autosave Time Security & Risk Analysis
wordpress.org/plugins/change-autosave-intervalThis plugin adds a new setting in the last position of Settings > General, this option will allow you to select the days that WordPress take to emp …
Is Change Autosave Time Safe to Use in 2026?
Generally Safe
Score 85/100Change Autosave Time has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the provided static analysis, the 'change-autosave-interval' plugin v1.0.1 exhibits a generally strong security posture. The plugin has a remarkably small attack surface with zero identified entry points, meaning there are no AJAX handlers, REST API routes, shortcodes, or cron events to exploit. Furthermore, the code demonstrates good practices by avoiding dangerous functions, using prepared statements for all SQL queries, and not performing file operations or external HTTP requests. The vulnerability history is also a significant strength, showing no known CVEs, which indicates a lack of historical security issues.
However, there are a couple of areas that warrant attention. The output escaping is not fully implemented, with 25% of outputs not being properly escaped. While the total number of outputs is small (4), this still represents a potential vector for cross-site scripting (XSS) vulnerabilities if any of those outputs handle user-supplied data. Additionally, the absence of nonce checks and capability checks across all entry points (though there are no entry points) is a notable absence of standard WordPress security measures. While the current lack of an attack surface mitigates this risk significantly, any future expansion of the plugin's functionality would require immediate implementation of these checks.
In conclusion, the 'change-autosave-interval' plugin v1.0.1 appears to be a secure plugin in its current state due to its minimal attack surface and lack of historical vulnerabilities. The primary weakness lies in the incomplete output escaping, which presents a low but present risk. The absence of common WordPress security checks (nonces, capabilities) is less of a concern given the zero attack surface, but it signifies a potential area for improvement if the plugin evolves.
Key Concerns
- Unescaped output detected
Change Autosave Time Security Vulnerabilities
Change Autosave Time Code Analysis
Output Escaping
Change Autosave Time Attack Surface
WordPress Hooks 3
Maintenance & Trust
Change Autosave Time Maintenance & Trust
Maintenance Signals
Community Trust
Change Autosave Time Alternatives
Timed Content
timed-content
Plugin to show or hide portions of a Page or Post based on specific date/time characteristics.
Timed Content For Beaver Builder
timed-content-for-beaver-builder
A very easy to use plugin to hide content automatically after given time. Its purely PHP based plugin, so it removes content from source as well.
YAHMAN Add-ons
yahman-add-ons
YAHMAN Add-ons has Multiple functions.
Time goes by
time-goes-by
Switch the display of content based on time using a shortcode. ショートコードで囲んだコンテンツを時間に応じて表示切替できるプラグイン。
Scheduled Content
scheduled-contnet-by-streama
Scheduled content enables you to schedule portions of a post or page and/or set an expiery date for that content.
Change Autosave Time Developer Profile
9 plugins · 5K total installs
How We Detect Change Autosave Time
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
descriptionname="cmr_cwasi_settings[one]"value="