Change WP Cron Request URL Security & Risk Analysis

wordpress.org/plugins/change-wp-cron-request-url

This plugin changes the request url when wp-cron executed.

10 active installs v1.0.2 PHP 5.6+ WP 4.9.8+ Updated Unknown
cronwp-cron
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Change WP Cron Request URL Safe to Use in 2026?

Generally Safe

Score 100/100

Change WP Cron Request URL has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'change-wp-cron-request-url' plugin, version 1.0.2, exhibits a strong static security posture with no identified entry points, dangerous functions, or file operations. The plugin exclusively uses prepared statements for its SQL queries, which is a significant positive security practice. However, a major concern arises from the complete lack of output escaping, meaning that all 12 identified output operations are potentially vulnerable to cross-site scripting (XSS) attacks. This oversight can be exploited if any dynamic data is displayed to users without proper sanitization.

The plugin also shows no evidence of nonce or capability checks, which are crucial for protecting against various types of attacks, including cross-site request forgery (CSRF) and unauthorized privilege escalation. The absence of a vulnerability history suggests a lack of publicly disclosed security issues, which is positive. However, given the significant gaps in output escaping and authorization checks, this could also indicate a lack of thorough security auditing. In conclusion, while the plugin avoids common pitfalls like SQL injection and insecure file handling, the unescaped output and missing authorization controls represent significant security risks that need immediate attention.

Key Concerns

  • 0% of outputs are properly escaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Change WP Cron Request URL Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Change WP Cron Request URL Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Attack Surface

Change WP Cron Request URL Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuadmin\admin.php:9
actionadmin_initadmin\admin.php:10
actionadmin_initadmin\admin.php:11
filtercron_requestchange-wp-cron-request-url.php:36
Maintenance & Trust

Change WP Cron Request URL Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedUnknown
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Change WP Cron Request URL Developer Profile

PRESSMAN

20 plugins · 100 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Change WP Cron Request URL

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Change WP Cron Request URL