ChronoFlo Calendar ShortCode Security & Risk Analysis

wordpress.org/plugins/chronoflo-calendar-shortcode

ChronoFlo Calendar is a beautiful events calendar offering unrivalled visual customization. This plugin provides a shortcode to embed a ChronoFlo cale …

30 active installs v1.0 PHP 5.2.4+ WP 3.4+ Updated Mar 22, 2018
calendarcalendarseventeventsevents-calendar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ChronoFlo Calendar ShortCode Safe to Use in 2026?

Generally Safe

Score 85/100

ChronoFlo Calendar ShortCode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of chronoflo-calendar-shortcode v1.0 reveals a generally good security posture. The code adheres to several security best practices, including the absence of dangerous functions, all SQL queries utilizing prepared statements, and all output being properly escaped. Furthermore, there are no file operations or external HTTP requests, and no bundled libraries to potentially become outdated. The attack surface is minimal, consisting solely of one shortcode, and importantly, there are no unprotected entry points indicated in the static analysis.

However, a significant concern arises from the complete lack of nonce checks and capability checks. While the static analysis shows no unprotected AJAX or REST API routes, the absence of these fundamental security mechanisms for the shortcode is a notable weakness. This could potentially allow for unauthorized execution of the shortcode's functionality if an attacker can trick a logged-in user into triggering it. The taint analysis also shows no flows, which, while seemingly positive, could also indicate limited analysis or a very simple plugin where vulnerabilities might be harder to detect via this method.

With zero recorded vulnerabilities in its history, the plugin has a strong track record. This, combined with the good practices observed in the code, suggests a developer who is likely security-conscious. Nevertheless, the missing nonce and capability checks represent a potential vulnerability that could be exploited. The plugin's strengths lie in its clean code and lack of common pitfalls, but its primary weakness is the lack of authentication and authorization checks on its sole entry point.

Key Concerns

  • Missing capability checks for shortcode
  • Missing nonce checks for shortcode
Vulnerabilities
None known

ChronoFlo Calendar ShortCode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ChronoFlo Calendar ShortCode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

ChronoFlo Calendar ShortCode Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[chronoflo_calendar] chronoflo-calendar-shortcode.php:57
WordPress Hooks 1
filterplugin_row_metachronoflo-calendar-shortcode.php:70
Maintenance & Trust

ChronoFlo Calendar ShortCode Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 22, 2018
PHP min version5.2.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

ChronoFlo Calendar ShortCode Developer Profile

webalon

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ChronoFlo Calendar ShortCode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about ChronoFlo Calendar ShortCode