Content Freshness Security & Risk Analysis

wordpress.org/plugins/content-freshness

Keep your content fresh and up to date! Content Freshness plugin shows a list of posts that have not been updated for a set period of time.

0 active installs v1.1 PHP + WP 4.9+ Updated Nov 20, 2024
modify-postsupdate-articlesupdate-posts
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Content Freshness Safe to Use in 2026?

Generally Safe

Score 92/100

Content Freshness has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "content-freshness" v1.1 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis indicates no dangerous functions, no raw SQL queries, and no external HTTP requests, which are all strong security indicators. The vulnerability history is also clean, with no known CVEs, suggesting a history of secure development or diligent patching.

However, there are some areas for concern. The output escaping is only 67% properly escaped, meaning a notable portion of outputs might be vulnerable to cross-site scripting (XSS) attacks if user-supplied data is involved. Additionally, the complete lack of nonce checks and capability checks on any potential entry points (though none were identified) is a significant omission. While the current attack surface is zero, any future additions or changes to the plugin could introduce vulnerabilities if these fundamental security checks are not implemented. The taint analysis showing zero flows, while good, is based on zero flows analyzed, which could be a limitation of the analysis itself or an indication of a very simple plugin.

In conclusion, the plugin is currently in a good state, primarily due to its minimal attack surface and lack of known vulnerabilities. The primary weaknesses lie in the incomplete output escaping and the absence of essential security checks like nonces and capability checks, which could become critical issues if the plugin's functionality expands. Addressing the output escaping and planning for robust security checks in future development are recommended.

Key Concerns

  • Low output escaping coverage
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Content Freshness Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Content Freshness Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
23
46 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped69 total outputs
Attack Surface

Content Freshness Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menucontent-freshness.php:34
actionadmin_initcontent-freshness.php:35
actionadmin_enqueue_scriptscontent-freshness.php:36
Maintenance & Trust

Content Freshness Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 20, 2024
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Content Freshness Developer Profile

Luis Reginaldo Medilo

2 plugins · 600 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Content Freshness

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
up-posts-table
FAQ

Frequently Asked Questions about Content Freshness