Countdown to Next Post Security & Risk Analysis

wordpress.org/plugins/countdown-to-next-post

This plugin will display a countdown timer that counts down towards your next scheduled post.

10 active installs v1.0 PHP + WP 2.6+ Updated Jul 19, 2009
countdownnext-posttime-until-next-postupcoming-postupcoming-post-countdown
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Countdown to Next Post Safe to Use in 2026?

Generally Safe

Score 85/100

Countdown to Next Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The countdown-to-next-post v1.0 plugin exhibits a mixed security posture. While its attack surface is commendably small, with no AJAX handlers, REST API routes, or cron events requiring authentication, and no recorded vulnerability history, significant concerns arise from its internal code quality. The presence of two instances of the `preg_replace` function with the `/e` modifier is a critical red flag, indicating a high risk of remote code execution vulnerabilities if user-supplied data is not meticulously sanitized before being passed to these functions. Furthermore, all SQL queries are executed without prepared statements, leaving the plugin susceptible to SQL injection attacks. The low percentage of properly escaped output (42%) further amplifies these risks, as it suggests a widespread potential for cross-site scripting (XSS) vulnerabilities.

Despite the absence of known CVEs and a clean vulnerability history, which could indicate diligent maintenance or simply a lack of past scrutiny, the static analysis reveals inherent weaknesses that could be exploited. The two unsanitized taint flows identified, although not classified as critical or high severity in the provided data, coupled with the raw SQL queries and poor output escaping, present a considerable risk. In conclusion, while the plugin has a small attack surface and no prior vulnerabilities, the identified code quality issues, particularly the use of `preg_replace(/e)` and unescaped SQL queries, make it a risky choice without significant code remediation.

Key Concerns

  • Raw SQL queries (7 total, 0% prepared)
  • Dangerous function: preg_replace(/e) (2 instances)
  • Low output escaping percentage (42% properly escaped)
  • No nonce checks
  • No capability checks
  • Taint flows with unsanitized paths (2 total)
Vulnerabilities
None known

Countdown to Next Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Countdown to Next Post Code Analysis

Dangerous Functions
2
Raw SQL Queries
7
0 prepared
Unescaped Output
38
28 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace("/<!--scott_countdownTimer(\(([0-9]+)\))?-->/e"countdown_to_next_post.php:710
preg_replace(/e)preg_replace("/<!--scott_countdownTimer-->/e"countdown_to_next_post.php:713

SQL Query Safety

0% prepared7 total queries

Output Escaping

42% escaped66 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
countdown_to_next_post_subpanel (countdown_to_next_post.php:39)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Countdown to Next Post Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[countdown_to_next_post] countdown_to_next_post.php:739
WordPress Hooks 6
filterthe_contentcountdown_to_next_post.php:722
actionwidgets_initcountdown_to_next_post.php:882
actionadmin_menucountdown_to_next_post.php:953
actionwp_footercountdown_to_next_post.php:959
actionwp_headcountdown_to_next_post.php:962
actionsave_postcountdown_to_next_post.php:1047
Maintenance & Trust

Countdown to Next Post Maintenance & Trust

Maintenance Signals

WordPress version tested2.8.1
Last updatedJul 19, 2009
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Countdown to Next Post Developer Profile

mullis

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Countdown to Next Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
fergcorp-countdown-timer
JS Globals
scott_countdownTimerscott_timer_datesscott_timer_getOptions
FAQ

Frequently Asked Questions about Countdown to Next Post