CPT Calender Widget for WordPress Security & Risk Analysis

wordpress.org/plugins/cpt-calender-widget

Create Custom Post and and select CPT from dropdown.

100 active installs v1.0.0 PHP + WP 3.3+ Updated Sep 24, 2015
calendarcalendar-sidebarcalendar-widgetcpt-calender-widgetcustom-post-type-calendar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CPT Calender Widget for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

CPT Calender Widget for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of cpt-calender-widget v1.0.0 reveals a generally good security posture regarding attack surface. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no direct entry points for attackers to exploit. This lack of exposed functionality is a significant strength. However, the code does contain one instance of the `create_function` which is considered a dangerous function in PHP and can be a vector for code injection if user input is not strictly controlled. Additionally, only 17% of SQL queries utilize prepared statements, leaving a substantial portion vulnerable to SQL injection. The 50% rate of proper output escaping is also a concern, indicating potential for cross-site scripting (XSS) vulnerabilities. The absence of any recorded vulnerabilities in its history is a positive indicator, suggesting the developers have maintained security over time. Despite the clean vulnerability history, the presence of dangerous functions and insecure SQL practices warrants caution. Overall, while the plugin has a minimal attack surface, the identified code-level issues represent potential security risks that need to be addressed.

Key Concerns

  • Dangerous function used (create_function)
  • High percentage of SQL queries not using prepared statements
  • Output escaping is not consistently applied
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

CPT Calender Widget for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CPT Calender Widget for WordPress Code Analysis

Dangerous Functions
1
Raw SQL Queries
5
1 prepared
Unescaped Output
17
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("hmt_cpt_calender");'));cpt-calendar-widget.php:90

SQL Query Safety

17% prepared6 total queries

Output Escaping

50% escaped34 total outputs
Attack Surface

CPT Calender Widget for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwidgets_initcpt-calendar-widget.php:90
filterget_calendarcpt-calendar-widget.php:127
filterget_calendarcpt-calendar-widget.php:317
filterget_calendarcpt-calendar-widget.php:329
Maintenance & Trust

CPT Calender Widget for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 24, 2015
PHP min version
Downloads10K

Community Trust

Rating94/100
Number of ratings3
Active installs100
Developer Profile

CPT Calender Widget for WordPress Developer Profile

Ahir Hemant

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CPT Calender Widget for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_calendarcalendar_wrap
Data Attributes
id="calendar_wrap"
FAQ

Frequently Asked Questions about CPT Calender Widget for WordPress