Cronjob Scheduler Security & Risk Analysis

wordpress.org/plugins/cronjob-scheduler

Cronjob Scheduler allows you to automate regular tasks and actions within your WordPress installation!

1K active installs v1.40.1 PHP + WP 3.5.1+ Updated May 26, 2020
automationcroncronjobschedulertask
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cronjob Scheduler Safe to Use in 2026?

Generally Safe

Score 85/100

Cronjob Scheduler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "cronjob-scheduler" plugin version 1.40.1 exhibits a generally strong security posture based on the static analysis and vulnerability history provided. The absence of any detected dangerous functions, raw SQL queries, file operations, external HTTP requests, or critical taint flows is highly encouraging. The plugin also appears to have a limited attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks. Its vulnerability history is clean, with no known CVEs, which suggests a commitment to secure development or a lack of prior discoveries.

However, a significant concern lies in the output escaping. With 29 total outputs and only 69% properly escaped, there's a notable risk of cross-site scripting (XSS) vulnerabilities. This means that user-supplied data displayed by the plugin might not be sufficiently sanitized, potentially allowing an attacker to inject malicious scripts into the user's browser. The absence of nonce checks and capability checks across all entry points, while seemingly mitigated by the lack of exposed entry points, still represents a potential weakness if the attack surface were to grow or be misconfigured. The plugin's strengths are in its lack of common attack vectors and its SQL query handling, but the unescaped output is a clear area for improvement.

Key Concerns

  • Significant portion of output not properly escaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Cronjob Scheduler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cronjob Scheduler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
20 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

69% escaped29 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<plugin_settings> (views\plugin_settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Cronjob Scheduler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionmy_cronjob_actioncronjobs.php:16
Maintenance & Trust

Cronjob Scheduler Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 26, 2020
PHP min version
Downloads41K

Community Trust

Rating88/100
Number of ratings14
Active installs1K
Developer Profile

Cronjob Scheduler Developer Profile

chrispage1

1 plugin · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cronjob Scheduler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cronjob-scheduler/css/style.css/wp-content/plugins/cronjob-scheduler/js/cronjobs.js
Script Paths
/wp-content/plugins/cronjob-scheduler/js/cronjobs.js
Version Parameters
cronjob-scheduler/css/style.css?ver=cronjob-scheduler/js/cronjobs.js?ver=

HTML / DOM Fingerprints

CSS Classes
button-redform-input-tip
Data Attributes
name="scheduler_nonce"name="deleteschedule"name="schedule[display]"name="schedule[interval]"name="save"
FAQ

Frequently Asked Questions about Cronjob Scheduler