Current Year Shortcodes Security & Risk Analysis

wordpress.org/plugins/current-year-shortcodes

Insert the current year, month and day with a shortcode in any page, post or widget of your WordPress site.

1K active installs v0.3 PHP + WP 4.6+ Updated Jan 3, 2024
currentdaymonthshortcodeyear
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Current Year Shortcodes Safe to Use in 2026?

Generally Safe

Score 85/100

Current Year Shortcodes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The 'current-year-shortcodes' plugin version 0.3 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, reliance on prepared statements for SQL queries (though no SQL queries were detected), and 100% proper output escaping are positive indicators. The lack of file operations and external HTTP requests further reduces the potential attack surface. Crucially, there are no recorded vulnerabilities (CVEs) for this plugin, and the historical data shows a clean record, suggesting a consistently secure development practice.

However, there are notable areas that warrant attention. The plugin implements 10 shortcodes, which represent the entire attack surface. While the static analysis indicates no direct vulnerabilities within these shortcodes (e.g., no unsanitized taint flows, missing capability checks, or lack of nonce checks), the sheer number of shortcodes without any explicit authentication or capability checks is a concern. Any future vulnerabilities introduced into these shortcodes, if not properly secured, could be easily exploited due to their unprotected nature. The absence of capability checks for all entry points is a significant oversight that could lead to privilege escalation if a weakness were to be discovered.

In conclusion, 'current-year-shortcodes' v0.3 is currently secure due to the lack of identified vulnerabilities and good coding practices like prepared statements and output escaping. Its primary weakness lies in the unprotected nature of its 10 shortcodes. While the historical record is excellent, the lack of even basic capability checks on its entry points represents a potential risk that could be exploited should any future flaws be introduced.

Key Concerns

  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Current Year Shortcodes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Current Year Shortcodes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Current Year Shortcodes Attack Surface

Entry Points10
Unprotected0

Shortcodes 10

[Y] wp-year-shortcode.php:21
[y] wp-year-shortcode.php:26
[m] wp-year-shortcode.php:31
[n] wp-year-shortcode.php:36
[F] wp-year-shortcode.php:41
[M] wp-year-shortcode.php:46
[d] wp-year-shortcode.php:51
[j] wp-year-shortcode.php:56
[l] wp-year-shortcode.php:61
[D] wp-year-shortcode.php:66
Maintenance & Trust

Current Year Shortcodes Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedJan 3, 2024
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings3
Active installs1K
Developer Profile

Current Year Shortcodes Developer Profile

Lukas

2 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Current Year Shortcodes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[Y][y][m][n]
FAQ

Frequently Asked Questions about Current Year Shortcodes