DayOfWeek Security & Risk Analysis

wordpress.org/plugins/day-of-week

This plugin provides an easy, lightweight way to show content based on the day of the week.

300 active installs v2.0.0 PHP 7.0+ WP 5.0+ Updated Feb 8, 2026
dailyday-of-weekschedulescheduledweekly
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DayOfWeek Safe to Use in 2026?

Generally Safe

Score 100/100

DayOfWeek has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "day-of-week" plugin version 2.0.0 exhibits a generally strong security posture based on the provided static analysis. The code demonstrates good development practices, with 100% of SQL queries using prepared statements and all output properly escaped, which are crucial for preventing common web vulnerabilities. The plugin also avoids risky operations like file manipulations and external HTTP requests. The absence of known CVEs and a clean vulnerability history further contribute to its positive security profile.

However, there are a few areas that warrant attention. The plugin relies on a single shortcode as its sole entry point, which, while not unprotected in this instance, represents a potential attack surface that could become a concern if functionality expands. More significantly, the complete lack of nonce checks is a notable weakness. While there are no AJAX handlers or REST API routes exposed without authentication, shortcodes can still be invoked with user-supplied data. The absence of nonce checks means that logged-in users, if tricked into executing a malicious shortcode invocation, could potentially trigger unintended actions. The single capability check present is a positive step, but it doesn't fully mitigate the risk associated with user-controlled inputs in shortcodes.

In conclusion, the "day-of-week" plugin v2.0.0 is commendably secure in many aspects, particularly regarding data handling and output sanitization. Its vulnerability-free history is a significant strength. The primary concern lies in the potential for Cross-Site Request Forgery (CSRF) due to the absence of nonce checks on its shortcode, which could be exploited if the shortcode processes any user-controllable data. Addressing this would elevate its security posture further.

Key Concerns

  • Missing nonce checks on shortcodes
Vulnerabilities
None known

DayOfWeek Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

DayOfWeek Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
43 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped43 total outputs
Attack Surface

DayOfWeek Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[showday] dayofweek.php:577
WordPress Hooks 5
actionadmin_menudayofweek.php:576
actionadmin_initdayofweek.php:578
actioninitdayofweek.php:579
actionwidgets_initdayofweek.php:580
actionadmin_enqueue_scriptsdayofweek.php:586
Maintenance & Trust

DayOfWeek Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 8, 2026
PHP min version7.0
Downloads15K

Community Trust

Rating92/100
Number of ratings5
Active installs300
Developer Profile

DayOfWeek Developer Profile

Peachy Software

2 plugins · 390 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DayOfWeek

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/day-of-week/images/peach100.png?

HTML / DOM Fingerprints

CSS Classes
dow-settings-containerdow-info-bannerdow-info-contentdow-info-logodow-info-textdow-options-section
Data Attributes
data-settings
Shortcode Output
[showday][showday day="Mon"][showday day="all"][showday day="weekdays"]
FAQ

Frequently Asked Questions about DayOfWeek