Day Spelled Security & Risk Analysis

wordpress.org/plugins/day-spelled

This plugin enables you to insert a multi-lingual date with the day and month spelled out, anywhere in a site where a shortcode can be used.

20 active installs v1.6 PHP + WP 3.0+ Updated Unknown
day-nameinsert-datemonth-namespell-daytranslate-date
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Day Spelled Safe to Use in 2026?

Generally Safe

Score 100/100

Day Spelled has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "day-spelled" v1.6 plugin exhibits a generally positive security posture with a minimal attack surface and a complete lack of recorded vulnerabilities. The absence of dangerous functions, external HTTP requests, file operations, and SQL queries utilizing prepared statements are strong indicators of good coding practices.

However, a significant concern arises from the complete absence of output escaping, meaning all six identified output points are potentially vulnerable to cross-site scripting (XSS) attacks. While the static analysis and taint analysis found no immediate critical or high-severity issues, the unescaped output presents a tangible risk. The lack of nonce and capability checks, while not directly tied to entry points in this specific analysis, could become a weakness if new AJAX or REST API endpoints are introduced without proper security considerations.

Given the clean vulnerability history, it suggests diligent maintenance or a lack of targeted attacks. Nevertheless, the unescaped output is a critical flaw that needs immediate attention. The plugin's strengths lie in its limited attack surface and clean track record, but the unescaped output is a significant weakness that detracts from its overall security.

Key Concerns

  • All output is unescaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Day Spelled Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Day Spelled Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Day Spelled Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[dayspell] day-spelled.php:106
WordPress Hooks 3
actionadmin_menuday-spelled-help.php:223
actioninitday-spelled-help.php:226
actioninitlocalization.php:10
Maintenance & Trust

Day Spelled Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Alternatives

Day Spelled Alternatives

No alternatives data available yet.

Developer Profile

Day Spelled Developer Profile

Living Fossil

2 plugins · 50 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Day Spelled

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[dayspell when='yyyy-mm-dd']
FAQ

Frequently Asked Questions about Day Spelled