
Default Post Date Security & Risk Analysis
wordpress.org/plugins/default-post-dateDefine an individual default post date that is to be used when adding a new post.
Is Default Post Date Safe to Use in 2026?
Generally Safe
Score 85/100Default Post Date has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'default-post-date' plugin v1.5.1 exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, such as AJAX handlers, REST API routes, shortcodes, or cron events, significantly limits potential entry points for attackers. Furthermore, the lack of dangerous function calls and external HTTP requests further contributes to its secure design. The plugin also demonstrates good practices in terms of taint analysis, with no identified flows indicating potential vulnerabilities.
However, there are a few areas for concern that temper an otherwise positive assessment. The presence of one SQL query that does not use prepared statements is a notable weakness, as this can be a vector for SQL injection vulnerabilities, especially if the query handles user-supplied data. Additionally, only 40% of output escaping is properly handled, meaning 60% of outputs are potentially vulnerable to Cross-Site Scripting (XSS) attacks. The complete absence of nonce and capability checks, while seemingly less critical given the limited attack surface, could become a risk if new functionalities are added that introduce user-facing interactions or administrative actions.
The plugin's vulnerability history shows no recorded CVEs, which is a significant strength and suggests a history of responsible development. This, combined with the limited identified code risks, paints a picture of a generally secure plugin. However, the identified issues in SQL query preparation and output escaping, while not currently exploited in known vulnerabilities, represent genuine risks that should be addressed to maintain a high level of security.
Key Concerns
- Raw SQL without prepared statements
- Low percentage of properly escaped output
- No nonce checks
- No capability checks
Default Post Date Security Vulnerabilities
Default Post Date Code Analysis
SQL Query Safety
Output Escaping
Default Post Date Attack Surface
WordPress Hooks 4
Maintenance & Trust
Default Post Date Maintenance & Trust
Maintenance Signals
Community Trust
Default Post Date Alternatives
Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories
post-expirator
PublishPress Future can make scheduled changes to your content. You can unpublish posts, move posts to a new status, update the categories, and more.
Bulk Post Update Date
bulk-post-update-date
Change the Post Update date for all posts and pages in one click. This will help your blog in search engines and your blog will look alive.
Auto Update Post Date
auto-update-post-date
Keep your WordPress content evergreen with Auto Update Post Date – a FREE simple WP plugin designed to effortlessly update your posts and boost SEO
Date Published Shortcode
date-published-shortcode
Automatically puts in the date that the post was published, using the shortcode [post_published].
Bulk Post Status Update
bulk-post-status-update
The users can change the status of posts and custom posts to draft and publish them in bulk.
Default Post Date Developer Profile
6 plugins · 2K total installs
How We Detect Default Post Date
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/default-post-date/assets/js/admin.min.js/wp-content/plugins/default-post-date/assets/js/admin.js/wp-content/plugins/default-post-date/assets/js/admin.min.js/wp-content/plugins/default-post-date/assets/js/admin.jsdefault-post-date/assets/js/admin.min.js?ver=default-post-date/assets/js/admin.js?ver=HTML / DOM Fingerprints
defaultPostDateSettings