
Default Post Date and Time Security & Risk Analysis
wordpress.org/plugins/default-post-datetimeSet the default date and time when you create a new post.
Is Default Post Date and Time Safe to Use in 2026?
Generally Safe
Score 85/100Default Post Date and Time has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'default-post-datetime' plugin v1.3.1 exhibits a strong security posture in terms of its attack surface and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, and cron events, particularly without authentication checks, significantly limits potential entry points for attackers. Furthermore, the plugin has no recorded vulnerabilities, including CVEs, which suggests a history of stable and secure development. This lack of a vulnerability history also implies that if any issues were present, they have been addressed or were not severe enough to warrant public disclosure.
However, the static analysis reveals several areas of concern that could lead to security weaknesses if not managed carefully. The presence of a SQL query that does not use prepared statements is a significant risk, potentially opening the door to SQL injection vulnerabilities. Additionally, a substantial number of output operations are not properly escaped, which poses a risk of Cross-Site Scripting (XSS) attacks. While capability checks are in place, the lack of nonce checks on potential entry points (though none were identified in the attack surface) and the fact that a portion of output is unescaped are notable weaknesses.
In conclusion, while the plugin benefits from a minimal attack surface and a clean vulnerability history, the identified code signals, specifically the unescaped output and raw SQL query, represent tangible security risks. The plugin's current version does not appear to have known exploitable vulnerabilities, but these underlying code practices necessitate attention to prevent future security incidents. A proactive approach to code review and updating these specific areas would further solidify its security.
Key Concerns
- SQL queries without prepared statements
- Unescaped output detected
Default Post Date and Time Security Vulnerabilities
Default Post Date and Time Code Analysis
SQL Query Safety
Output Escaping
Default Post Date and Time Attack Surface
WordPress Hooks 8
Maintenance & Trust
Default Post Date and Time Maintenance & Trust
Maintenance Signals
Community Trust
Default Post Date and Time Alternatives
Loginizer
loginizer
Loginizer is a WordPress security plugin which helps you fight against bruteforce attacks.
Redux Framework
redux-framework
Redux is a simple, truly extensible, and fully responsive options framework for WordPress themes and plugins. It ships with an integrated demo.
LightStart – Maintenance Mode, Coming Soon and Landing Page Builder
wp-maintenance-mode
Easy Drag & Drop Page Builder that adds a splash page to your site that it's perfect for a coming soon page, maintenance or landing page.
Admin Menu Editor
admin-menu-editor
Lets you edit the WordPress admin menu. You can re-order, hide or rename menus, add custom menus and more.
Adminimize
adminimize
Adminimize that lets you hide 'unnecessary' items from the WordPress backend
Default Post Date and Time Developer Profile
34 plugins · 8K total installs
How We Detect Default Post Date and Time
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
default-post-datetime/style.css?ver=default-post-datetime/script.js?ver=HTML / DOM Fingerprints
wrapfieldsetlegend