Delete Comments on a Schedule Security & Risk Analysis

wordpress.org/plugins/delete-comments-on-a-schedule

Ce plugin vous permet de nettoyer facilement votre base de données en supprimant les spams et les commentaires modérés qui encombrent votre site.

0 active installs v1.0.0 PHP 5.6+ WP 3.0+ Updated Unknown
commentairesmoderationnettoyagespamsuppression-automatique
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Delete Comments on a Schedule Safe to Use in 2026?

Generally Safe

Score 100/100

Delete Comments on a Schedule has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'delete-comments-on-a-schedule' plugin v1.0.0 demonstrates a strong adherence to several security best practices, which is a positive indicator. The absence of dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are commendable. Furthermore, the plugin has no recorded vulnerability history, suggesting a stable and well-maintained codebase.

However, significant concerns arise from the lack of capability checks and nonce checks, coupled with a low rate of output escaping (29%). While the attack surface is currently minimal (0 AJAX, 0 REST API, 0 shortcodes), the presence of a cron event, without any explicit authentication or authorization mechanisms tied to its execution, presents a potential risk. If this cron event were to be triggered or manipulated externally, it could lead to unintended actions without proper validation. The taint analysis showing no flows is good, but this is often a result of an extremely limited or non-existent attack surface for taint analysis to traverse.

In conclusion, while the plugin benefits from a clean vulnerability history and good practices in data handling (SQL prepared statements), the significant gaps in authentication, authorization, and output sanitization for its cron event are notable weaknesses. These vulnerabilities could potentially be exploited if the cron event's execution context is compromised or if its logic is indirectly influenced by user input that is not properly escaped.

Key Concerns

  • No capability checks implemented
  • No nonce checks implemented
  • Low output escaping rate (29%)
  • Cron event without authentication/authorization
Vulnerabilities
None known

Delete Comments on a Schedule Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Delete Comments on a Schedule Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

29% escaped7 total outputs
Attack Surface

Delete Comments on a Schedule Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedbenawp-delete-comments-schedule.php:36
actionbenawp_dcos_hookincludes\benawp-delete-comments-query.php:4
actionadmin_initincludes\benawp-delete-comments-settings.php:4

Scheduled Events 1

benawp_dcos_hook
Maintenance & Trust

Delete Comments on a Schedule Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedUnknown
PHP min version5.6
Downloads839

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Delete Comments on a Schedule Developer Profile

Bena WP

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Delete Comments on a Schedule

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Delete Comments on a Schedule