Draft Concluder Security & Risk Analysis

wordpress.org/plugins/draft-concluder

Email users that have outstanding drafts.

0 active installs v1.1.3 PHP 7.4+ WP 4.6+ Updated Dec 2, 2025
draftsemailpagespostsreminder
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Draft Concluder Safe to Use in 2026?

Generally Safe

Score 100/100

Draft Concluder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The 'draft-concluder' v1.1.3 plugin exhibits a generally good security posture, adhering to several best practices. The static analysis reveals no direct SQL injection risks due to the exclusive use of prepared statements for its queries. Furthermore, the absence of file operations and external HTTP requests limits the plugin's ability to introduce vulnerabilities related to file manipulation or remote code execution. The limited attack surface, with no unprotected AJAX handlers or REST API routes, is also a positive sign.

However, concerns arise from the output escaping. With 64 total outputs and only 41% properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, or data that can be manipulated by users, might be rendered directly in the browser without proper sanitization, allowing attackers to inject malicious scripts. The complete lack of nonce checks and capability checks also presents a potential weakness, especially considering the presence of shortcodes and cron events which could potentially be triggered by unauthenticated users or users with insufficient privileges if not properly secured within their respective execution contexts.

The plugin's vulnerability history is clean, with no recorded CVEs. This suggests a history of responsible development or at least no publicly disclosed vulnerabilities. While this is a positive indicator, it does not negate the risks identified in the static analysis. The strengths lie in its controlled entry points and secure database interactions, but the significant amount of unescaped output represents a clear and present danger that requires immediate attention.

Key Concerns

  • Insufficient output escaping (XSS risk)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Draft Concluder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Draft Concluder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
38
26 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

41% escaped64 total outputs
Attack Surface

Draft Concluder Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[dc_now] draft-concluder.php:550
[dc_last_run] draft-concluder.php:587
WordPress Hooks 5
filterplugin_row_metadraft-concluder.php:54
filterplugin_action_linksdraft-concluder.php:83
actionadmin_initdraft-concluder.php:120
actiondraft_concluder_mailerdraft-concluder.php:142
actionadmin_initdraft-concluder.php:175

Scheduled Events 1

draft_concluder_mailer
Maintenance & Trust

Draft Concluder Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 2, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Draft Concluder Developer Profile

David Artiss

8 plugins · 11K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
11 days
View full developer profile
Detection Fingerprints

How We Detect Draft Concluder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Draft Concluder