Easy Bulk Date Editor Security & Risk Analysis

wordpress.org/plugins/easy-bulk-date-editor

Bulk edit WordPress post dates safely and efficiently, now with filtering by category or author and paginated loading for better performance.

10 active installs v1.3.1 PHP 7.2+ WP 5.8+ Updated Jan 1, 2026
bulk-editdatespostsschedulingwordpress-admin
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Easy Bulk Date Editor Safe to Use in 2026?

Generally Safe

Score 100/100

Easy Bulk Date Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "easy-bulk-date-editor" v1.3.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, raw SQL queries, or unescaped output demonstrates a commitment to secure coding practices. Furthermore, the presence of nonce and capability checks on all identified entry points (AJAX handlers) is a significant strength, indicating that unauthorized access or execution is well-mitigated. The lack of any recorded vulnerabilities in its history further reinforces this positive assessment, suggesting a stable and well-maintained codebase.

While the analysis shows no specific code-level risks like unsanitized taint flows or insecure file operations, the total number of entry points, even though protected, is worth noting. A very large attack surface, even with security measures, can inherently increase complexity and potential for undiscovered issues. However, in this specific instance, with zero unprotected entry points and a clean vulnerability history, the overall risk is currently assessed as very low. The plugin's strengths in secure coding and authorization checks significantly outweigh any potential concerns arising from the attack surface size alone.

Vulnerabilities
None known

Easy Bulk Date Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Easy Bulk Date Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Easy Bulk Date Editor Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_easybde_load_postseasy-bulk-date-editor.php:38
authwp_ajax_easybde_save_dateseasy-bulk-date-editor.php:39
WordPress Hooks 2
actionadmin_menueasy-bulk-date-editor.php:36
actionadmin_enqueue_scriptseasy-bulk-date-editor.php:37
Maintenance & Trust

Easy Bulk Date Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 1, 2026
PHP min version7.2
Downloads294

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Easy Bulk Date Editor Developer Profile

Andre Moura

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Easy Bulk Date Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/easy-bulk-date-editor/bde.css/wp-content/plugins/easy-bulk-date-editor/bde.js
Script Paths
/wp-content/plugins/easy-bulk-date-editor/bde.js
Version Parameters
easybde-admin=1.1

HTML / DOM Fingerprints

CSS Classes
easybde-tabseasybde-tabs-naveasybde-tabs-nav lieasybde-tabs-nav buttoneasybde-tabs-nav button.activeeasybde-tab-contenteasybde-tab-content.activeeasybde-plugins-grid+4 more
Data Attributes
data-tab
JS Globals
EasyBDEData
FAQ

Frequently Asked Questions about Easy Bulk Date Editor