Echo Date 4 SEO Security & Risk Analysis

wordpress.org/plugins/echo-date-4-seo

ULTRA Light plugin to add short code in your interface in order to display date of day / month / year in your content as would the php function ‹?php …

0 active installs v1.2.2 PHP 7.4.0+ WP 6.0+ Updated Dec 5, 2025
datedisplay-date-of-current-monthecho-datelong-tailseo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Echo Date 4 SEO Safe to Use in 2026?

Generally Safe

Score 100/100

Echo Date 4 SEO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "echo-date-4-seo" plugin v1.2.2 exhibits a generally good security posture, with no recorded vulnerabilities or critical code signals. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is a positive indicator. The presence of capability checks also suggests some level of access control is being considered. However, a significant concern arises from the complete lack of output escaping. With 21 total outputs and 0% properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed on the frontend without proper sanitization could be exploited. The plugin also lacks nonce checks, which, while not directly tied to a specific entry point without authentication in this analysis, is a general good practice for preventing Cross-Site Request Forgery (CSRF) attacks on its functionalities. While the vulnerability history is clean, the lack of output escaping remains a glaring weakness that needs immediate attention.

Key Concerns

  • All output is unescaped
  • No nonce checks present
Vulnerabilities
None known

Echo Date 4 SEO Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Echo Date 4 SEO Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Echo Date 4 SEO Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
21
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped21 total outputs
Attack Surface

Echo Date 4 SEO Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[years] echodate4seo.php:209
[month] echodate4seo.php:215
[day] echodate4seo.php:229
[day] echodate4seo.php:237
WordPress Hooks 9
actionadmin_initechodate4seo.php:22
actionadmin_menuechodate4seo.php:29
actionadmin_enqueue_scriptsechodate4seo.php:48
filtermce_external_pluginsechodate4seo.php:58
filtermce_buttonsechodate4seo.php:59
actionadmin_initechodate4seo.php:67
filtersingle_post_titleechodate4seo.php:241
filterthe_titleechodate4seo.php:242
actionwp_footerechodate4seo.php:253
Maintenance & Trust

Echo Date 4 SEO Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 5, 2025
PHP min version7.4.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Echo Date 4 SEO Developer Profile

Kapsule Corp

8 plugins · 150 total installs

100
trust score
Avg Security Score
100/100
Avg Patch Time
2 days
View full developer profile
Detection Fingerprints

How We Detect Echo Date 4 SEO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/echo-date-4-seo/tinymscript.js
Script Paths
/wp-content/plugins/echo-date-4-seo/tinymscript.js
Version Parameters
echo-date-4-seo/tinymscript.js?ver=

HTML / DOM Fingerprints

CSS Classes
eko4seo_gotham_ad_wrapeko4seo_gotham_ad_formeko4seo_gotham_ad_crediteko4seo_gotham_ad_wrap #batbaseadmin tr td.libelleeko4seo_gotham_ad_wrap #batbaseadmin inputeko4seo_gotham_ad_wrap #batbaseadmin selecteko4seo_gotham_ad_wrap #batbaseadmin textareaeko4seo_gotham_ad_wrap .explain
Data Attributes
data-mce-btn
JS Globals
kapsuleekodate
FAQ

Frequently Asked Questions about Echo Date 4 SEO