Expire Content Block Security & Risk Analysis

wordpress.org/plugins/expire-content-block

Block that hides or replaces content after a set date/time. Perfect for promotions, events, and temporary announcements.

0 active installs v1.0.0 PHP 7.4+ WP 6.0+ Updated Jan 15, 2026
blockexpiregutenbergscheduletimed-content
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Expire Content Block Safe to Use in 2026?

Generally Safe

Score 100/100

Expire Content Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "expire-content-block" plugin v1.0.0 exhibits a very strong security posture based on the provided static analysis. The plugin has an exceptionally small attack surface, with zero identified entry points that are unprotected. Furthermore, the code demonstrates excellent adherence to secure coding practices, utilizing prepared statements for all SQL queries and properly escaping all outputs. There are no dangerous functions, file operations, or external HTTP requests, which significantly reduces potential attack vectors.

The lack of any identified taint flows, dangerous functions, or recorded historical vulnerabilities is highly positive. This suggests the plugin has been developed with security in mind and has not historically posed a risk to WordPress installations. The presence of capability checks, even if only two, is a good sign that some level of authorization is being considered for its functions.

Overall, this plugin appears to be very secure. The only minor area for potential improvement, although not a current vulnerability, is the complete absence of nonces. While not an issue with the current lack of entry points, if the plugin were to expand its functionality to include AJAX handlers in the future, nonce checks would become a critical security requirement. However, based strictly on the provided data, this plugin is remarkably well-secured.

Vulnerabilities
None known

Expire Content Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Expire Content Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Expire Content Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitexpire-content-block.php:70
Maintenance & Trust

Expire Content Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 15, 2026
PHP min version7.4
Downloads113

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Expire Content Block Developer Profile

zellerpure

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Expire Content Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/expire-content-block/build/index.js/wp-content/plugins/expire-content-block/build/style-index.css/wp-content/plugins/expire-content-block/build/index.css
Script Paths
/wp-content/plugins/expire-content-block/build/index.js
Version Parameters
expire-content-block/build/index.asset.php

HTML / DOM Fingerprints

CSS Classes
ecb-replacement
HTML Comments
<!-- ECB debug: tz=<!-- ECB: invalid expiry date/time -->
JS Globals
window.ecbExpireContent.timezone
Shortcode Output
<div class="ecb-replacement">
FAQ

Frequently Asked Questions about Expire Content Block