Front Page Scheduler Security & Risk Analysis

wordpress.org/plugins/front-page-scheduler

Choose an alternate static front page to a specific daily period.

200 active installs v0.1.92 PHP + WP 5.0+ Updated Dec 3, 2025
cmsfront-pagefrontpageschedulescheduler
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Front Page Scheduler Safe to Use in 2026?

Generally Safe

Score 100/100

Front Page Scheduler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The front-page-scheduler plugin v0.1.92 exhibits a strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, the code signals indicate a lack of dangerous functions, no raw SQL queries (all use prepared statements), no file operations, and no external HTTP requests. This suggests a well-written and secure codebase with no obvious vulnerabilities.

The plugin also shows a clean vulnerability history, with zero known CVEs. This, combined with the positive static analysis, indicates a developer who prioritizes security or has not yet encountered significant security flaws. The absence of taint analysis findings further reinforces this. While the high percentage of properly escaped output (82%) is good, there's a minor area for improvement as 18% remains unescaped.

In conclusion, the front-page-scheduler plugin appears to be very secure. Its minimal attack surface and the absence of critical code signals or historical vulnerabilities make it a low-risk plugin. The primary, albeit minor, concern is the small percentage of unescaped output, which could theoretically lead to cross-site scripting if specific input vectors were present, though no such vectors were identified in the analysis.

Key Concerns

  • Unescaped output present
Vulnerabilities
None known

Front Page Scheduler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Front Page Scheduler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

82% escaped11 total outputs
Attack Surface

Front Page Scheduler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_initfront-page-scheduler.php:21
filteroption_show_on_frontfront-page-scheduler.php:23
filteroption_page_on_frontfront-page-scheduler.php:25
filterplugin_action_linksfront-page-scheduler.php:146
actionadmin_enqueue_scriptsfront-page-scheduler.php:148
actioninitfront-page-scheduler.php:315
Maintenance & Trust

Front Page Scheduler Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version
Downloads12K

Community Trust

Rating92/100
Number of ratings9
Active installs200
Developer Profile

Front Page Scheduler Developer Profile

Ederson Peka

6 plugins · 540 total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
742 days
View full developer profile
Detection Fingerprints

How We Detect Front Page Scheduler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/front-page-scheduler/css/admin.css/wp-content/plugins/front-page-scheduler/js/admin.js
Script Paths
/wp-content/plugins/front-page-scheduler/js/admin.js
Version Parameters
front-page-scheduler/css/admin.css?ver=front-page-scheduler/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
front-page-scheduler-rulesfps-remove-rulefps-add-rule
Data Attributes
data-fps-rules
JS Globals
front_page_scheduler_admin
FAQ

Frequently Asked Questions about Front Page Scheduler