
Future Posts Calendar Security & Risk Analysis
wordpress.org/plugins/future-posts-calendarThis plugin adds a monthly calendar that shows all the dates you have future posts.
Is Future Posts Calendar Safe to Use in 2026?
Generally Safe
Score 85/100Future Posts Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "future-posts-calendar" v1.6.3 exhibits a generally positive security posture with no recorded vulnerabilities or critical code signals. The static analysis reveals a small attack surface, with zero entry points identified, which is a strong indicator of good initial design practices. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests contributes to its security. However, a significant concern arises from the SQL queries; all four queries are executed without prepared statements, exposing the plugin to potential SQL injection vulnerabilities. Additionally, the low percentage (23%) of properly escaped output suggests that sensitive data might be exposed without adequate sanitization, potentially leading to cross-site scripting (XSS) attacks.
The vulnerability history is clean, with zero known CVEs, which is a very positive sign. This, combined with the lack of taint analysis findings, suggests that the plugin has historically been secure and its developers are likely attentive to security. However, the absence of vulnerability history doesn't negate the risks identified in the static analysis. The lack of nonce and capability checks across all identified entry points, though minimal in number, means that any newly discovered or introduced entry points could be exploited without proper authentication or authorization.
In conclusion, while the plugin's attack surface and historical vulnerability record are commendable, the direct use of raw SQL and insufficient output escaping are critical weaknesses that require immediate attention. These oversights represent tangible risks that could be exploited by attackers, despite the plugin's otherwise clean record. Addressing these specific code issues will significantly strengthen its overall security.
Key Concerns
- SQL queries without prepared statements
- Low percentage of properly escaped output
- No nonce checks found
- No capability checks found
Future Posts Calendar Security Vulnerabilities
Future Posts Calendar Code Analysis
SQL Query Safety
Output Escaping
Future Posts Calendar Attack Surface
WordPress Hooks 2
Maintenance & Trust
Future Posts Calendar Maintenance & Trust
Maintenance Signals
Community Trust
Future Posts Calendar Alternatives
Scheduled Posts Showcase
scheduled-posts-showcase
Display your scheduled and future posts on the frontend without generating 404 links. Show visitors what's coming next.
Editorial Calendar
editorial-calendar
0ddcemmihs4a843ekhaoofzosrunf4bl Editorial Calendar allows you to view all your posts, schedule post, make quick edits, and manage your blog by draggi …
Nelio Content – Editorial Calendar & Social Media Auto-Posting
nelio-content
Editorial calendar and social media auto-posting for WordPress. Plan content, schedule shares, and grow reach with powerful automations.
Tabs in Post Editor
tabs-in-post-editor
Write code in the WP post editor? Hate not being able to use [tab]s? Now you can.
Post Update Add-On – Gravity Forms
post-update-addon-gravity-forms
Update/Edit a post or a custom post type posts with Gravity Forms.
Future Posts Calendar Developer Profile
6 plugins · 1K total installs
How We Detect Future Posts Calendar
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/future-posts-calendar/future_calendar.php?ver=HTML / DOM Fingerprints
wp-calendarUncomment the following line if you want to have the calendar appear as a widget on the dashboard.Add Dashboard Widget via function wp_add_dashboard_widget()jjaammfuture_calendarclosedpostboxesnoncemeta-box-order-noncefcal_set_datefcal_javascript