GCal Days Security & Risk Analysis

wordpress.org/plugins/gcal-days

Shortcode and functions to query your Google Calendar for the number of days since or until the most recent event matching your search criteria.

10 active installs v1.2 PHP + WP 3.6+ Updated May 25, 2016
calendardays-sincegcalgoogleshortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GCal Days Safe to Use in 2026?

Generally Safe

Score 85/100

GCal Days has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The gcal-days v1.2 plugin exhibits a generally good security posture, with no documented vulnerabilities or critical code signals. The absence of any recorded CVEs and the fact that all SQL queries use prepared statements are positive indicators. The plugin also demonstrates a commitment to secure coding practices by properly escaping all identified outputs, which significantly reduces the risk of cross-site scripting (XSS) vulnerabilities. The plugin's attack surface is also zero, meaning there are no exposed entry points like AJAX handlers, REST API routes, or shortcodes that could be directly targeted without authentication.

However, there are areas for improvement that prevent a perfect security score. The plugin lacks any explicit nonce checks or capability checks for its operations. While the static analysis did not reveal any AJAX handlers or REST API routes, the absence of these checks in general coding practice suggests a potential oversight in securing against potential CSRF (Cross-Site Request Forgery) or unauthorized actions if any new entry points were to be introduced in the future. Additionally, the plugin makes three external HTTP requests, and without detailed analysis of these requests, there's a minor unknown risk associated with how these external resources are handled and whether they could be a vector for supply chain attacks or data leakage.

In conclusion, gcal-days v1.2 is a secure plugin with no known vulnerabilities and strong coding practices in place for SQL and output handling. The primary areas for concern are the complete lack of nonce and capability checks, which, while not immediately exploitable given the current zero attack surface, represent a gap in robust security implementation. The external HTTP requests also introduce a minor, unquantified risk. Overall, the plugin is low risk, but further hardening of its internal mechanisms would improve its resilience.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
  • External HTTP requests detected
Vulnerabilities
None known

GCal Days Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

GCal Days Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

GCal Days Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
24
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

41% escaped41 total outputs
Attack Surface

GCal Days Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitgcal-days.php:75
filterwidget_textgcal-days.php:76
filterwidget_textgcal-days.php:115
filterwidget_textgcal-days.php:116
actionadmin_initgcal-days.settings.php:57
actionadmin_menugcal-days.settings.php:58
filterplugin_action_links_gcal-days/gcal-days.phpgcal-days.settings.php:67
actionadmin_initgcal-days.settings.php:69
Maintenance & Trust

GCal Days Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMay 25, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GCal Days Developer Profile

Scott Reilly

63 plugins · 92K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
374 days
View full developer profile
Detection Fingerprints

How We Detect GCal Days

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[gcal-days]
FAQ

Frequently Asked Questions about GCal Days