
GCal Days Security & Risk Analysis
wordpress.org/plugins/gcal-daysShortcode and functions to query your Google Calendar for the number of days since or until the most recent event matching your search criteria.
Is GCal Days Safe to Use in 2026?
Generally Safe
Score 85/100GCal Days has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The gcal-days v1.2 plugin exhibits a generally good security posture, with no documented vulnerabilities or critical code signals. The absence of any recorded CVEs and the fact that all SQL queries use prepared statements are positive indicators. The plugin also demonstrates a commitment to secure coding practices by properly escaping all identified outputs, which significantly reduces the risk of cross-site scripting (XSS) vulnerabilities. The plugin's attack surface is also zero, meaning there are no exposed entry points like AJAX handlers, REST API routes, or shortcodes that could be directly targeted without authentication.
However, there are areas for improvement that prevent a perfect security score. The plugin lacks any explicit nonce checks or capability checks for its operations. While the static analysis did not reveal any AJAX handlers or REST API routes, the absence of these checks in general coding practice suggests a potential oversight in securing against potential CSRF (Cross-Site Request Forgery) or unauthorized actions if any new entry points were to be introduced in the future. Additionally, the plugin makes three external HTTP requests, and without detailed analysis of these requests, there's a minor unknown risk associated with how these external resources are handled and whether they could be a vector for supply chain attacks or data leakage.
In conclusion, gcal-days v1.2 is a secure plugin with no known vulnerabilities and strong coding practices in place for SQL and output handling. The primary areas for concern are the complete lack of nonce and capability checks, which, while not immediately exploitable given the current zero attack surface, represent a gap in robust security implementation. The external HTTP requests also introduce a minor, unquantified risk. Overall, the plugin is low risk, but further hardening of its internal mechanisms would improve its resilience.
Key Concerns
- No nonce checks detected
- No capability checks detected
- External HTTP requests detected
GCal Days Security Vulnerabilities
GCal Days Release Timeline
GCal Days Code Analysis
Output Escaping
GCal Days Attack Surface
WordPress Hooks 8
Maintenance & Trust
GCal Days Maintenance & Trust
Maintenance Signals
Community Trust
GCal Days Alternatives
Google Calendar Widget & Short Code
wpgcal
Adds a widget and shortcode to display or embed Google Calendars in WordPress.
Pretty Google Calendar
pretty-google-calendar
Embedded Google Calendars that don't suck.
Legacy Google Calendar Events 2.4
legacy-google-calendar-events
Fork of the Google Calendar Events 2.4 WordPress plugin. Intended for backwards compatibility only.
Simple Calendar – Google Calendar Plugin
google-calendar-events
Add Google Calendar events to your WordPress site in minutes. Beautiful calendar displays. Mobile responsive.
The Events Calendar Shortcode & Block
the-events-calendar-shortcode
Add shortcode, block, Elementor and Bricks functionality to The Events Calendar Plugin, so you can easily list and promote your events anywhere.
GCal Days Developer Profile
63 plugins · 92K total installs
How We Detect GCal Days
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
[gcal-days]