iCal Feeds Security & Risk Analysis

wordpress.org/plugins/ical-feeds

Generate a customizable iCal feed of your present and future blog posts.

100 active installs v1.5.3 PHP + WP 3.0+ Updated May 13, 2024
feedfutureicalpostsuri-lv
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEApr 10, 2025
Safety Verdict

Is iCal Feeds Safe to Use in 2026?

Use With Caution

Score 64/100

iCal Feeds has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Apr 10, 2025Updated 2yr ago
Risk Assessment

The "ical-feeds" v1.5.3 plugin exhibits a mixed security posture. While the static analysis shows no directly exposed attack surface (AJAX handlers, REST API, shortcodes, cron events) without authentication, and all SQL queries utilize prepared statements, significant concerns arise from the output escaping and the vulnerability history. The fact that 0% of the 45 identified outputs are properly escaped is a critical weakness, strongly indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. This is further corroborated by the vulnerability history, which lists a past medium severity XSS vulnerability. The single identified flow with unsanitized paths in the taint analysis, though not rated critical or high in the static analysis, combined with the unescaped output, paints a concerning picture for user-supplied data that might be rendered. The plugin has one unpatched medium-severity CVE, which is a direct and significant risk that needs immediate attention. Despite the absence of obvious entry points and secure SQL practices, the critical lack of output escaping and the outstanding vulnerability demand caution.

Key Concerns

  • Unpatched medium severity CVE
  • No properly escaped output found
  • Flow with unsanitized paths detected
Vulnerabilities
1 published

iCal Feeds Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-32528medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

iCal Feeds <= 1.5.3 - Reflected Cross-Site Scripting

Apr 10, 2025Unpatched
Version History

iCal Feeds Release Timeline

v1.61 CVE
v1.5.3Current1 CVE
v1.5.11 CVE
v1.51 CVE
v1.4.21 CVE
v1.4.11 CVE
v1.41 CVE
v1.31 CVE
v1.2.51 CVE
v1.2.41 CVE
v1.2.31 CVE
v1.2.21 CVE
v1.2.11 CVE
v1.21 CVE
v1.11 CVE
Code Analysis
Analyzed Mar 16, 2026

iCal Feeds Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
45
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped45 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
icalfeeds_feed (ical-feeds.php:284)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

iCal Feeds Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuical-feeds.php:18
actioninitical-feeds.php:531
actionwp_headical-feeds.php:539
Maintenance & Trust

iCal Feeds Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 13, 2024
PHP min version
Downloads10K

Community Trust

Rating80/100
Number of ratings6
Active installs100
Developer Profile

iCal Feeds Developer Profile

maximevalette

3 plugins · 310 total installs

80
trust score
Avg Security Score
80/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect iCal Feeds

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<a href="" target="_blank"></a> — Public iCal feed
FAQ

Frequently Asked Questions about iCal Feeds