iCal for WP Calendar Security & Risk Analysis

wordpress.org/plugins/ical-for-wp-calendar

An extension for the Wordpress plugin WP Calendar, which generates iCal / RFC5545 / RFC2445 conform files.

30 active installs v1.5.1 PHP + WP 3.0+ Updated Oct 17, 2016
feedicalical-feedicalendarwp-calendar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is iCal for WP Calendar Safe to Use in 2026?

Generally Safe

Score 85/100

iCal for WP Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The static analysis of ical-for-wp-calendar v1.5.1 reveals a mixed security posture. While the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and having no recorded vulnerabilities (CVEs), several concerning signals emerge from the code analysis. The presence of the `create_function` function is a significant red flag, as it is deprecated and can be a vector for code injection if used with untrusted input. Furthermore, a very low percentage (17%) of output escaping indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website. The lack of any identified attack surface points (AJAX handlers, REST API routes, shortcodes, cron events) is positive, as it limits direct entry points for attackers. However, the substantial amount of unescaped output and the use of `create_function` significantly outweigh these positives, posing a tangible risk to users. The absence of any historical vulnerabilities might suggest a lack of active exploitation or that past issues were minor, but it doesn't negate the current code risks.

Key Concerns

  • Dangerous function create_function used
  • Low output escaping percentage (17%)
  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

iCal for WP Calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

iCal for WP Calendar Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
5
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functioncreate_function(ical-wp-calendar.php:333

Output Escaping

17% escaped6 total outputs
Attack Surface

iCal for WP Calendar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initical-wp-calendar-admin.php:17
actionplugins_loadedical-wp-calendar.php:28
actionadmin_menuical-wp-calendar.php:30
filterquery_varsical-wp-calendar.php:31
actionadmin_noticesical-wp-calendar.php:331
Maintenance & Trust

iCal for WP Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedOct 17, 2016
PHP min version
Downloads46K

Community Trust

Rating20/100
Number of ratings1
Active installs30
Developer Profile

iCal for WP Calendar Developer Profile

barclay_reg

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect iCal for WP Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ical-for-wp-calendar/ical-wp-calendar.php
Version Parameters
ical-for-wp-calendar/ical-wp-calendar.php?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- THIS IS THE BEGINNING OF THE IGNORE SECTION --><!-- THIS IS THE END OF THE IGNORE SECTION -->
FAQ

Frequently Asked Questions about iCal for WP Calendar