Plugin Details: Security & Risk Analysis

wordpress.org/plugins/increase-maximum-execution-time

Description: This plugin is used for increase wordpress Maximum Execution Time to execute long query and data manipulation.

10 active installs v0.1 PHP + WP 3.0+ Updated May 8, 2019
increase-maximum-execution-time-to-10-min
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Plugin Details: Safe to Use in 2026?

Generally Safe

Score 85/100

Plugin Details: has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "increase-maximum-execution-time" plugin, version 0.1, exhibits a strong security posture based on the provided static analysis. There are no identified entry points into the plugin's code that are unprotected by authentication or capability checks, which is an excellent practice. Furthermore, the code demonstrates a commitment to secure coding by not utilizing dangerous functions, performing all SQL queries using prepared statements, and ensuring that all output is properly escaped. The absence of file operations, external HTTP requests, and the explicit lack of bundled libraries further minimize potential attack vectors. The plugin's vulnerability history is completely clean, with zero known CVEs, indicating a history of secure development or thorough vetting.

While the static analysis shows no direct vulnerabilities within the code itself, the primary concern stems from what is *not* present. The plugin's intended function of increasing maximum execution time could potentially be abused if not implemented with extreme care. However, the analysis does not reveal any specific implementation details that would directly indicate a risk. The lack of any attack surface, including AJAX handlers, REST API routes, shortcodes, or cron events, suggests that the plugin's functionality is likely triggered by WordPress core actions or filters, or it is a very simple passive plugin. The absence of nonce checks and capability checks is not necessarily a weakness in this specific case given the zero attack surface and lack of direct user-facing entry points. The overall impression is a plugin that, based on this analysis, is exceptionally secure for its stated (and limited) purpose. It is a strong example of a plugin that avoids common security pitfalls.

Vulnerabilities
None known

Plugin Details: Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Plugin Details: Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Plugin Details: Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filtermax_execution_timeindex.php:16
Maintenance & Trust

Plugin Details: Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedMay 8, 2019
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Alternatives

Plugin Details: Alternatives

No alternatives data available yet.

Developer Profile

Plugin Details: Developer Profile

Deepak Kaushik

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Plugin Details:

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Plugin Details: