
LAUTI Calendar Security & Risk Analysis
wordpress.org/plugins/lauti-calendarDisplay events from your LAUTI instance on your WordPress site as a list or timetable. Ships with simple, adjustable CSS.
Is LAUTI Calendar Safe to Use in 2026?
Generally Safe
Score 100/100LAUTI Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "lauti-calendar" v1.0.0 plugin exhibits a strong adherence to several key WordPress security best practices based on the provided static analysis. The absence of any detected dangerous functions, the exclusive use of prepared statements for SQL queries, and the 100% proper output escaping of all identified outputs are highly positive indicators of secure coding. Furthermore, the lack of reported vulnerabilities in its history suggests a stable and well-maintained codebase to date. The limited attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, further contributes to its current secure posture. However, a significant concern is the complete absence of nonce checks and capability checks. This, combined with the single external HTTP request which is also not explicitly secured by any form of authentication or authorization, represents a potential blind spot. While current analysis shows no exploitable flows, the lack of these fundamental security mechanisms leaves the plugin vulnerable to CSRF and unauthorized access if its functionality were to change or if new attack vectors were discovered that could leverage the external HTTP request.
In conclusion, the plugin's current implementation demonstrates good defensive coding in several areas, particularly in data handling and output. The negligible attack surface and clean vulnerability history are commendable. Nevertheless, the omission of nonce and capability checks, and the unprotected external HTTP request, are critical oversights that significantly undermine its overall security. These omissions represent a substantial risk, as they fail to implement basic safeguards against common web vulnerabilities that could be exploited by malicious actors. Addressing these specific weaknesses would drastically improve the plugin's security posture.
Key Concerns
- Missing nonce checks
- Missing capability checks
- External HTTP request without authentication
LAUTI Calendar Security Vulnerabilities
LAUTI Calendar Release Timeline
LAUTI Calendar Code Analysis
Output Escaping
LAUTI Calendar Attack Surface
WordPress Hooks 6
Maintenance & Trust
LAUTI Calendar Maintenance & Trust
Maintenance Signals
Community Trust
LAUTI Calendar Alternatives
Timetable and Event Schedule by MotoPress
mp-timetable
Smart event organizer and time-management tool with a clean minimalist design for featuring your timetables and upcoming events.
Fair Timetable
fair-timetable
A Gutenberg block system for creating beautiful, responsive event timetables.
The Events Calendar
the-events-calendar
The Events Calendar: #1 calendar plugin for WordPress. Create/manage events (virtual too!) on your site with the free plugin.
LatePoint – Calendar Booking Plugin for Appointments and Events
latepoint
Optimize your appointment scheduling with our plugin. Sync calendars, automate reminders, and keep your bookings organized.
Events Manager – Calendar, Bookings, Tickets, and more!
events-manager
Events calendar with bookings, scheduling, appointments, event registration, tickets, recurring events, and venue management.
LAUTI Calendar Developer Profile
1 plugin · 0 total installs
How We Detect LAUTI Calendar
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/lauti-calendar/css/lauti-calendar-admin.css/wp-content/plugins/lauti-calendar/js/lauti-calendar-admin.jsjs/lauti-calendar-admin.jslauti-calendar/css/lauti-calendar-admin.css?ver=lauti-calendar/js/lauti-calendar-admin.js?ver=