Localendar Calendar for WordPress Security & Risk Analysis

wordpress.org/plugins/localendar-for-wordpress

Thanks for checking out the localendar calendar plugin for WordPress. We have been powering web calendars for thousands of sites for over 16 years, an …

400 active installs v1.4 PHP + WP 3.2+ Updated Feb 14, 2019
calendardateeventevents-calendarical
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Localendar Calendar for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Localendar Calendar for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "localendar-for-wordpress" plugin v1.4 exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities, file operations, and external HTTP requests are positive indicators. The plugin also correctly utilizes prepared statements for its SQL queries. However, the static analysis reveals a significant concern regarding output escaping, with only 66% of outputs being properly escaped. This suggests a potential for Cross-Site Scripting (XSS) vulnerabilities, especially if user-supplied data is involved in the unescaped outputs. The lack of nonce checks and capability checks, while not directly flagged as issues in the current analysis (likely due to no AJAX or REST API endpoints being identified as unprotected), represents a potential weakness that could be exploited if new entry points are introduced or if the existing shortcode interacts with sensitive data or actions without proper authorization.

The vulnerability history is completely clean, indicating no known past exploits or issues with this plugin. This, combined with the apparent adherence to secure coding practices in many areas, suggests a development team that is either diligent or fortunate. However, the unescaped output remains a significant concern that cannot be overlooked. The absence of any taint analysis results is noteworthy, but this may simply mean the analysis tool did not identify any flows, not that they don't exist within the unescaped output.

In conclusion, while the plugin demonstrates strengths in many core security areas like SQL and avoiding dangerous functions, the considerable percentage of unescaped output poses a real risk of XSS vulnerabilities. The lack of explicit nonce and capability checks on the identified shortcode, though not directly exploitable without further context, is a potential area for future security hardening. The clean vulnerability history is a positive, but should not overshadow the identified risks within the current code.

Key Concerns

  • Significant unescaped output detected
  • Missing nonce checks on shortcode
  • Missing capability checks on shortcode
Vulnerabilities
None known

Localendar Calendar for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Localendar Calendar for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
62
121 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

66% escaped183 total outputs
Attack Surface

Localendar Calendar for WordPress Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[localendar] localendar.php:111
WordPress Hooks 7
actionwidgets_initlocalendar.php:64
actioninitlocalendar.php:65
actionadmin_enqueue_scriptslocalendar.php:105
filtermedia_buttons_contextlocalendar.php:106
actionadmin_footerlocalendar.php:107
actionwp_enqueue_scriptslocalendar.php:108
filterwidget_textlocalendar.php:112
Maintenance & Trust

Localendar Calendar for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedFeb 14, 2019
PHP min version
Downloads79K

Community Trust

Rating54/100
Number of ratings19
Active installs400
Developer Profile

Localendar Calendar for WordPress Developer Profile

Thomas Griffin

5 plugins · 610 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Localendar Calendar for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/localendar-for-wordpress/lib/images/icon.png/wp-content/plugins/localendar-for-wordpress/lib/js/admin.js/wp-content/plugins/localendar-for-wordpress/lib/js/iColorPicker.js
Script Paths
/wp-content/plugins/localendar-for-wordpress/lib/js/admin.js/wp-content/plugins/localendar-for-wordpress/lib/js/iColorPicker.js

HTML / DOM Fingerprints

CSS Classes
localendar-typeslocalendar-styleslocalendar-eventslocalendar-link-textlocalendar-iframe-widthlocalendar-iframe-heightlocalendar-querylocalendar-bgm-events+1 more
Data Attributes
localendar-userlocalendar-styleslocalendar-eventslocalendar-link-textlocalendar-iframe-widthlocalendar-iframe-height+3 more
JS Globals
insertCalendar
Shortcode Output
[localendarusername=type=style=
FAQ

Frequently Asked Questions about Localendar Calendar for WordPress