Luzid Content Scheduler Security & Risk Analysis

wordpress.org/plugins/luzid-content-scheduler

Show/hide frontend content blocks (banners, alerts, divs) with schedules, recurring rules and exceptions — via CSS class or shortcode.

0 active installs v1.4.3 PHP 7.4+ WP 6.0+ Updated Mar 6, 2026
bannercontentpagebuilderschedulershortcode
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Luzid Content Scheduler Safe to Use in 2026?

Generally Safe

Score 100/100

Luzid Content Scheduler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 29d ago
Risk Assessment

The "luzid-content-scheduler" v1.4.3 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, cron events, and file operations significantly reduces the plugin's attack surface. Furthermore, the code demonstrates good security practices by using prepared statements for all SQL queries and properly escaping a high percentage of its outputs. The presence of nonce and capability checks also indicates an effort to protect against common WordPress vulnerabilities. The plugin's vulnerability history being clean, with no known CVEs, further supports this positive assessment.

However, one significant concern is highlighted by the taint analysis: a single flow with an unsanitized path. While rated as "critical severity: 0" and "high severity: 0" within the taint analysis itself, the existence of such a flow, even if not currently exploitable or of low severity, warrants attention. This indicates a potential weakness where user-supplied data might not be adequately sanitized before being used in a sensitive operation, which could lead to unforeseen issues or be leveraged in conjunction with other vulnerabilities. The presence of two shortcodes also presents a potential entry point, though the static analysis indicates no unprotected ones.

In conclusion, "luzid-content-scheduler" v1.4.3 is commendably secure in many aspects, with robust handling of SQL and output, and a clean vulnerability history. The primary area for improvement lies in rigorously addressing the single identified unsanitized path flow to ensure complete security against potential path traversal or similar attacks, even if the current risk is assessed as low.

Key Concerns

  • Flow with unsanitized path
Vulnerabilities
None known

Luzid Content Scheduler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Luzid Content Scheduler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
245 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

96% escaped256 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<luzid-content-scheduler> (luzid-content-scheduler.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Luzid Content Scheduler Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[luzid_cs] luzid-content-scheduler.php:291
[luzid_cs_eventtable] luzid-content-scheduler.php:292
WordPress Hooks 4
actionadmin_menuluzid-content-scheduler.php:288
actionadmin_enqueue_scriptsluzid-content-scheduler.php:289
filterbody_classluzid-content-scheduler.php:295
actionwp_enqueue_scriptsluzid-content-scheduler.php:296
Maintenance & Trust

Luzid Content Scheduler Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 6, 2026
PHP min version7.4
Downloads270

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Luzid Content Scheduler Developer Profile

luzidmedia

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Luzid Content Scheduler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/luzid-content-scheduler/lcs-admin.css/wp-content/plugins/luzid-content-scheduler/lcs-admin.js/wp-content/plugins/luzid-content-scheduler/lcs-frontend.css/wp-content/plugins/luzid-content-scheduler/lcs-frontend.js
Script Paths
/wp-content/plugins/luzid-content-scheduler/lcs-admin.js/wp-content/plugins/luzid-content-scheduler/lcs-frontend.js
Version Parameters
luzid-content-scheduler/lcs-admin.css?ver=luzid-content-scheduler/lcs-admin.js?ver=luzid-content-scheduler/lcs-frontend.css?ver=luzid-content-scheduler/lcs-frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
lcs-wraplcs-headerlcs-boxlcs-header__rowlcs-h1lcs-textlcs-text--mutedlcs-box--sub+2 more
HTML Comments
// phpcs:ignore WordPress.Security.NonceVerification.Recommended// phpcs:ignore WordPress.Security.ValidatedSanitizedInput.InputNotSanitized
Data Attributes
data-lcs-scheduler-id
JS Globals
LCS_i18nLCS_scheduler_entriesLCS_scheduler_is_enLCS_scheduler_nonceLCS_scheduler_id_to_editLCS_scheduler_is_new_entry+8 more
Shortcode Output
[lcs_next_event][luzid_content_scheduler]
FAQ

Frequently Asked Questions about Luzid Content Scheduler