Manual Cron Security & Risk Analysis

wordpress.org/plugins/manual-cron

Triggers WP-cron from a Dashboard widget and displays output.

10 active installs v1.0.1 PHP + WP 4.0+ Updated Dec 26, 2015
croncron-jobexecutemanualwp-cron
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Manual Cron Safe to Use in 2026?

Generally Safe

Score 85/100

Manual Cron has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "manual-cron" v1.0.1 plugin exhibits an exceptionally clean static analysis profile, with no identified entry points, dangerous functions, raw SQL queries, file operations, or external HTTP requests. The absence of any recorded CVEs further bolsters its security reputation. This indicates a strong adherence to secure coding practices regarding direct input handling and data manipulation within the analyzed scope.

However, the complete lack of any identified code signals, including nonce checks, capability checks, and output escaping, while seemingly positive on the surface, also raises a subtle concern. It suggests that the plugin might not perform any actions that would necessitate these security measures. If the plugin's functionality is indeed so minimal, its security is inherently high due to its limited scope. Conversely, if it performs operations that *should* be secured by these mechanisms but are not explicitly coded as such, this absence could represent a hidden risk or a lack of defensive programming.

Given the available data, the plugin appears to be very secure. The vulnerability history is clean, and the static analysis reveals no immediate threats. The primary consideration is the potential for unobserved functionality that might benefit from explicit security checks, but based solely on the provided data, the risk is extremely low.

Vulnerabilities
None known

Manual Cron Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Manual Cron Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Manual Cron Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_dashboard_setupmanual-cron.php:13
Maintenance & Trust

Manual Cron Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 26, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Manual Cron Developer Profile

Viktor Szépe

8 plugins · 4K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Manual Cron

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/manual-cron/js/admin.js
Script Paths
/wp-content/plugins/manual-cron/js/admin.js
Version Parameters
manual-cron/js/admin.js?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
manual-cron
JS Globals
MANCRON
Shortcode Output
<button id="manual-cron" class="button button-primary">Run now</button> <div id="manual-cron-output" style="margin-top: 8px;"></div>
FAQ

Frequently Asked Questions about Manual Cron