
Meks Time Ago Security & Risk Analysis
wordpress.org/plugins/meks-time-agoAutomatically change your post date display to "time ago" format like 1 hour ago, 3 days ago, etc...
Is Meks Time Ago Safe to Use in 2026?
Generally Safe
Score 100/100Meks Time Ago has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'meks-time-ago' plugin version 1.1.8 demonstrates a generally strong security posture, with no identified vulnerabilities in its history and a clean static analysis regarding dangerous functions, SQL queries (all prepared), file operations, external requests, and taint analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. This indicates good development practices in terms of avoiding common entry points for exploitation.
However, there are notable concerns within the code analysis. The most significant issue is the low percentage of properly escaped output (22%). This suggests that sensitive data processed by the plugin might be rendered directly to the user's browser without adequate sanitization, potentially leading to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully. Additionally, the complete absence of nonce checks and capability checks, while potentially acceptable given the limited attack surface, represents a missed opportunity to implement robust authorization and protection against CSRF attacks, should any entry points be introduced or become apparent in future versions or through interactions with other plugins.
The plugin's vulnerability history is clean, with no recorded CVEs. This is a positive indicator, suggesting that the current codebase is likely secure against known threats. The lack of past vulnerabilities, coupled with the current analysis, paints a picture of a plugin that has either been developed with security in mind or has been consistently maintained to avoid introducing weaknesses. The primary weakness identified lies in output escaping, which, if exploited, could lead to XSS. Therefore, while the plugin is currently secure against known vulnerabilities and has a limited attack surface, the unescaped output is a critical area to address.
Key Concerns
- Low percentage of properly escaped output
- Absence of nonce checks
- Absence of capability checks
Meks Time Ago Security Vulnerabilities
Meks Time Ago Code Analysis
Output Escaping
Meks Time Ago Attack Surface
WordPress Hooks 4
Maintenance & Trust
Meks Time Ago Maintenance & Trust
Maintenance Signals
Community Trust
Meks Time Ago Alternatives
Date and Time Picker Field
acf-field-date-time-picker
Date and Time Picker field for Advanced Custom Fields
Date & Time Picker for Advanced Custom Fields
acf-date-time-picker
Date & Time Picker field for Advanced Custom Fields 4 and 5.
Days Ago Post Date
days-ago-post-date-format
Change post date format as human readable like 2mins ago, 2 days age, 1 year ago.
Just Now – User Friendly Date Time
justnow-user-friendly-date-time
Instantly convert your blog time/date to Time Ago Format such as 1 week ago or 17 minutes ago.
WD Live Posts Update
wd-live-posts-update
Live Post Updates is a powerful plugin for live updates of posts and custom post types, integrating schema.org for better SEO.
Meks Time Ago Developer Profile
14 plugins · 117K total installs
How We Detect Meks Time Ago
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/meks-time-ago/?ver=/wp-content/plugins/meks-time-ago/js/jquery.timeago.min.js?ver=/wp-content/plugins/meks-time-ago/js/meks-timeago.js?ver=/wp-content/plugins/meks-time-ago/css/meks-timeago.css?ver=HTML / DOM Fingerprints
meksTimeago