MY Missed Schedule Security & Risk Analysis

wordpress.org/plugins/my-missed-schedule

重发定时失败的文章。Find missed schedule posts and it republish them correctly. Once every five minutes.

100 active installs v1.0.1 PHP + WP 2.9+ Updated Mar 18, 2018
futuremissedpostsschedulescheduled
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MY Missed Schedule Safe to Use in 2026?

Generally Safe

Score 85/100

MY Missed Schedule has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The plugin "my-missed-schedule" v1.0.1 exhibits a generally good security posture based on the provided static analysis. There are no identified critical or high-severity vulnerabilities within the code, and the plugin avoids dangerous functions, file operations, and external HTTP requests. The output escaping is 100% properly handled, indicating care has been taken to prevent cross-site scripting (XSS) vulnerabilities. The vulnerability history is clean, with no known CVEs, suggesting a well-maintained or recently developed plugin with no past security incidents.

However, there are a few areas of concern that prevent a perfect score. The presence of a single SQL query without prepared statements is a potential risk, as it could be susceptible to SQL injection if user-supplied data is directly incorporated into the query. Additionally, the complete lack of nonce checks and capability checks across all entry points, including the cron event, is a significant oversight. While the attack surface is currently reported as zero unprotected entry points, this is likely due to a lack of identified entry points in the analysis, not necessarily a guarantee of security. If any new entry points are introduced or if the current cron event were to become indirectly exposed to user input, the absence of these fundamental security controls would present a serious risk.

In conclusion, "my-missed-schedule" v1.0.1 is off to a promising start with its minimal attack surface and good output escaping. The absence of historical vulnerabilities is a positive indicator. Nevertheless, the reliance on raw SQL and the complete lack of nonce and capability checks are notable weaknesses that require attention to ensure robust security, especially as the plugin evolves.

Key Concerns

  • Raw SQL query without prepared statements
  • No nonce checks across entry points
  • No capability checks across entry points
Vulnerabilities
None known

MY Missed Schedule Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

MY Missed Schedule Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries
Attack Surface

MY Missed Schedule Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtercron_schedulesmy-missed-schedule.php:38
actionmissed_schedule_cronmy-missed-schedule.php:39

Scheduled Events 1

missed_schedule_cron
Maintenance & Trust

MY Missed Schedule Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 18, 2018
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings3
Active installs100
Developer Profile

MY Missed Schedule Developer Profile

smyx

6 plugins · 150 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MY Missed Schedule

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/my-missed-schedule/my-missed-schedule.php
Version Parameters
my-missed-schedule.php?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about MY Missed Schedule