PCF New Year Countdown Security & Risk Analysis

wordpress.org/plugins/pcf-new-year-countdown

A simple plugin that creates an easy to use New Year countdown for your WordPress sites.

10 active installs v1.2 PHP + WP 4.0+ Updated Oct 6, 2015
dayevenewyearyears
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is PCF New Year Countdown Safe to Use in 2026?

Generally Safe

Score 85/100

PCF New Year Countdown has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'pcf-new-year-countdown' plugin version 1.2 exhibits a generally good security posture due to a lack of known vulnerabilities and a limited attack surface. The absence of external HTTP requests, file operations, and SQL queries (all using prepared statements) is a strong positive indicator. However, the analysis reveals significant concerns regarding output escaping, with only 13% of outputs being properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website and executed by users.

The plugin also lacks nonce checks and capability checks for its single shortcode, which represents a potential attack vector if the shortcode is used in conjunction with other vulnerabilities or if it processes user-supplied data. The complete absence of taint analysis results (0 flows analyzed) is unusual and could mean either the tool couldn't analyze the code or there are no complex data flows to check, but it does not inherently signify a secure state. Given the output escaping issues and lack of authorization checks on its sole entry point, the plugin requires immediate attention to mitigate XSS risks and secure its shortcode functionality.

Key Concerns

  • Low output escaping rate
  • Missing nonce checks on shortcode
  • Missing capability checks on shortcode
Vulnerabilities
None known

PCF New Year Countdown Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PCF New Year Countdown Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

13% escaped16 total outputs
Attack Surface

PCF New Year Countdown Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[pcf_ny_countdown] core\pcfcny-countdown.php:115
WordPress Hooks 2
actionadmin_noticescore\pcfcny-admin.php:4
actionwidgets_initcore\pcfcny-widget.php:5
Maintenance & Trust

PCF New Year Countdown Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 6, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

PCF New Year Countdown Developer Profile

PC Futures

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PCF New Year Countdown

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pcf-new-year-countdown/css/pcf-new-year-countdown-style.css/wp-content/plugins/pcf-new-year-countdown/js/pcf-new-year-countdown-script.js
Script Paths
/wp-content/plugins/pcf-new-year-countdown/js/pcf-new-year-countdown-script.js
Version Parameters
pcf-new-year-countdown/css/pcf-new-year-countdown-style.css?ver=pcf-new-year-countdown/js/pcf-new-year-countdown-script.js?ver=

HTML / DOM Fingerprints

HTML Comments
Change OutputSet OutputOutput
Data Attributes
id='my-id'
Shortcode Output
<p id='It's until the New Year!</p>It's the New Year!</p>
FAQ

Frequently Asked Questions about PCF New Year Countdown