Persian Date Security & Risk Analysis

wordpress.org/plugins/persian-date

تاریخ شمسی برای وردپرس

4K active installs v0.1.3 PHP 7.1+ WP 4.0+ Updated Sep 5, 2020
calendardatejalalipersian-dateshamsi
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Persian Date Safe to Use in 2026?

Generally Safe

Score 85/100

Persian Date has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "persian-date" plugin version 0.1.3 exhibits an exceptionally clean security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events, particularly those lacking authentication checks, signifies a minimal attack surface. Furthermore, the code's adherence to secure coding practices is evident with no dangerous functions, no raw SQL queries (all using prepared statements), and all outputs being properly escaped. The lack of file operations, external HTTP requests, nonce checks, and capability checks, while potentially contributing to a small attack surface, also means there are no obvious vectors for common plugin vulnerabilities.

The plugin's vulnerability history is completely clear, with zero recorded CVEs. This, combined with the static analysis findings, suggests a well-developed and secure plugin. There are no apparent critical or high severity issues identified in taint analysis or code signals. The plugin does not appear to bundle any external libraries, which eliminates risks associated with outdated or vulnerable bundled components.

In conclusion, the "persian-date" plugin v0.1.3 appears to be highly secure, demonstrating excellent coding practices and a lack of known vulnerabilities. The minimal attack surface and absence of any concerning code signals or vulnerability history are significant strengths. There are no identifiable weaknesses or risks based on the data provided.

Vulnerabilities
None known

Persian Date Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Persian Date Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Persian Date Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuincludes\class-admin.php:13
filterdate_i18nincludes\class-pd.php:32
filterwp_dateincludes\class-pd.php:35
Maintenance & Trust

Persian Date Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedSep 5, 2020
PHP min version7.1
Downloads27K

Community Trust

Rating90/100
Number of ratings16
Active installs4K
Developer Profile

Persian Date Developer Profile

Mahdi Yousefi [MahdiY]

10 plugins · 27K total installs

92
trust score
Avg Security Score
89/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect Persian Date

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/persian-date/assets/css/persian-date.css/wp-content/plugins/persian-date/assets/js/persian-date.js
Script Paths
/wp-content/plugins/persian-date/assets/js/persian-date.js
Version Parameters
persian-date/assets/css/persian-date.css?ver=persian-date/assets/js/persian-date.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Persian Date