
Persian date for codestar framework Security & Risk Analysis
wordpress.org/plugins/persian-date-for-codestar-frameworkCodestar Framework Is A Simple and Lightweight WordPress Option Framework for Themes and Plugins. Persian date for codestar framework adds a new field …
Is Persian date for codestar framework Safe to Use in 2026?
Generally Safe
Score 85/100Persian date for codestar framework has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'persian-date-for-codestar-framework' plugin v1.1 exhibits a seemingly strong security posture based on the provided static analysis. The absence of identified entry points like AJAX handlers, REST API routes, shortcodes, and cron events is a positive indicator, as it minimizes the potential attack surface. Furthermore, the fact that all SQL queries utilize prepared statements demonstrates good practice in preventing SQL injection vulnerabilities. The plugin also appears to avoid dangerous functions, file operations, and external HTTP requests, which further reduces its risk profile.
However, a significant concern arises from the low percentage (57%) of properly escaped outputs. This suggests a potential for cross-site scripting (XSS) vulnerabilities, where unescaped data displayed to users could be manipulated by attackers. The complete lack of nonce checks and capability checks is also a notable weakness. While there are no apparent entry points that would directly exploit these missing checks in the current version, it represents a missed opportunity for robust security and could become a vulnerability if the plugin evolves or integrates with other components.
The plugin's vulnerability history is also clean, with no recorded CVEs. This, combined with the absence of critical or high severity taint flows, paints a picture of a plugin that has historically been secure or has not been a target for significant exploitation. Despite the identified output escaping issue and missing security checks, the overall lack of immediate, critical threats suggests a relatively low risk for this specific version, provided the output escaping is addressed and future development incorporates proper authorization checks.
Key Concerns
- Insufficient output escaping
- Missing nonce checks
- Missing capability checks
Persian date for codestar framework Security Vulnerabilities
Persian date for codestar framework Code Analysis
Output Escaping
Persian date for codestar framework Attack Surface
WordPress Hooks 1
Maintenance & Trust
Persian date for codestar framework Maintenance & Trust
Maintenance Signals
Community Trust
Persian date for codestar framework Alternatives
No alternatives data available yet.
Persian date for codestar framework Developer Profile
1 plugin · 20 total installs
How We Detect Persian date for codestar framework
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/persian-date-for-codestar-framework/css/persian.datepicker.min.css/wp-content/plugins/persian-date-for-codestar-framework/js/persian.date.min.js/wp-content/plugins/persian-date-for-codestar-framework/js/persian.datepicker.min.js/wp-content/plugins/persian-date-for-codestar-framework/js/sorth.jsjs/persian.date.min.jsjs/persian.datepicker.min.jsjs/sorth.jsHTML / DOM Fingerprints
pddata-datedata-settings