
persian date shortcode Security & Risk Analysis
wordpress.org/plugins/persian-date-short-codeEasy way for Display persian date in multi format and unlimited color in wordpress site
Is persian date shortcode Safe to Use in 2026?
Generally Safe
Score 85/100persian date shortcode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'persian-date-short-code' plugin v1.2 presents a mixed security posture. While it shows positive signs like 100% prepared SQL statements and a clean vulnerability history with no known CVEs, several concerning elements are present in the static analysis. The plugin has a total of 6 entry points, with one AJAX handler lacking proper authentication checks. This unprotected entry point is a significant concern, as it could be exploited by unauthenticated users. Additionally, the presence of the `unserialize` function is a potential risk, especially if it processes user-supplied data without strict validation. The taint analysis reveals two flows with unsanitized paths, categorized as high severity. This indicates that data entering the plugin might not be adequately cleaned, potentially leading to unexpected behavior or vulnerabilities if these paths are indeed exploitable.
While the absence of known vulnerabilities is a strong positive, it doesn't negate the risks identified in the code. The high percentage of improperly escaped output (81%) is another area of concern, potentially leading to Cross-Site Scripting (XSS) vulnerabilities if user-controllable data is rendered without proper sanitization. The limited number of capability checks (1) and nonce checks (8) across the identified entry points also suggest a potential weakness in securing its functionalities.
In conclusion, the plugin has strengths in its SQL handling and lack of historical vulnerabilities. However, the critical uncovered AJAX handler, high-severity taint flows, and widespread output escaping issues introduce significant security risks that require immediate attention. The potential for `unserialize` to be misused also warrants careful review of how it's implemented.
Key Concerns
- AJAX handler without auth check
- High severity taint flow (2)
- Unsanitized output (81%)
- Dangerous function: unserialize
- Low capability check count
persian date shortcode Security Vulnerabilities
persian date shortcode Release Timeline
persian date shortcode Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
persian date shortcode Attack Surface
AJAX Handlers 5
Shortcodes 1
WordPress Hooks 10
Maintenance & Trust
persian date shortcode Maintenance & Trust
Maintenance Signals
Community Trust
persian date shortcode Alternatives
WP-Persian
wp-persian
Fast and Powerful plugin for Jalali calendar and Farsi language support in Wordpress and standard plugins.
Persian Text and Date Converter
persian-text-and-date-converter
بهطور خودکار حروف عربی، اعداد و تاریخ میلادی را در محتوای وردپرس، نظرات، صفحات و آرشیوها به فارسی تبدیل میکند.
Persian Date
persian-date
تاریخ شمسی برای وردپرس
Webkima Elements
webkima-elements
افزونه وبکیما المنت یک پلاگین بسیار سبک و سریع برای افزودن فونت های فارسی به سایت های وردپرسی و المنتوری است، توسط این افزونه می توانید فونت های فارسی …
Persian date for codestar framework
persian-date-for-codestar-framework
Codestar Framework Is A Simple and Lightweight WordPress Option Framework for Themes and Plugins. Persian date for codestar framework adds a new field …
persian date shortcode Developer Profile
2 plugins · 110 total installs
How We Detect persian date shortcode
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<p style="text-align:left;direction:ltr;color:green;"><b>[wikiwordpress]</b></p><p style="text-align:left;direction:ltr;color:green;"><b>do_shortcode('[wikiwordpress]');</b></p>