Plain Event Calendar Security & Risk Analysis

wordpress.org/plugins/plain-event-calendar

Simple event calendar plugin to manage your events and publish them with a shortcode or a block.

0 active installs v2.1.0 PHP 7.4+ WP 4.1+ Updated Unknown
calendarevent-calendarevent-managereventsschool
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Plain Event Calendar Safe to Use in 2026?

Generally Safe

Score 100/100

Plain Event Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The plain-event-calendar plugin version 2.1.0 exhibits a generally strong security posture based on the provided static analysis. The plugin demonstrates good practices by using prepared statements for all SQL queries, indicating a low risk of SQL injection vulnerabilities. Furthermore, the absence of known CVEs and historical vulnerabilities suggests a commitment to security or a lack of widespread exploitation. The code signals also reveal a relatively small attack surface, with no unprotected AJAX handlers or REST API routes, and a single shortcode which is likely controlled. However, there are a few areas that could be improved. The plugin has a notable percentage of output that is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly outputted without sanitization. Additionally, the complete lack of nonce checks across its entry points is a significant concern, as it leaves the plugin susceptible to Cross-Site Request Forgery (CSRF) attacks. While the capability check is present, the absence of nonces is a critical oversight for user-facing actions.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks on entry points
Vulnerabilities
None known

Plain Event Calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Plain Event Calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
20 prepared
Unescaped Output
6
20 escaped
Nonce Checks
0
Capability Checks
1
File Operations
6
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared20 total queries

Output Escaping

77% escaped26 total outputs
Attack Surface

Plain Event Calendar Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[plain-event-calendar] plain-event-calendar.php:55
WordPress Hooks 4
actionadmin_menuplain-event-calendar.php:50
actionadmin_initplain-event-calendar.php:51
actionrest_api_initplain-event-calendar.php:54
actionplugins_loadedplain-event-calendar.php:383
Maintenance & Trust

Plain Event Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Plain Event Calendar Developer Profile

plainware

5 plugins · 2K total installs

67
trust score
Avg Security Score
83/100
Avg Patch Time
136 days
View full developer profile
Detection Fingerprints

How We Detect Plain Event Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/plain-event-calendar/asset/css/plain-event-calendar.css/wp-content/plugins/plain-event-calendar/asset/js/plain-event-calendar.js
Script Paths
/wp-content/plugins/plain-event-calendar/asset/js/plain-event-calendar.js
Version Parameters
plain-event-calendar/asset/css/plain-event-calendar.css?ver=plain-event-calendar/asset/js/plain-event-calendar.js?ver=

HTML / DOM Fingerprints

CSS Classes
plain-event-calendar
Data Attributes
data-pw-iddata-pw-path-param-namedata-pw-layout-param-name
JS Globals
window.plainEventCalendar
REST Endpoints
/wp-json/plain-event-calendar/v2/
Shortcode Output
[plain-event-calendar]
FAQ

Frequently Asked Questions about Plain Event Calendar