Plugin Activation Date Security & Risk Analysis

wordpress.org/plugins/plugin-activation-date

Keep track of plugins you activate or deactivate through the dashboard by viewing when each and every one of them was enabled or disabled.

300 active installs v1.1 PHP + WP 3.0+ Updated Oct 19, 2012
plugin-infoplugins
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Plugin Activation Date Safe to Use in 2026?

Generally Safe

Score 85/100

Plugin Activation Date has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "plugin-activation-date" plugin v1.1 exhibits a seemingly strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code analysis indicates no dangerous functions, no unescaped output, no file operations, no external HTTP requests, and crucially, all SQL queries are prepared statements. The taint analysis also reveals no identified flows with unsanitized paths, suggesting a lack of common web vulnerabilities like SQL injection or cross-site scripting through data manipulation.

However, the complete lack of capability checks and nonce checks across all entry points is a notable concern. While the attack surface is currently zero, any future addition of functionality, especially involving user interaction or data processing, without these fundamental WordPress security checks would introduce significant risks. The vulnerability history being clear of any past or present CVEs is a positive sign, indicating a historically secure plugin. Nevertheless, the current analysis does not provide a complete picture, as the analysis itself appears to have found zero total flows and zero total outputs, which might be an indicator of a very minimal plugin or a limitation in the analysis. In conclusion, the plugin is currently very secure due to its minimal feature set and use of prepared statements, but the complete absence of authorization and noncing mechanisms represents a potential weakness if functionality were to be expanded in the future.

Key Concerns

  • No capability checks implemented
  • No nonce checks implemented
  • 0% of outputs properly escaped
Vulnerabilities
None known

Plugin Activation Date Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Plugin Activation Date Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Plugin Activation Date Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filteradmin_initplugin-activation-date.php:42
filtermanage_plugins_columnsplugin-activation-date.php:43
actionactivate_pluginplugin-activation-date.php:44
actiondeactivate_pluginplugin-activation-date.php:45
actionadmin_head-plugins.phpplugin-activation-date.php:46
actionmanage_plugins_custom_columnplugin-activation-date.php:47
Maintenance & Trust

Plugin Activation Date Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedOct 19, 2012
PHP min version
Downloads6K

Community Trust

Rating94/100
Number of ratings10
Active installs300
Developer Profile

Plugin Activation Date Developer Profile

Maor Chasen

5 plugins · 720 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Plugin Activation Date

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
column-last_activated_datecolumn-last_deactivated_date
FAQ

Frequently Asked Questions about Plugin Activation Date