Plugin Modification Date Security & Risk Analysis

wordpress.org/plugins/plugin-modification-date

Add tag Requires at least: 4.9 Tested up to: 5.6 Stable tag: 1.0.1 License: GPLv2 or later Displays Plugin Modification/Updation time.

40 active installs v1.0.1 PHP + WP + Updated Dec 30, 2020
modification-dateplugin-modify-dateplugin-update-dateupdate-datewordpress-plugin-update
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Plugin Modification Date Safe to Use in 2026?

Generally Safe

Score 85/100

Plugin Modification Date has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "plugin-modification-date" v1.0.1 plugin exhibits a generally strong security posture based on the static analysis provided. The absence of any reported vulnerabilities in its history is a significant positive indicator. Furthermore, the plugin demonstrates excellent practices by utilizing prepared statements for all SQL queries and not exposing any file operations, external HTTP requests, or bundled libraries, which are common sources of security flaws. The limited attack surface, with no reported AJAX handlers, REST API routes, shortcodes, or cron events, further contributes to its safety.

However, a critical concern arises from the complete lack of output escaping. This means that any data displayed by the plugin, if it were to originate from user input or external sources, would not be properly sanitized, leaving it vulnerable to Cross-Site Scripting (XSS) attacks. Additionally, the absence of nonce checks and capability checks, while less critical given the limited attack surface, means that any future expansion of functionality could introduce vulnerabilities if these fundamental security measures are not implemented. The lack of taint analysis flows also prevents a complete assessment of potential data manipulation risks.

Key Concerns

  • No output escaping
  • Missing nonce checks
  • Missing capability checks
  • No taint analysis performed
Vulnerabilities
None known

Plugin Modification Date Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Plugin Modification Date Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Plugin Modification Date Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtermanage_plugins_columnsplugin-modification-date.php:16
actionadmin_head-plugins.phpplugin-modification-date.php:17
actionmanage_plugins_custom_columnplugin-modification-date.php:18
Maintenance & Trust

Plugin Modification Date Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedDec 30, 2020
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Plugin Modification Date Developer Profile

Kiran Patil

5 plugins · 150 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Plugin Modification Date

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
column-last_modified_date
FAQ

Frequently Asked Questions about Plugin Modification Date