Post Date Randomizer Security & Risk Analysis

wordpress.org/plugins/post-date-randomizer

Simple plugin that bulk changes the publication date of published posts and/or approved comments to random dates within a specified time range.

10K active installs v1.4.1 PHP + WP 5.0+ Updated Apr 6, 2025
comment-datespost-datesrandom-comment-datesrandom-datesrandom-post-dates
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Post Date Randomizer Safe to Use in 2026?

Generally Safe

Score 100/100

Post Date Randomizer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12mo ago
Risk Assessment

The 'post-date-randomizer' v1.4.1 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of identified entry points like AJAX handlers, REST API routes, shortcodes, and cron events, particularly those without authentication checks, significantly minimizes the plugin's attack surface. Furthermore, the code signals are generally positive, with no dangerous functions, all SQL queries utilizing prepared statements, and the presence of nonce and capability checks, all indicating good development practices. The lack of any recorded vulnerabilities in its history also points to a stable and secure codebase. A minor concern is the 29% of outputs that are not properly escaped, which could potentially lead to cross-site scripting (XSS) vulnerabilities if malicious input is processed and rendered without proper sanitization. While the taint analysis shows no identified flows, this could be due to the limited scope of the analysis or the plugin's minimal interaction with external data. Overall, the plugin appears to be secure, with the primary area for potential improvement being comprehensive output escaping.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

Post Date Randomizer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Date Randomizer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
12 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

71% escaped17 total outputs
Attack Surface

Post Date Randomizer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedpost-date-randomizer.php:25
actionadmin_menupost-date-randomizer.php:31
actionadmin_initpost-date-randomizer.php:97
actionadmin_footer-toplevel_page_pdr_randomizer_settingspost-date-randomizer.php:197
actionadmin_action_pdr_do_randomizepost-date-randomizer.php:224
filterwp_insert_post_datapost-date-randomizer.php:271
Maintenance & Trust

Post Date Randomizer Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedApr 6, 2025
PHP min version
Downloads98K

Community Trust

Rating100/100
Number of ratings10
Active installs10K
Developer Profile

Post Date Randomizer Developer Profile

wellbeingtips

1 plugin · 10K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Date Randomizer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
pdr-post-option
Data Attributes
name="pdr_date1"id="pdr_date1"name="pdr_date2"id="pdr_date2"name="pdr_randomize_posts"name="pdr_randomize_comments"+6 more
FAQ

Frequently Asked Questions about Post Date Randomizer