Post Date Range Filter Security & Risk Analysis

wordpress.org/plugins/post-date-range-filter

Post Date Range Filter plugins for creating custom date filter. Simple but flexible.

30 active installs v1.02 PHP 7.4+ WP 5.8+ Updated Dec 23, 2025
any-postcategorycustom-postfilter
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Date Range Filter Safe to Use in 2026?

Generally Safe

Score 100/100

Post Date Range Filter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The post-date-range-filter plugin, version 1.02, exhibits a strong security posture based on the provided static analysis and vulnerability history. The code analysis reveals no dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. Furthermore, there are no file operations or external HTTP requests, and importantly, no unpatched CVEs are recorded. This indicates a commitment to secure coding practices.

However, a significant concern arises from the lack of nonce checks and capability checks. While the attack surface is currently small (one shortcode) and appears to have no direct unprotected entry points in this analysis, the absence of these fundamental security mechanisms means that if the plugin were to introduce any new entry points in the future (e.g., AJAX handlers, REST API routes) without proper authorization checks, it would be immediately vulnerable to unauthorized actions. The taint analysis also found no critical or high-severity unsanitized paths, which is positive.

In conclusion, the plugin has a good foundation with well-handled SQL and output. The absence of historical vulnerabilities is also a positive indicator. The primary weakness is the lack of built-in nonce and capability checks, which leaves potential for future vulnerabilities if the attack surface expands. Users should remain vigilant for updates that might address this.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Post Date Range Filter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Date Range Filter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
37 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped37 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
pdrf_shortcode_wrapper (post-date-range-filter.php:18)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post Date Range Filter Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[pdrf_shortcode] post-date-range-filter.php:151
WordPress Hooks 2
actionadmin_initpost-date-range-filter.php:154
actionadmin_menupost-date-range-filter.php:174
Maintenance & Trust

Post Date Range Filter Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 23, 2025
PHP min version7.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Post Date Range Filter Developer Profile

Md. Shahinur Islam

7 plugins · 730 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
11 days
View full developer profile
Detection Fingerprints

How We Detect Post Date Range Filter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
articles-list-pdrfpost-thumbnail-wrappost-thumbnailpost-thumbnail-rolloverpost-entry-contententry-titleentry-metaentry-date+2 more
Data Attributes
data-post_typedata-categories
Shortcode Output
[pdrf_shahin][pdrf_shortcode post_type="post" categories="name"]
FAQ

Frequently Asked Questions about Post Date Range Filter