Post to Queue Security & Risk Analysis

wordpress.org/plugins/post-to-queue

Stack posts to queue and auto publish them in chosen interval and time frame.

10 active installs v1.0 PHP + WP 3.5+ Updated Jun 2, 2015
queueschedulescheduling
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post to Queue Safe to Use in 2026?

Generally Safe

Score 85/100

Post to Queue has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'post-to-queue' plugin version 1.0 exhibits a generally good security posture based on the provided static analysis. It effectively utilizes nonces and capability checks for its AJAX handler, and all SQL queries are properly prepared. The absence of dangerous functions, file operations, and external HTTP requests further contributes to its safety. The lack of any recorded vulnerabilities, past or present, is a significant positive indicator.

However, a minor concern arises from the output escaping metric. While 83% is a respectable figure, it implies that approximately 17% of the 24 total outputs might not be properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if the unescaped data is user-controlled or originates from untrusted sources, although no direct evidence of such flows was found in the taint analysis. The absence of taint analysis data is also a limitation, meaning we cannot definitively rule out more complex vulnerabilities that might not be caught by static code signals alone.

In conclusion, 'post-to-queue' v1.0 appears to be a secure plugin with good development practices. The primary area for attention, albeit minor, is the potential for unescaped output. The lack of vulnerability history is a strong positive, suggesting a history of secure development. The plugin's limited attack surface and robust use of WordPress security features are commendable.

Key Concerns

  • Potential for unescaped output
Vulnerabilities
None known

Post to Queue Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Post to Queue Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Post to Queue Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
20 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

83% escaped24 total outputs
Attack Surface

Post to Queue Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_ptq-save-reorderinc\class-post-to-queue-reorder.php:137
WordPress Hooks 28
actionadmin_initinc\class-post-to-queue-admin.php:53
actionadmin_initinc\class-post-to-queue-admin.php:56
filterdisplay_post_statesinc\class-post-to-queue-admin.php:59
filterpost_row_actionsinc\class-post-to-queue-admin.php:62
filterpage_row_actionsinc\class-post-to-queue-admin.php:63
actionpost_submitbox_misc_actionsinc\class-post-to-queue-admin.php:66
filterwp_insert_post_datainc\class-post-to-queue-admin.php:69
filterpost_updated_messagesinc\class-post-to-queue-admin.php:72
filterredirect_post_locationinc\class-post-to-queue-admin.php:75
actionadmin_menuinc\class-post-to-queue-reorder.php:138
actionplugins_loadedpost-to-queue.php:69
actioninitpost-to-queue.php:211
actionwp_loadedpost-to-queue.php:212
filtercron_schedulespost-to-queue.php:215
actionsave_postpost-to-queue.php:275
actiontrashed_postpost-to-queue.php:278
actionsave_postpost-to-queue.php:281
actionadd_option_ptq_settingspost-to-queue.php:284
actionupdate_option_ptq_settingspost-to-queue.php:285
actiondelete_option_ptq_settingspost-to-queue.php:286
actionadd_option_gmt_offsetpost-to-queue.php:289
actionupdate_option_gmt_offsetpost-to-queue.php:290
actiondelete_option_gmt_offsetpost-to-queue.php:291
actionadd_option_timezone_stringpost-to-queue.php:292
actionupdate_option_timezone_stringpost-to-queue.php:293
actiondelete_option_timezone_stringpost-to-queue.php:294
actionptq_single_event_reschedulepost-to-queue.php:297
actionptq_single_event_maybe_schedulepost-to-queue.php:300

Scheduled Events 3

ptq_single_event_reschedule
ptq_single_event_reschedule
ptq_single_event_maybe_schedule
Maintenance & Trust

Post to Queue Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJun 2, 2015
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Post to Queue Developer Profile

Milan Dinić

21 plugins · 48K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post to Queue

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-to-queue/css/style.css/wp-content/plugins/post-to-queue/js/post-to-queue.js
Script Paths
/wp-content/plugins/post-to-queue/js/post-to-queue.js
Version Parameters
post-to-queue/style.css?ver=post-to-queue/post-to-queue.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post to Queue