Postpone Security & Risk Analysis

wordpress.org/plugins/postpone

Schedule a post in 1 hour, Tomorrow 8 am, Tomorrow after lunch, Tonight, Next monday or Next month.

10 active installs v1.0.0 PHP + WP 3.0+ Updated Sep 27, 2016
postponepublishschedule
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Postpone Safe to Use in 2026?

Generally Safe

Score 85/100

Postpone has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the "postpone" plugin v1.0.0 demonstrates a strong security posture. The absence of any identified attack surface points, dangerous functions, raw SQL queries, unescaped output, or file operations is commendable. Furthermore, the complete lack of known vulnerabilities, including unpatched CVEs, suggests a well-maintained and secure codebase. The 100% prepared statement usage for SQL queries and proper output escaping are excellent security practices that significantly mitigate common web application risks. The absence of any taint analysis findings further reinforces the current security. However, the complete lack of nonces and capability checks across all entry points, while not explicitly exploitable in this version due to the zero attack surface, represents a potential future risk if new features are added without these fundamental security mechanisms. Overall, this plugin is currently very secure, but vigilance for future updates is advised to maintain this status.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

Postpone Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Postpone Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Postpone Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Postpone Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_print_stylespostpone.php:34
actionadmin_enqueue_scriptspostpone.php:35
actionwp_print_stylespostpone.php:37
actionwp_enqueue_scriptspostpone.php:38
actioninitpostpone.php:45
Maintenance & Trust

Postpone Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedSep 27, 2016
PHP min version
Downloads1K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

Postpone Developer Profile

currencywiki

19 plugins · 4K total installs

80
trust score
Avg Security Score
89/100
Avg Patch Time
35 days
View full developer profile
Detection Fingerprints

How We Detect Postpone

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/postpone/css/postpone.admin.css/wp-content/plugins/postpone/js/postpone.admin.js
Script Paths
/wp-content/plugins/postpone/js/postpone.admin.js
Version Parameters
postpone-plugin-styles?ver=postpone-admin-script?ver=

HTML / DOM Fingerprints

JS Globals
langstrings
FAQ

Frequently Asked Questions about Postpone