Posts Edit SubPanel Date Format Security & Risk Analysis

wordpress.org/plugins/posts-edit-subpanel-date-format

Posts/Pages Edit SubPanel Date Format synchronize the wordpress date format with date format in date column of posts edit subpanel.

10 active installs v2.0 PHP + WP 2.9.1+ Updated Oct 11, 2010
admindatedate-formatedit-pagesedit-posts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Posts Edit SubPanel Date Format Safe to Use in 2026?

Generally Safe

Score 85/100

Posts Edit SubPanel Date Format has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "posts-edit-subpanel-date-format" plugin v2.0 exhibits a generally good security posture, primarily due to its very small attack surface and the absence of known vulnerabilities. The static analysis indicates no detectable entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication or permission checks. Furthermore, the code does not utilize dangerous functions, perform file operations, or make external HTTP requests, all of which are positive security indicators. The presence of SQL queries using prepared statements is also a strong point, mitigating the risk of SQL injection.

However, a significant concern arises from the output escaping. The analysis reveals that 100% of the outputs are not properly escaped. This is a critical weakness that could lead to Cross-Site Scripting (XSS) vulnerabilities if any user-controlled data is displayed on the frontend or within the WordPress admin area without proper sanitization. The lack of capability checks and nonce checks, while less concerning given the minimal attack surface, still represents a missed opportunity for robust security hardening. The vulnerability history being clear of any CVEs is a strong positive, suggesting a history of secure development. Overall, while the plugin is currently free of known exploits and has a limited attack surface, the unescaped output poses a tangible risk that needs immediate attention.

Key Concerns

  • Unescaped output detected
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Posts Edit SubPanel Date Format Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Posts Edit SubPanel Date Format Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Posts Edit SubPanel Date Format Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filtermanage_posts_columnsposts-edit-subpanel-date-format.php:29
actionmanage_posts_custom_columnposts-edit-subpanel-date-format.php:30
filtermanage_pages_columnsposts-edit-subpanel-date-format.php:32
actionmanage_pages_custom_columnposts-edit-subpanel-date-format.php:33
Maintenance & Trust

Posts Edit SubPanel Date Format Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedOct 11, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Posts Edit SubPanel Date Format Developer Profile

khurramfraz

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Posts Edit SubPanel Date Format

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Posts Edit SubPanel Date Format