Posts To Events Security & Risk Analysis

wordpress.org/plugins/posts-to-events

This is a simple plugin for adding callendar functionality to posts.

10 active installs v1.56 PHP + WP 3.0.1+ Updated May 19, 2013
calendareventspostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Posts To Events Safe to Use in 2026?

Generally Safe

Score 85/100

Posts To Events has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "posts-to-events" plugin v1.56 exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events directly exposed without authentication. This suggests a deliberate effort to limit potential entry points. The presence of nonce and capability checks, although limited in number, is a good practice. However, the code analysis highlights significant concerns regarding the use of dangerous functions like `create_function`, which is known to be a source of vulnerabilities if not handled with extreme care. Furthermore, a low rate of proper output escaping (20%) presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities, as data displayed to users may not be sufficiently sanitized. The taint analysis, while showing no critical or high severity flows, did reveal that all analyzed flows involved unsanitized paths, which, when combined with the poor output escaping, increases the risk. The complete lack of recorded vulnerabilities in its history is a positive indicator, suggesting the plugin has been relatively stable or well-maintained in the past. However, this historical data should not overshadow the identified code-level risks. In conclusion, while the plugin has a small attack surface, the identified use of dangerous functions and a high percentage of improperly escaped output are substantial weaknesses that require attention and mitigation. The absence of historical CVEs is a strength, but the current code analysis points to potential future vulnerabilities.

Key Concerns

  • Use of dangerous function `create_function`
  • Low output escaping rate (20%)
  • All taint flows have unsanitized paths
  • SQL queries (33%) without prepared statements
Vulnerabilities
None known

Posts To Events Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Posts To Events Code Analysis

Dangerous Functions
2
Raw SQL Queries
2
4 prepared
Unescaped Output
144
36 escaped
Nonce Checks
6
Capability Checks
2
File Operations
56
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'register_widget( "Post_Events_widget" );' ) );1.56\widget.php:287
create_functionadd_action( 'widgets_init', create_function( '', 'register_widget( "Post_Events_widget" );' ) );widget.php:287

SQL Query Safety

67% prepared6 total queries

Output Escaping

20% escaped180 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

6 flows6 with unsanitized paths
tryBrowserCache (1.56\inc\tim\timthumb.php:325)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Posts To Events Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionwp_enqueue_scripts1.56\posts_to_events.php:12
actionadmin_enqueue_scripts1.56\pte_admin.php:24
actionadd_meta_boxes1.56\pte_admin.php:87
actionsave_post1.56\pte_admin.php:105
actionsave_post1.56\pte_admin.php:123
actionwidgets_init1.56\widget.php:287
actionwp_enqueue_scriptsposts_to_events.php:12
actionadmin_enqueue_scriptspte_admin.php:24
actionadd_meta_boxespte_admin.php:87
actionsave_postpte_admin.php:105
actionsave_postpte_admin.php:123
actionwidgets_initwidget.php:287
Maintenance & Trust

Posts To Events Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMay 19, 2013
PHP min version
Downloads2K

Community Trust

Rating40/100
Number of ratings1
Active installs10
Developer Profile

Posts To Events Developer Profile

xdark

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Posts To Events

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/posts-to-events/pte_style.css
Script Paths
/wp-content/plugins/posts-to-events/script.js
Version Parameters
posts-to-events/pte_style.css?ver=posts-to-events/inc/jquery-ui-1.10.2/css/excite-bike/jquery-ui-1.10.2.custom.css?ver=

HTML / DOM Fingerprints

CSS Classes
DeleteSubmit
HTML Comments
<!-- #? This file contains the admin panel options --><!-- #? Load widget file --><!-- #? Register the date metabox for all post types--><!-- #? Store date data in post meta table -->+2 more
Data Attributes
pte_datepte_date_noncepte_date_delete
JS Globals
jQuery
FAQ

Frequently Asked Questions about Posts To Events