Publish to Schedule Security & Risk Analysis

wordpress.org/plugins/publish-to-schedule

Automate your WordPress post scheduling with Publish to Schedule. Set rules for days and times to publish posts automatically, saving you time and ens …

5K active installs v4.5.8 PHP + WP 2.8+ Updated Dec 4, 2025
automationpost-schedulerpostsproductivityscheduling
99
A · Safe
CVEs total2
Unpatched0
Last CVEFeb 27, 2023
Safety Verdict

Is Publish to Schedule Safe to Use in 2026?

Generally Safe

Score 99/100

Publish to Schedule has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Feb 27, 2023Updated 4mo ago
Risk Assessment

The "publish-to-schedule" plugin version 4.5.8 exhibits a mixed security posture. The static analysis reveals a remarkably small attack surface with no identifiable entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for its single SQL query and implementing nonce and capability checks, indicating a conscious effort to prevent common attacks. However, a significant concern arises from the low percentage of properly escaped output (9%), suggesting a high likelihood of cross-site scripting (XSS) vulnerabilities being present, even if not flagged by taint analysis in this specific version.

The vulnerability history for this plugin is a notable weakness. With two past medium-severity vulnerabilities, specifically Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF), the plugin has a track record of security flaws. While there are no currently unpatched vulnerabilities, the pattern of past issues, particularly XSS and CSRF, reinforces the concern raised by the low output escaping rate in the static analysis. This suggests that developers may struggle with robust input sanitization and output encoding, making future vulnerabilities a distinct possibility. The lack of taint analysis results is neutral, as it might indicate no complex data flows were analyzed or that none were found to be problematic in the tested version.

Key Concerns

  • Low output escaping percentage
  • Two past medium severity vulnerabilities
Vulnerabilities
2

Publish to Schedule Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-26519medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Publish to Schedule <= 4.5.4 - Authenticated (Administrator+) Stored Cross-Site Scripting

Feb 27, 2023 Patched in 4.5.5 (330d)
CVE-2023-25994medium · 5.4Cross-Site Request Forgery (CSRF)

Publish to Schedule <= 4.4.2 - Cross-Site Request Forgery leading to Plugin Option Changes

Feb 20, 2023 Patched in 4.5.4 (337d)
Code Analysis
Analyzed Mar 16, 2026

Publish to Schedule Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
32
3 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

9% escaped35 total outputs
Attack Surface

Publish to Schedule Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadd_meta_boxespts-metabox.php:21
filtergettextpts-metabox.php:117
actionadmin_footerpts-metabox.php:120
actionadmin_menupublish-to-schedule-admin.php:23
actionadmin_footerpublish-to-schedule-admin.php:56
Maintenance & Trust

Publish to Schedule Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 4, 2025
PHP min version
Downloads76K

Community Trust

Rating86/100
Number of ratings23
Active installs5K
Developer Profile

Publish to Schedule Developer Profile

alexbenfica

1 plugin · 5K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
334 days
View full developer profile
Detection Fingerprints

How We Detect Publish to Schedule

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/publish-to-schedule/js/pts-donate.js/wp-content/plugins/publish-to-schedule/css/pts-metabox.css/wp-content/plugins/publish-to-schedule/js/pts-gutenberg.js/wp-content/plugins/publish-to-schedule/js/pts-analytics.js/wp-content/plugins/publish-to-schedule/css/pts-admin.css/wp-content/plugins/publish-to-schedule/js/pts-metabox.js/wp-content/plugins/publish-to-schedule/css/pts-donate.css
Script Paths
/wp-content/plugins/publish-to-schedule/js/pts-donate.js/wp-content/plugins/publish-to-schedule/js/pts-gutenberg.js/wp-content/plugins/publish-to-schedule/js/pts-analytics.js/wp-content/plugins/publish-to-schedule/js/pts-metabox.js
Version Parameters
publish-to-schedule/css/pts-donate.css?ver=publish-to-schedule/js/pts-gutenberg.js?ver=publish-to-schedule/js/pts-analytics.js?ver=publish-to-schedule/css/pts-metabox.css?ver=publish-to-schedule/js/pts-metabox.js?ver=publish-to-schedule/css/pts-admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
pts_options
HTML Comments
toggle debug include plugin filesActions that change post status... All possible post status in Jan 2012...+16 more
Data Attributes
pts_donate_contentpts_option_css
JS Globals
pts_optionsPTS_OPTION_NAME
FAQ

Frequently Asked Questions about Publish to Schedule