Shows a Calendar of Iftar and sehri Timing on Sidebar of your blog/site. At current it supports 'DHAKA', 'SYLHET', 'CHITTAGON …

10 active installs v1.0.22.8.10 PHP + WP + Updated Unknown
bangladeshislamramazantimings
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ramazan Safe to Use in 2026?

Generally Safe

Score 100/100

Ramazan has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'ramadan-alert-bangladesh-timing' plugin, version 1.0.22.8.10, exhibits a generally strong security posture based on the provided static analysis. The plugin has a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, the code analysis reveals no dangerous functions, file operations, or external HTTP requests, all of which are positive indicators. The use of prepared statements for all SQL queries is also a significant strength, mitigating common SQL injection risks. The plugin also has no recorded vulnerability history, which suggests a history of secure development or diligent patching by the developers.

However, a significant concern arises from the complete lack of output escaping. With 3 outputs analyzed and 0% properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed by the plugin is susceptible to manipulation, potentially allowing attackers to inject malicious scripts into the website. Additionally, the absence of nonce checks and capability checks across the board means that even if there were entry points, they would be inadequately protected against unauthorized actions or privilege escalation. While the lack of known CVEs is positive, it does not negate the immediate risks identified in the code analysis.

In conclusion, while the plugin benefits from a clean vulnerability history and a well-controlled attack surface, the critical deficiency in output escaping presents a significant security risk. Developers should prioritize addressing the unescaped outputs to prevent XSS vulnerabilities. The lack of nonces and capability checks, while not immediately exploitable due to the absence of entry points, represents a missed opportunity for robust security practices that could protect against future code changes.

Key Concerns

  • 0% output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Ramazan Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ramazan Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Ramazan Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedramazan-timings.php:11
actioninitramazan-timings.php:34
Maintenance & Trust

Ramazan Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Ramazan Developer Profile

arifnezami

4 plugins · 40 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ramazan

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ramadan-alert-bangladesh-timing/functions.js
Script Paths
/wp-content/plugins/ramadan-alert-bangladesh-timing/functions.js
Version Parameters
ramadan-alert-bangladesh-timing/functions.js?ver=

HTML / DOM Fingerprints

CSS Classes
rt_widget_an
Shortcode Output
<div id="timings"></div>
FAQ

Frequently Asked Questions about Ramazan