Random Post Date Security & Risk Analysis

wordpress.org/plugins/random-post-date

A simple plugin that changes the date of your posts to any random date in the past or future, with an option to exclude some posts.

70 active installs v1.0.0 PHP 7.4+ WP 3.8+ Updated Jan 6, 2025
post-datesrandom-datesrandom-postrandom-post-dates
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Random Post Date Safe to Use in 2026?

Generally Safe

Score 92/100

Random Post Date has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "random-post-date" plugin v1.0.0 demonstrates an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface entry points, dangerous functions, direct SQL queries, file operations, or external HTTP requests is a significant strength. Furthermore, the 100% proper output escaping and the presence of nonce checks on sensitive operations indicate good development practices aimed at preventing common web vulnerabilities. The plugin also has no recorded vulnerability history, further reinforcing its current security effectiveness.

While the static analysis shows no critical or high-severity issues like taint flows or unsanitized paths, the lack of capability checks on any code is a potential, albeit minor, concern. In the context of the plugin's current function (presumably very limited given the analysis), this may not pose an immediate threat. However, if the plugin's functionality were to expand or interact with sensitive data, implementing capability checks would be a crucial security enhancement. Overall, this plugin appears very secure, with its main area for improvement being the addition of capability checks for future-proofing and best practice adherence.

Key Concerns

  • Missing capability checks on any code
Vulnerabilities
None known

Random Post Date Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Random Post Date Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
22 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped22 total outputs
Attack Surface

Random Post Date Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menurandom-post-date.php:29
actionadmin_initrandom-post-date.php:39
actionadmin_enqueue_scriptsrandom-post-date.php:68
actionadmin_initrandom-post-date.php:189
actionadmin_menutrunk\random-post-date.php:29
actionadmin_inittrunk\random-post-date.php:39
actionadmin_enqueue_scriptstrunk\random-post-date.php:68
actionadmin_inittrunk\random-post-date.php:189
Maintenance & Trust

Random Post Date Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 6, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs70
Developer Profile

Random Post Date Developer Profile

Joseph Adediji

5 plugins · 190 total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Random Post Date

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/random-post-date/js/rndpd-scripts.js/wp-content/plugins/random-post-date/css/rndpd-styles.css
Script Paths
js/rndpd-scripts.js
Version Parameters
random-post-date/js/rndpd-scripts.js?ver=1.0.0random-post-date/css/rndpd-styles.css?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
wrapform-tableregular-text
Data Attributes
id="rndpd_date1"name="rndpd_date1"id="rndpd_date2"name="rndpd_date2"name="rndpd_post_type"id="rndpd_set_modified_date"+5 more
FAQ

Frequently Asked Questions about Random Post Date