
Re-trigger Scheduled Posts Security & Risk Analysis
wordpress.org/plugins/re-trigger-scheduled-postsOriginally adapted from Scheduled Post Trigger to be more resource efficient.
Is Re-trigger Scheduled Posts Safe to Use in 2026?
Generally Safe
Score 85/100Re-trigger Scheduled Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "re-trigger-scheduled-posts" v1.1.2 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, file operations, external HTTP requests, or SQL queries that do not use prepared statements is commendable. Furthermore, the 100% proper output escaping and the lack of any taint analysis findings with unsanitized paths indicate a diligent approach to preventing common web vulnerabilities. The vulnerability history being completely clean further solidifies this positive assessment.
However, the analysis does reveal a couple of areas that, while not presenting immediate critical risks in this version, represent potential weaknesses. The presence of a cron event without explicit mention of capability checks or nonce protection on its potential handler (if it interacts with user input or sensitive actions) is a minor concern. Similarly, the complete absence of nonce checks across all entry points (AJAX, REST API, etc.) and capability checks on entry points is a notable gap. While there are currently no unprotected entry points or known vulnerabilities, this lack of fundamental WordPress security mechanisms could become a liability if the plugin's functionality expands or if its cron event is modified to handle user-provided data in the future.
In conclusion, this plugin demonstrates good coding practices in many areas, particularly concerning data handling and output sanitization. The clean vulnerability history is a significant strength. The primary areas for improvement lie in implementing standard WordPress security checks like nonce and capability checks, especially around its cron event and any future expansion of its attack surface.
Key Concerns
- Cron event without auth checks identified
- No nonce checks identified
- No capability checks identified
Re-trigger Scheduled Posts Security Vulnerabilities
Re-trigger Scheduled Posts Release Timeline
Re-trigger Scheduled Posts Code Analysis
SQL Query Safety
Re-trigger Scheduled Posts Attack Surface
WordPress Hooks 1
Scheduled Events 1
Maintenance & Trust
Re-trigger Scheduled Posts Maintenance & Trust
Maintenance Signals
Community Trust
Re-trigger Scheduled Posts Alternatives
WP Term Manager
wp-term-manager
WP Term Manager helps users clean up or hide terms for easier administration.
Bulk Term Generator – Import multiple tags, categories, and taxonomies easily
bulk-term-generator
Streamline taxonomy management in WordPress with Bulk Term Generator, your free tool for easy, bulk term importing.
Custom Recent Posts Widget
custom-recent-posts-widget
A widget to show recent posts list based on categories or tags
JSM Show Term Metadata
jsm-show-term-meta
Show term metadata in a metabox when editing terms - a great tool for debugging issues with term metadata.
Bulk Add Terms
bulk-add-terms
A lightweight plugin to add thousands of taxonomy terms in one go.
Re-trigger Scheduled Posts Developer Profile
2 plugins · 0 total installs
How We Detect Re-trigger Scheduled Posts
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/re-trigger-scheduled-posts/re-trigger-scheduled-posts.php