Re-trigger Scheduled Posts Security & Risk Analysis

wordpress.org/plugins/re-trigger-scheduled-posts

Originally adapted from Scheduled Post Trigger to be more resource efficient.

0 active installs v1.1.2 PHP 5.6+ WP 3.9+ Updated Aug 17, 2021
categoriescategorytagtagsterms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Re-trigger Scheduled Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Re-trigger Scheduled Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "re-trigger-scheduled-posts" v1.1.2 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, file operations, external HTTP requests, or SQL queries that do not use prepared statements is commendable. Furthermore, the 100% proper output escaping and the lack of any taint analysis findings with unsanitized paths indicate a diligent approach to preventing common web vulnerabilities. The vulnerability history being completely clean further solidifies this positive assessment.

However, the analysis does reveal a couple of areas that, while not presenting immediate critical risks in this version, represent potential weaknesses. The presence of a cron event without explicit mention of capability checks or nonce protection on its potential handler (if it interacts with user input or sensitive actions) is a minor concern. Similarly, the complete absence of nonce checks across all entry points (AJAX, REST API, etc.) and capability checks on entry points is a notable gap. While there are currently no unprotected entry points or known vulnerabilities, this lack of fundamental WordPress security mechanisms could become a liability if the plugin's functionality expands or if its cron event is modified to handle user-provided data in the future.

In conclusion, this plugin demonstrates good coding practices in many areas, particularly concerning data handling and output sanitization. The clean vulnerability history is a significant strength. The primary areas for improvement lie in implementing standard WordPress security checks like nonce and capability checks, especially around its cron event and any future expansion of its attack surface.

Key Concerns

  • Cron event without auth checks identified
  • No nonce checks identified
  • No capability checks identified
Vulnerabilities
None known

Re-trigger Scheduled Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Re-trigger Scheduled Posts Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Re-trigger Scheduled Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries
Attack Surface

Re-trigger Scheduled Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionmlrtsp_cronretrigger-scheduled-posts.php:56

Scheduled Events 1

mlrtsp_cron
Maintenance & Trust

Re-trigger Scheduled Posts Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedAug 17, 2021
PHP min version5.6
Downloads908

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Re-trigger Scheduled Posts Developer Profile

Landon

2 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Re-trigger Scheduled Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/re-trigger-scheduled-posts/re-trigger-scheduled-posts.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Re-trigger Scheduled Posts