Restore Exact Time Security & Risk Analysis

wordpress.org/plugins/restore-exact-time

Changes the date columns in the post and page interfaces to display exact times that a post or page was published.

10 active installs v1.0.2 PHP + WP 2.5+ Updated Apr 20, 2008
adminmanagepagespostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Restore Exact Time Safe to Use in 2026?

Generally Safe

Score 85/100

Restore Exact Time has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The "restore-exact-time" plugin v1.0.2 exhibits a very limited attack surface based on the provided static analysis. It has no detectable AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the number of potential entry points for malicious actors. Furthermore, the code appears to handle SQL queries securely using prepared statements and does not engage in file operations or external HTTP requests. This generally indicates good development practices in these specific areas.

However, a significant concern arises from the output escaping analysis. 100% of observed outputs are not properly escaped. This means that any data displayed by the plugin, if it were to contain user-supplied or otherwise untrusted input, could be vulnerable to Cross-Site Scripting (XSS) attacks. While there are no known vulnerabilities in its history, this lack of output escaping is a serious oversight that could be exploited in conjunction with other potential, albeit currently undetected, weaknesses.

In conclusion, the plugin's strengths lie in its minimal attack surface and secure SQL handling. The primary weakness is the complete lack of output escaping, which introduces a critical XSS risk. The absence of past vulnerabilities is positive, but it cannot offset the direct, evident security flaw identified in the code. Developers should prioritize addressing the output escaping issue.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

Restore Exact Time Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Restore Exact Time Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Restore Exact Time Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filtermanage_posts_columnsrestore-exact-time.php:68
actionmanage_posts_custom_columnrestore-exact-time.php:69
filtermanage_pages_columnsrestore-exact-time.php:70
actionmanage_pages_custom_columnrestore-exact-time.php:71
Maintenance & Trust

Restore Exact Time Maintenance & Trust

Maintenance Signals

WordPress version tested2.5
Last updatedApr 20, 2008
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Restore Exact Time Developer Profile

nickohrn

12 plugins · 760 total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Restore Exact Time

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Restore Exact Time