Run External Crons Security & Risk Analysis

wordpress.org/plugins/run-external-crons

Use WordPress internal cron system to hit external URLs on a scheduled basis.

70 active installs v1.0 PHP + WP 3.3+ Updated Aug 14, 2012
croncron-jobcronjob
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Run External Crons Safe to Use in 2026?

Generally Safe

Score 85/100

Run External Crons has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'run-external-crons' v1.0 plugin exhibits a generally good security posture, adhering to several best practices. The absence of known CVEs and the plugin's relatively small attack surface are positive indicators. It also correctly uses prepared statements for all SQL queries and includes nonce checks and capability checks where appropriate, demonstrating a conscious effort to implement security measures.

However, there are a few areas for improvement. The static analysis indicates that only 67% of output is properly escaped, suggesting a potential for cross-site scripting (XSS) vulnerabilities if improperly handled data is displayed to users. Additionally, the plugin makes one external HTTP request, which, while not inherently dangerous, introduces an external dependency that could be a vector for attacks if the external resource is compromised or malicious. The limited taint analysis results are also noteworthy, as they don't necessarily mean there are no vulnerabilities, just that the analysis itself might not have detected any specific flows or the plugin's structure didn't lend itself to this type of analysis.

In conclusion, 'run-external-crons' v1.0 is a relatively secure plugin with a minimal known vulnerability history. The primary concern lies with the unescaped output, which warrants attention to ensure all dynamic content is properly sanitized. The external HTTP request, while a minor point, should be monitored and validated for its security implications.

Key Concerns

  • Unescaped output detected
  • External HTTP request made
Vulnerabilities
None known

Run External Crons Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Run External Crons Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
8 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

67% escaped12 total outputs
Attack Surface

Run External Crons Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitrun-external-crons.php:86
filterplugin_action_linksrun-external-crons.php:120
filtercron_schedulesrun-external-crons.php:146
actionadmin_menurun-external-crons.php:158
filterrec_add_intervalrun-external-crons.php:194
actionrec_eventrun-external-crons.php:228

Scheduled Events 2

rec_event
rec_event
Maintenance & Trust

Run External Crons Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedAug 14, 2012
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs70
Developer Profile

Run External Crons Developer Profile

Milan Dinić

20 plugins · 48K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Run External Crons

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
postbox-containermetabox-holderui-sortablemeta-box-sortablespostboxinside
HTML Comments
<!-- Todo: - add help --><!-- Don't show anything if user doesn't have capatibilities --><!-- If new settings were submitted, save them --><!-- Enqueue scripts -->+30 more
Data Attributes
style="width: 70%"
FAQ

Frequently Asked Questions about Run External Crons