Schedule Posts Calendar Security & Risk Analysis

wordpress.org/plugins/schedule-posts-calendar

Adds a JavaScript calendar to the scheduled publish widget to allow you to select a date and time graphically instead of via the text entry boxes.

1K active installs v5.3 PHP + WP 3.0.0+ Updated Dec 3, 2023
admincalendarposts
84
B · Generally Safe
CVEs total2
Unpatched0
Last CVEAug 16, 2023
Safety Verdict

Is Schedule Posts Calendar Safe to Use in 2026?

Mostly Safe

Score 84/100

Schedule Posts Calendar is generally safe to use though it hasn't been updated recently. 2 past CVEs were resolved. Keep it updated.

2 known CVEsLast CVE: Aug 16, 2023Updated 2yr ago
Risk Assessment

The static analysis of "schedule-posts-calendar" v5.3 shows a generally strong security posture with no identified entry points for direct attacks and a good adherence to secure coding practices like prepared statements and a majority of output escaping. The absence of dangerous functions, file operations, external HTTP requests, and taint flows is commendable. However, the plugin has a history of documented vulnerabilities, specifically two medium-severity issues including Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). While there are currently no unpatched CVEs, this historical pattern suggests a tendency for vulnerabilities to emerge, which warrants caution.

Despite the current clean bill of health from the static analysis, the historical CVE data is a significant concern. The presence of past XSS and CSRF vulnerabilities, even if medium severity and now patched, indicates potential weaknesses in input sanitization or CSRF protection that could resurface in future versions or be exploited in ways not immediately apparent from the static analysis alone. The plugin also lacks explicit capability checks, relying solely on a single nonce check for its limited attack surface. While the attack surface is currently zero, this reliance on a single defense mechanism could be a point of failure if new entry points are introduced in future updates.

In conclusion, "schedule-posts-calendar" v5.3 demonstrates good internal coding hygiene with a minimal attack surface. However, its vulnerability history is a notable weakness. The past XSS and CSRF issues, coupled with the lack of capability checks, present a moderate risk. Users should remain vigilant and ensure the plugin is always updated to the latest version to benefit from any security patches.

Key Concerns

  • Medium severity CVEs recorded
  • Past XSS and CSRF vulnerabilities
  • Lack of capability checks
  • Only one nonce check for limited attack surface
  • 83% output escaping (some unescaped output)
Vulnerabilities
2

Schedule Posts Calendar Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-40560medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Schedule Posts Calendar <= 5.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings

Aug 16, 2023 Patched in 5.3 (160d)
CVE-2023-40556medium · 4.3Cross-Site Request Forgery (CSRF)

Schedule Posts Calendar <= 5.2 - Cross-Site Request Forgery

Aug 16, 2023 Patched in 5.3 (160d)
Code Analysis
Analyzed Mar 16, 2026

Schedule Posts Calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
13
64 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

83% escaped77 total outputs
Attack Surface

Schedule Posts Calendar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitschedule-posts-calendar.php:506
actionadmin_initschedule-posts-calendar.php:520
actionadmin_print_scriptsschedule-posts-calendar.php:522
filterpost_row_actionsschedule-posts-calendar.php:528
filterpage_row_actionsschedule-posts-calendar.php:529
actionadmin_print_scriptsschedule-posts-calendar.php:531
actionadmin_menuschedule-posts-calendar.php:537
Maintenance & Trust

Schedule Posts Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedDec 3, 2023
PHP min version
Downloads36K

Community Trust

Rating94/100
Number of ratings10
Active installs1K
Developer Profile

Schedule Posts Calendar Developer Profile

Greg Ross

34 plugins · 8K total installs

80
trust score
Avg Security Score
88/100
Avg Patch Time
39 days
View full developer profile
Detection Fingerprints

How We Detect Schedule Posts Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/schedule-posts-calendar/dhtmlxcalendar.css/wp-content/plugins/schedule-posts-calendar/skins/css/dhtmlxcalendar_dhx_skyblue.css/wp-content/plugins/schedule-posts-calendar/skins/css/dhtmlxcalendar_dhx_web.css/wp-content/plugins/schedule-posts-calendar/skins/css/dhtmlxcalendar_dhx_terrace.css/wp-content/plugins/schedule-posts-calendar/skins/css/dhtmlxcalendar_material.css/wp-content/plugins/schedule-posts-calendar/skins/css/dhtmlxcalendar_wordpress.css/wp-content/plugins/schedule-posts-calendar/hide-timestamp.css
Script Paths
/wp-content/plugins/schedule-posts-calendar/dhtmlxcalendar.js/wp-content/plugins/schedule-posts-calendar/schedule-posts-calendar.js/wp-content/plugins/schedule-posts-calendar/schedule-posts-calendar-quick-schedule.js
Version Parameters
schedule-posts-calendar.js?theme=schedule-posts-calendar-quick-schedule.js?theme=

HTML / DOM Fingerprints

CSS Classes
dhx_calendar_icon
Data Attributes
id="dhtmlx_calendar_icon_id"data-themedata-startofweekdata-popupcalendar
JS Globals
schedule_posts_calendardhtmlxCalendarObject
FAQ

Frequently Asked Questions about Schedule Posts Calendar