Schedule Tags Security & Risk Analysis

wordpress.org/plugins/schedule-tags

Schedule tags allows site admin to set post tags for the given time frame. So that when a schedule set time frame comes the plugin automatically sets …

10 active installs v1.1 PHP 5.4+ WP 4.0+ Updated Jun 4, 2020
custom-tagsdynamic-tagsexpired-tagsfuture-tagsschedule-tags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Schedule Tags Safe to Use in 2026?

Generally Safe

Score 85/100

Schedule Tags has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The Schedule-Tags plugin v1.1 presents a mixed security posture. On the positive side, it demonstrates good practices in handling SQL queries, utilizing prepared statements exclusively, and has no known historical vulnerabilities. This suggests a mature development process and a commitment to secure coding. However, the static analysis reveals several areas for concern that impact its overall security. The presence of the `unserialize` function is a significant risk, as it can lead to Remote Code Execution if used with untrusted input. Furthermore, a concerningly low percentage (15%) of output escaping suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, especially given the lack of specific checks for this in the provided data. The absence of nonce checks on its single cron event and lack of capability checks on all identified entry points (though limited) are also potential weaknesses that could be exploited. Despite the lack of historical CVEs, the identified code signals warrant attention to mitigate potential risks.

Key Concerns

  • Use of unserialize function
  • Low percentage of properly escaped output
  • No nonce checks on cron events
  • Limited capability checks on entry points
Vulnerabilities
None known

Schedule Tags Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Schedule Tags Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
1 prepared
Unescaped Output
22
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$m_value = unserialize($scheduledTag->meta_value);inc\wp-tags-schedule.php:255

SQL Query Safety

100% prepared1 total queries

Output Escaping

15% escaped26 total outputs
Attack Surface

Schedule Tags Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadd_meta_boxesinc\wp-tags-schedule.php:25
actionadmin_enqueue_scriptsinc\wp-tags-schedule.php:26
actionsave_postinc\wp-tags-schedule.php:27
actionadmin_menuinc\wp-tags-schedule.php:29
actionadmin_initinc\wp-tags-schedule.php:30
actioninitinc\wp-tags-schedule.php:32
actionwpts_tags_croninc\wp-tags-schedule.php:33
actionplugins_loadedschedule-tags.php:21

Scheduled Events 1

wpts_tags_cron
Maintenance & Trust

Schedule Tags Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedJun 4, 2020
PHP min version5.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Schedule Tags Developer Profile

ZetaMatic

5 plugins · 7K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Schedule Tags

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/schedule-tags/assets/js/tag-scheduler.js
Version Parameters
wpst-main?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
tags-scheduler-datastartDateendDatetags-scheduler-remove-row
Data Attributes
data-name
FAQ

Frequently Asked Questions about Schedule Tags