Schedule Terms Security & Risk Analysis

wordpress.org/plugins/schedule-terms

Automatically set and unset the term when the time is up.

20 active installs v1.3.2 PHP 7.4+ WP 5.9+ Updated Mar 12, 2024
scheduleterm
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Schedule Terms Safe to Use in 2026?

Generally Safe

Score 85/100

Schedule Terms has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "schedule-terms" plugin version 1.3.2 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code signals indicate responsible development practices, with no dangerous functions, all SQL queries using prepared statements, and all output being properly escaped. The lack of file operations and external HTTP requests further reduces risk. The plugin also has no recorded vulnerabilities, which suggests a history of stable and secure code.

While the static analysis and vulnerability history paint a positive picture, the complete absence of nonce checks and capability checks across all entry points (though there are zero entry points reported) is a theoretical concern if the plugin were to introduce new entry points in the future without proper authorization mechanisms. However, given the current state of zero identified entry points, this does not represent an immediate exploitable risk. The plugin's strengths lie in its clean code, adherence to secure coding practices for SQL and output, and a spotless vulnerability record. The primary weakness, albeit currently theoretical due to the lack of entry points, is the absence of explicit security checks like nonces and capabilities.

In conclusion, "schedule-terms" v1.3.2 appears to be a very secure plugin. The developers have demonstrated a commitment to secure coding by using prepared statements for SQL and properly escaping output. The lack of any recorded vulnerabilities further reinforces its reliability. The absence of entry points effectively neutralizes the theoretical concern of missing authorization checks. Users can have a high degree of confidence in the security of this plugin in its current version and configuration.

Key Concerns

  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Schedule Terms Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Schedule Terms Release Timeline

v1.3.2Current
v1.2.4
v1.2.2
v1.2.1
v1.2.0
v1.1.1
v1.1.0
v1.0.6
v1.0.5
v1.0.4
v1.0.3
v1.0.2
v1.0.1
Code Analysis
Analyzed Mar 16, 2026

Schedule Terms Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
37 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped37 total outputs
Attack Surface

Schedule Terms Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionenqueue_block_editor_assetsincludes\Assets.php:19
actioninitincludes\Post_Meta.php:28
actioninitincludes\Term\UI.php:78
actioncreate_termincludes\Term\UI.php:102
actionedit_termincludes\Term\UI.php:103
actionload-edit-tags.phpincludes\Term\UI.php:123
actionadmin_enqueue_scriptsincludes\Term\UI.php:134
actionadmin_headincludes\Term\UI.php:135
actionadmin_headincludes\Term\UI.php:136
actionquick_edit_custom_boxincludes\Term\UI.php:140
actionwp_after_insert_postincludes\Term_Manager.php:52
actionwp_after_insert_postincludes\Term_Manager.php:53
actioninitincludes\Term_Meta.php:28
Maintenance & Trust

Schedule Terms Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMar 12, 2024
PHP min version7.4
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Schedule Terms Developer Profile

Toro_Unit (Hiroshi Urabe)

23 plugins · 216K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Schedule Terms

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/schedule-terms/build/editor.asset.php/wp-content/plugins/schedule-terms/build/admin.asset.php
Script Paths
/wp-content/plugins/schedule-terms/build/editor.js/wp-content/plugins/schedule-terms/build/admin.js
Version Parameters
schedule-terms/build/editor.js?ver=schedule-terms/build/admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-schedule-terms-active
REST Endpoints
/wp-json/schedule-terms/v1/posts
FAQ

Frequently Asked Questions about Schedule Terms