
Schedule Terms Security & Risk Analysis
wordpress.org/plugins/schedule-termsAutomatically set and unset the term when the time is up.
Is Schedule Terms Safe to Use in 2026?
Generally Safe
Score 85/100Schedule Terms has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "schedule-terms" plugin version 1.3.2 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code signals indicate responsible development practices, with no dangerous functions, all SQL queries using prepared statements, and all output being properly escaped. The lack of file operations and external HTTP requests further reduces risk. The plugin also has no recorded vulnerabilities, which suggests a history of stable and secure code.
While the static analysis and vulnerability history paint a positive picture, the complete absence of nonce checks and capability checks across all entry points (though there are zero entry points reported) is a theoretical concern if the plugin were to introduce new entry points in the future without proper authorization mechanisms. However, given the current state of zero identified entry points, this does not represent an immediate exploitable risk. The plugin's strengths lie in its clean code, adherence to secure coding practices for SQL and output, and a spotless vulnerability record. The primary weakness, albeit currently theoretical due to the lack of entry points, is the absence of explicit security checks like nonces and capabilities.
In conclusion, "schedule-terms" v1.3.2 appears to be a very secure plugin. The developers have demonstrated a commitment to secure coding by using prepared statements for SQL and properly escaping output. The lack of any recorded vulnerabilities further reinforces its reliability. The absence of entry points effectively neutralizes the theoretical concern of missing authorization checks. Users can have a high degree of confidence in the security of this plugin in its current version and configuration.
Key Concerns
- No nonce checks found
- No capability checks found
Schedule Terms Security Vulnerabilities
Schedule Terms Release Timeline
Schedule Terms Code Analysis
Output Escaping
Schedule Terms Attack Surface
WordPress Hooks 13
Maintenance & Trust
Schedule Terms Maintenance & Trust
Maintenance Signals
Community Trust
Schedule Terms Alternatives
Inline Typography Controls
inline-typography-controls
Add inline typography controls to the editor.
eTermin Booking Integration
etermin-booking-integration
Easily integrate the eTermin.net online appointment scheduling calendar into your WordPress website via Shortcode.
PosterMyWall Events Calendar
postermywall-events-calendar
Display upcoming events on WordPress with the AI-powered PosterMyWall Events Calendar plugin. Enjoy beautiful, interactive calendars that auto-update.
The Events Calendar
the-events-calendar
The Events Calendar: #1 calendar plugin for WordPress. Create/manage events (virtual too!) on your site with the free plugin.
Category Order and Taxonomy Terms Order
taxonomy-terms-order
Drag-and-drop ordering for Categories & any taxonomy (hierarchically) using a Drag and Drop Sortable JavaScript capability.
Schedule Terms Developer Profile
23 plugins · 216K total installs
How We Detect Schedule Terms
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/schedule-terms/build/editor.asset.php/wp-content/plugins/schedule-terms/build/admin.asset.php/wp-content/plugins/schedule-terms/build/editor.js/wp-content/plugins/schedule-terms/build/admin.jsschedule-terms/build/editor.js?ver=schedule-terms/build/admin.js?ver=HTML / DOM Fingerprints
data-schedule-terms-active/wp-json/schedule-terms/v1/posts