
Schedule Unpublish Security & Risk Analysis
wordpress.org/plugins/schedule-unpublishA plugin to schedule an unpublish date and time field when editing posts. A scheduled task runs hourly in the background to update the post status.
Is Schedule Unpublish Safe to Use in 2026?
Generally Safe
Score 100/100Schedule Unpublish has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "schedule-unpublish" plugin v1.0.0 exhibits a generally good security posture based on the provided static analysis. The absence of identified dangerous functions, raw SQL queries, file operations, and external HTTP requests is highly positive. The plugin also correctly utilizes prepared statements for its SQL operations and includes a nonce check, which are crucial security best practices. However, the lack of capability checks and the relatively low percentage of properly escaped output (68%) present potential areas of concern. While no critical taint flows were identified, the limited taint analysis (0 flows analyzed) means this aspect may not be exhaustively reviewed.
The vulnerability history shows no recorded CVEs, indicating a lack of known historical weaknesses. This, combined with the clean static analysis in many critical areas, suggests the developers have likely followed secure coding principles. The plugin's attack surface is minimal, with no direct AJAX, REST API, or shortcode entry points exposed without authentication. The single cron event is an entry point, but its security without explicit checks needs further scrutiny.
In conclusion, "schedule-unpublish" v1.0.0 appears to be a relatively secure plugin, especially concerning its handling of database queries and core entry points. The main weaknesses lie in the potential for cross-site scripting (XSS) due to insufficient output escaping and the absence of capability checks, which could lead to unauthorized actions if logic flaws exist. The limited scope of the taint analysis is also a minor drawback. Despite these points, the plugin's strengths outweigh its current identified weaknesses, making it a low-to-moderate risk plugin assuming the identified output escaping and capability check issues are addressed.
Key Concerns
- Output escaping is not fully implemented (68% properly escaped)
- No capability checks found
- Limited taint analysis scope
Schedule Unpublish Security Vulnerabilities
Schedule Unpublish Code Analysis
Output Escaping
Schedule Unpublish Attack Surface
WordPress Hooks 8
Scheduled Events 1
Maintenance & Trust
Schedule Unpublish Maintenance & Trust
Maintenance Signals
Community Trust
Schedule Unpublish Alternatives
Yoast Duplicate Post
duplicate-post
The go-to tool for cloning posts and pages, including the powerful Rewrite & Republish feature.
Duplicate Page
duplicate-page
Duplicate Posts, Pages and Custom Posts easily using single click
Custom Post Type UI
custom-post-type-ui
Admin UI for creating custom content types like post types and taxonomies
Regenerate Thumbnails
regenerate-thumbnails
Regenerate the thumbnails for one or more of your image uploads. Useful when changing their sizes or your theme.
Post Types Order
post-types-order
Sort posts and custom post type objects using a drag-and-drop, sortable JavaScript AJAX interface, or through the default WordPress dashboard
Schedule Unpublish Developer Profile
4 plugins · 70 total installs
How We Detect Schedule Unpublish
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
id="schedule-unpublish"name="schedule_unpublish"