Scheduled Content Security & Risk Analysis

wordpress.org/plugins/scheduled-contnet-by-streama

Scheduled content enables you to schedule portions of a post or page and/or set an expiery date for that content.

60 active installs v2.1 PHP + WP 3.5+ Updated May 8, 2014
contentpagepostsscheduled-contenttimed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Scheduled Content Safe to Use in 2026?

Generally Safe

Score 85/100

Scheduled Content has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "scheduled-content-by-streama" plugin version 2.1 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is a significant positive. Furthermore, the complete use of prepared statements for SQL and proper output escaping indicates robust defensive coding practices. The lack of recorded vulnerabilities in its history further bolsters this impression, suggesting a well-maintained and secure codebase.

However, the analysis does reveal a potential area of concern: the lack of any capability checks or nonce checks across its entry points. While the current attack surface is small and consists of a single shortcode with no apparent unprotected AJAX or REST API routes, this absence of authorization and validation mechanisms could become a vulnerability if the plugin's functionality were to expand or if a new entry point were introduced without proper safeguards. Taint analysis also returned no findings, which is good, but a zero result on taint analysis can sometimes be due to the complexity or scope of the analysis itself.

In conclusion, this plugin appears to be securely developed with strong adherence to fundamental security principles like prepared statements and output escaping. The vulnerability history is also a major positive. The primary weakness lies in the complete absence of capability and nonce checks, which, while not a current exploitable issue given the limited attack surface, represents a technical debt that could lead to future vulnerabilities if not addressed. The plugin has a good foundation but could benefit from implementing these common security checks.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Scheduled Content Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Scheduled Content Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Scheduled Content Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[schedule] index.php:14
Maintenance & Trust

Scheduled Content Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedMay 8, 2014
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings6
Active installs60
Developer Profile

Scheduled Content Developer Profile

Danny159

2 plugins · 160 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Scheduled Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<!-- BEGIN SCHEDULED CONTENT BY THATBLOGGER --><!-- END SCHEDULED CONTENT BY THATBLOGGER -->
FAQ

Frequently Asked Questions about Scheduled Content