Simple AutoPOP Security & Risk Analysis

wordpress.org/plugins/simple-autopop

A simple calendar that calls the EventUpon API to pull the next three events from the organizations you’ve selected!

0 active installs v1.0 PHP + WP 3.0.1+ Updated Unknown
calendarcommunityeventsevents-widgeteventupon
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple AutoPOP Safe to Use in 2026?

Generally Safe

Score 100/100

Simple AutoPOP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'simple-autopop' v1.0 plugin exhibits a generally good security posture based on the provided static analysis. The complete absence of attack surface points like AJAX handlers, REST API routes, and shortcodes significantly limits the avenues for external interaction. Furthermore, the code's adherence to using prepared statements for all SQL queries and the lack of dangerous functions are positive indicators. However, a critical concern arises from the low percentage of properly escaped output (11%). This suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data might be rendered directly in the browser without sufficient sanitization. The presence of capability checks, while positive, is undermined by the complete lack of nonce checks, which is a significant security oversight, especially if any of the entry points were to be discovered or added in the future. The plugin's vulnerability history being completely clean is a strong positive, indicating a lack of known exploitable issues. However, this does not negate the risks identified in the static analysis, particularly the unescaped output, which could be a latent vulnerability. In conclusion, while the plugin's design minimizes attack vectors and its SQL handling is robust, the severe lack of output escaping presents a substantial risk of XSS, and the absence of nonce checks is a concerning omission that could be exploited if new entry points are introduced.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks on any entry points
Vulnerabilities
None known

Simple AutoPOP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple AutoPOP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
1 escaped
Nonce Checks
0
Capability Checks
2
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

11% escaped9 total outputs
Attack Surface

Simple AutoPOP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initsettings.php:12
actionadmin_menusettings.php:13
actionadmin_menusimple-autopop.php:50
actionwidgets_initsimple-autopop.php:52
Maintenance & Trust

Simple AutoPOP Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedUnknown
PHP min version
Downloads996

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Simple AutoPOP Developer Profile

maksim270

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple AutoPOP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-autopop/style.css

HTML / DOM Fingerprints

Shortcode Output
[simple-autopop]
FAQ

Frequently Asked Questions about Simple AutoPOP