Simple Diary for WordPress Security & Risk Analysis

wordpress.org/plugins/simple-diary

A very simple diary listing user created reminders. Ready to use in WordPress default themes.

30 active installs v1.4.1 PHP + WP 3.8+ Updated Oct 24, 2019
custom-post-typediaryreminders
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Diary for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Diary for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'simple-diary' plugin version 1.4.1 exhibits a generally strong security posture based on the provided static analysis. The complete absence of an attack surface through AJAX, REST API, shortcodes, and cron events, along with zero reported vulnerabilities historically, suggests careful development and a lack of known exploits. The presence of a nonce check is a positive sign for input validation. However, there are significant concerns regarding the handling of SQL queries and output escaping. The fact that 100% of SQL queries are not using prepared statements is a critical weakness, making the plugin highly susceptible to SQL injection attacks. Additionally, only 25% of output is properly escaped, indicating a risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is displayed without adequate sanitization. The lack of capability checks is also a concern, as it doesn't enforce user roles for any potential functionalities, though the limited attack surface mitigates this in the current version.

In conclusion, while the plugin has a clean vulnerability history and a minimal attack surface, the reliance on raw SQL queries and insufficient output escaping presents a substantial risk. Developers should prioritize addressing these issues to significantly improve the plugin's security. The absence of external HTTP requests and file operations is a positive note, reducing the attack vectors in those areas. The overall security is compromised by the identified data handling vulnerabilities, outweighing the benefits of its limited attack surface.

Key Concerns

  • Raw SQL queries without prepared statements
  • Insufficient output escaping
  • No capability checks
Vulnerabilities
None known

Simple Diary for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Simple Diary for WordPress Release Timeline

v1.4.1Current
v1.4
v1.3
v1.2.1
v1.2
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Simple Diary for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
0 prepared
Unescaped Output
84
28 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared6 total queries

Output Escaping

25% escaped112 total outputs
Attack Surface

Simple Diary for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actionadmin_initsimdiaw-options.php:19
actionadmin_menusimdiaw-options.php:22
actionwidgets_initsimdiaw-widget.php:65
actionplugins_loadedsimple-diary.php:17
actioninitsimple-diary.php:62
filterpost_updated_messagessimple-diary.php:99
filtermanage_edit-reminder_columnssimple-diary.php:127
actionmanage_reminder_posts_custom_columnsimple-diary.php:163
filtermanage_edit-reminder_sortable_columnssimple-diary.php:171
filterpre_get_postssimple-diary.php:187
actionload-edit.phpsimple-diary.php:190
filterrequestsimple-diary.php:193
actionadd_meta_boxessimple-diary.php:242
actionsave_postsimple-diary.php:561
actionadmin_print_stylessimple-diary.php:573
actionadmin_enqueue_scriptssimple-diary.php:593
actionadd_meta_boxessimple-diary.php:669
actionadmin_bar_menusimple-diary.php:670
actioninitsimple-diary.php:671
actionadmin_footersimple-diary.php:672
Maintenance & Trust

Simple Diary for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedOct 24, 2019
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Simple Diary for WordPress Developer Profile

jojaba

2 plugins · 930 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Diary for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-diary/css/admin.css/wp-content/plugins/simple-diary/css/frontend.css/wp-content/plugins/simple-diary/js/admin.js
Version Parameters
simple-diary/css/admin.css?ver=simple-diary/css/frontend.css?ver=simple-diary/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
simdiaw-admin-tablesimdiaw-reminders-list
HTML Comments
<!-- The language init --><!-- The template functions --><!-- Custom posts init for : 'reminder' --><!-- The edit page for diary (reminders) -->+3 more
Data Attributes
data-simdiaw-date-formatdata-simdiaw-time-format
JS Globals
simdiaw_date_formatsimdiaw_time_formatsimdiaw_start_date_optssimdiaw_end_date_optssimdiaw_start_time_optssimdiaw_end_time_opts
FAQ

Frequently Asked Questions about Simple Diary for WordPress