Simple Reading Time Security & Risk Analysis

wordpress.org/plugins/simple-reading-time

This plugin scans your article and generates average reading time, number of words divided by 200.

0 active installs v1.0 PHP 5.0+ WP 3.5+ Updated Unknown
average-reading-timepost-reading-timereading-time
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Reading Time Safe to Use in 2026?

Generally Safe

Score 100/100

Simple Reading Time has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The simple-reading-time plugin v1.0 demonstrates a strong security posture based on the provided static analysis. The complete absence of dangerous functions, SQL queries that are 100% prepared, and perfectly escaped output are excellent indicators of secure coding practices. Furthermore, the lack of file operations and external HTTP requests reduces the potential attack surface considerably. The plugin also shows no recorded vulnerabilities, CVEs, or common vulnerability types in its history, suggesting a well-maintained and secure codebase over time.

While the static analysis reveals no explicit security flaws or taint flows, a key area of concern is the complete lack of any protective mechanisms such as nonce checks or capability checks across its limited entry points. Although the current attack surface is zero, this absence means that if any entry points were to be introduced in future versions or if the plugin's functionality were to expand, they would inherently be unprotected. The vulnerability history being clean is a positive sign, but it doesn't negate the fundamental absence of security controls that could safeguard against unforeseen issues or evolving threats.

In conclusion, the current version of simple-reading-time appears to be highly secure due to its clean code and lack of historical vulnerabilities. However, the complete omission of authentication and authorization checks on its (currently non-existent) entry points represents a significant weakness. This is a missed opportunity to implement foundational security practices that would future-proof the plugin against potential risks as it evolves. The plugin is strong in its current implementation but lacks defensive depth.

Key Concerns

  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Simple Reading Time Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple Reading Time Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Simple Reading Time Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionthe_contentsimple-reading-time.php:23
Maintenance & Trust

Simple Reading Time Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedUnknown
PHP min version5.0
Downloads977

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Simple Reading Time Developer Profile

Goran S.

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Reading Time

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<small style='line-height: 5;'>🕐 <em>Average reading time: less than a minute.</em></small> <br><small style='line-height: 5;'>🕐 <em>Average reading time: $average_time minute(s) </em></small> <br>
FAQ

Frequently Asked Questions about Simple Reading Time