
Stealth Update Security & Risk Analysis
wordpress.org/plugins/stealth-updateAdds the ability to update a post without having WordPress automatically update the post's post_modified timestamp.
Is Stealth Update Safe to Use in 2026?
Generally Safe
Score 85/100Stealth Update has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "stealth-update" v2.5 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any discovered AJAX handlers, REST API routes, shortcodes, or cron events, particularly those unprotected by authentication, indicates a minimal attack surface. Furthermore, the code analysis reveals no dangerous functions, file operations, or external HTTP requests, and all SQL queries utilize prepared statements, which are excellent security practices. The plugin also shows no history of known vulnerabilities, suggesting a consistently secure development lifecycle.
However, a significant concern arises from the moderate rate of output escaping (57% properly escaped). This implies that a portion of the plugin's output may be susceptible to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sufficiently sanitized before being displayed. The complete lack of nonce checks and capability checks, while potentially acceptable given the zero attack surface, represents a missed opportunity for defense-in-depth and could become a risk if the plugin's functionality or entry points were to expand in future versions. The absence of taint analysis data is also noteworthy, as it prevents a complete assessment of data flow security. In conclusion, while "stealth-update" v2.5 is well-protected against common web vulnerabilities due to its limited attack surface and secure SQL handling, the unescaped output presents a specific area of concern that should be addressed.
Key Concerns
- Moderate unescaped output
- Missing nonce checks
- Missing capability checks
Stealth Update Security Vulnerabilities
Stealth Update Release Timeline
Stealth Update Code Analysis
Output Escaping
Stealth Update Attack Surface
WordPress Hooks 6
Maintenance & Trust
Stealth Update Maintenance & Trust
Maintenance Signals
Community Trust
Stealth Update Alternatives
Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories
post-expirator
PublishPress Future can make scheduled changes to your content. You can unpublish posts, move posts to a new status, update the categories, and more.
Last Modified Timestamp
last-modified-timestamp
Adds the last modified time to the admin interface as well as a [last-modified] shortcode to use on the front-end.
Post Updated Date
post-updated-date
Use Post Updated Date Plugin to display the Last Updated Date in WordPress Posts.
Bulk Post Status Update
bulk-post-status-update
The users can change the status of posts and custom posts to draft and publish them in bulk.
Add Post Last Updated Date For WP
add-post-last-updated-date-for-wp
This plugin is used to add last updated date and time of any wordpress post. Supported for both single site and multisite.
Stealth Update Developer Profile
63 plugins · 92K total installs
How We Detect Stealth Update
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/stealth-update/assets/admin.js/wp-content/plugins/stealth-update/assets/admin.jsstealth-update/assets/admin.js?ver=HTML / DOM Fingerprints
c2c-stealth-updatefor="stealth_update"id="stealth_update"name="stealth_update"