Time Machine Security & Risk Analysis

wordpress.org/plugins/time-machine

Time Machine widget list articles published in past, relative to current date for specified offset of time, including all years of blogging (Ok, at le …

90 active installs v0.4.1 PHP + WP 3.9+ Updated Dec 28, 2020
archivepastpoststimewidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Time Machine Safe to Use in 2026?

Generally Safe

Score 85/100

Time Machine has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "time-machine" plugin v0.4.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the analysis indicates a complete lack of direct SQL queries without prepared statements, no file operations, and no external HTTP requests, all of which are positive security indicators. The presence of nonce and capability checks, even with a limited entry point, demonstrates an awareness of fundamental WordPress security practices.

However, a notable concern arises from the output escaping. With 63 total outputs and only 22% properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, or data that passes through the plugin without proper sanitization before output, could potentially be injected and executed in the browser of other users. The taint analysis, while showing zero flows with unsanitized paths, might be limited by the analyzed scope. Given the limited entry points, it's possible that more complex or indirect taint chains were not detected, but the unescaped output remains the primary, evidence-backed concern.

The plugin's vulnerability history is clean, with zero recorded CVEs. This is a positive sign, suggesting a history of secure development. However, it's important to note that a clean history doesn't guarantee future security, especially when combined with a weakness like poor output escaping. The lack of any detected vulnerabilities so far might also be attributed to the limited attack surface and the fact that this version is relatively recent, or that the plugin might not have been subjected to extensive external security audits or fuzzing.

Key Concerns

  • Insufficient output escaping detected
Vulnerabilities
None known

Time Machine Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Time Machine Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
49
14 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

22% escaped63 total outputs
Attack Surface

Time Machine Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initinc\widget.php:399
Maintenance & Trust

Time Machine Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 28, 2020
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings2
Active installs90
Developer Profile

Time Machine Developer Profile

Aleksandar Urošević

8 plugins · 108K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
180 days
View full developer profile
Detection Fingerprints

How We Detect Time Machine

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/time-machine/css/style.css
Script Paths
/wp-content/plugins/time-machine/js/script.js
Version Parameters
time-machine/css/style.css?ver=time-machine/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
article-titlemeta-date
Data Attributes
style="cursor:help"
FAQ

Frequently Asked Questions about Time Machine