
Time Machine Security & Risk Analysis
wordpress.org/plugins/time-machineTime Machine widget list articles published in past, relative to current date for specified offset of time, including all years of blogging (Ok, at le …
Is Time Machine Safe to Use in 2026?
Generally Safe
Score 85/100Time Machine has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "time-machine" plugin v0.4.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the analysis indicates a complete lack of direct SQL queries without prepared statements, no file operations, and no external HTTP requests, all of which are positive security indicators. The presence of nonce and capability checks, even with a limited entry point, demonstrates an awareness of fundamental WordPress security practices.
However, a notable concern arises from the output escaping. With 63 total outputs and only 22% properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, or data that passes through the plugin without proper sanitization before output, could potentially be injected and executed in the browser of other users. The taint analysis, while showing zero flows with unsanitized paths, might be limited by the analyzed scope. Given the limited entry points, it's possible that more complex or indirect taint chains were not detected, but the unescaped output remains the primary, evidence-backed concern.
The plugin's vulnerability history is clean, with zero recorded CVEs. This is a positive sign, suggesting a history of secure development. However, it's important to note that a clean history doesn't guarantee future security, especially when combined with a weakness like poor output escaping. The lack of any detected vulnerabilities so far might also be attributed to the limited attack surface and the fact that this version is relatively recent, or that the plugin might not have been subjected to extensive external security audits or fuzzing.
Key Concerns
- Insufficient output escaping detected
Time Machine Security Vulnerabilities
Time Machine Code Analysis
SQL Query Safety
Output Escaping
Time Machine Attack Surface
WordPress Hooks 1
Maintenance & Trust
Time Machine Maintenance & Trust
Maintenance Signals
Community Trust
Time Machine Alternatives
Expanding Archives
expanding-archives
This plugin adds a new widget where you can view your old posts by expanding certain years and months.
A Year Before
a-year-before
"A Year Before" shows a list of articles, which were written a certain time ago. So you can show in a history, what happend in your blog in …
Categories Recent Posts Widget
category-recent-posts-widget
This widget displays the recent posts on a category page for that category
CPK Ultimate Archives
cpk-ultimate-archives
An improved version of the default WP Archives widget that allows complex filtering.
azurecurve Posts Archive
azurecurve-posts-archive
Posts Archive (multi-site compatible) based on Ozh Tweet Archive Theme; archive can be displayed in a widget, post or page.
Time Machine Developer Profile
8 plugins · 108K total installs
How We Detect Time Machine
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/time-machine/css/style.css/wp-content/plugins/time-machine/js/script.jstime-machine/css/style.css?ver=time-machine/js/script.js?ver=HTML / DOM Fingerprints
article-titlemeta-datestyle="cursor:help"