
Timify Security & Risk Analysis
wordpress.org/plugins/timifyWith Timify, let your audience know about the last modified date, publish date, and reading time of your articles. You can also customize each setting …
Is Timify Safe to Use in 2026?
Generally Safe
Score 85/100Timify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The timify plugin v1.1.2 presents a mixed security posture. On the positive side, it demonstrates strong coding practices with 100% output escaping and a high percentage of SQL queries utilizing prepared statements. There are no recorded vulnerabilities in its history, suggesting a generally well-maintained codebase. The absence of dangerous functions, file operations, and external HTTP requests further contributes to a stable foundation.
However, the plugin has significant security concerns related to its attack surface. Two AJAX handlers are present without any authentication checks, creating potential entry points for attackers. While no critical taint flows or direct SQL injection vulnerabilities are evident in the static analysis, the lack of nonce checks on these unprotected AJAX handlers is a notable weakness. This could allow for Cross-Site Request Forgery (CSRF) attacks if these handlers perform sensitive actions. The absence of nonce checks, combined with unprotected AJAX endpoints, represents the most immediate risk.
In conclusion, timify v1.1.2 benefits from good general coding hygiene and a clean vulnerability history. Nevertheless, the identified unprotected AJAX endpoints represent a critical gap in security. Addressing these unprotected AJAX handlers with proper authentication and nonce checks is crucial to mitigate potential CSRF vulnerabilities and significantly improve the plugin's overall security. The lack of recorded vulnerabilities is a good sign, but it does not excuse the presence of unprotected entry points.
Key Concerns
- AJAX handlers without auth checks
- AJAX handlers without nonce checks
Timify Security Vulnerabilities
Timify Release Timeline
Timify Code Analysis
SQL Query Safety
Output Escaping
Timify Attack Surface
AJAX Handlers 2
Shortcodes 4
WordPress Hooks 21
Maintenance & Trust
Timify Maintenance & Trust
Maintenance Signals
Community Trust
Timify Alternatives
Reading Time WP
reading-time-wp
Reading Time WP creates an estimated reading time of your posts that is inserted above the content or by using a shortcode.
Last Modified Timestamp
last-modified-timestamp
Adds the last modified time to the admin interface as well as a [last-modified] shortcode to use on the front-end.
Show modified Date in admin lists
show-modified-date-in-admin-lists
Show modified date column in the lists of pages and posts in the WordPress admin panel.
Just Writing Statistics
just-writing-statistics
Calculate your writing statistics on your WordPress site.
Post Updated Date
post-updated-date
Use Post Updated Date Plugin to display the Last Updated Date in WordPress Posts.
Timify Developer Profile
2 plugins · 800 total installs
How We Detect Timify
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/timify/assets/css/style.css/wp-content/plugins/timify/assets/js/timify.js/wp-content/plugins/timify/assets/js/timify.jstimify/assets/css/style.css?ver=timify/assets/js/timify.js?ver=HTML / DOM Fingerprints
timify-notice