Update Posts Date Security & Risk Analysis

wordpress.org/plugins/update-posts-date

Update posts date automatically by setting the date to the current date.

40 active installs v1.1 PHP 7.4+ WP 5.0+ Updated May 12, 2024
old-postold-postsrepublishrepublishing
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Update Posts Date Safe to Use in 2026?

Generally Safe

Score 92/100

Update Posts Date has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "update-posts-date" plugin v1.1 demonstrates a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the attack surface, and importantly, no unprotected entry points were identified. The code also shows good practices regarding SQL queries, exclusively using prepared statements, and a high percentage of output escaping. The presence of a nonce check and a capability check further bolsters its defenses against common web vulnerabilities. The taint analysis revealed no critical or high-severity issues, and the plugin's vulnerability history is clean, with no known CVEs recorded. This indicates a mature development process and a commitment to security. However, it's worth noting that the plugin has a small number of total outputs (49), and while 88% are escaped, this still leaves a small percentage that could potentially be vulnerable if they handle user-controlled data. The overall risk is assessed as low.

Key Concerns

  • Small percentage of unescaped outputs
Vulnerabilities
None known

Update Posts Date Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Update Posts Date Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
6
43 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

88% escaped49 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
updp_options_page (update-posts-date.php:410)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Update Posts Date Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedupdate-posts-date.php:49
actioninitupdate-posts-date.php:66
actionadmin_menuupdate-posts-date.php:67
filterthe_contentupdate-posts-date.php:68
filterplugin_row_metaupdate-posts-date.php:69
Maintenance & Trust

Update Posts Date Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 12, 2024
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Update Posts Date Developer Profile

edckwt

13 plugins · 520 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Update Posts Date

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/update-posts-date/css/style.css/wp-content/plugins/update-posts-date/css/rtl.css

HTML / DOM Fingerprints

CSS Classes
updp
FAQ

Frequently Asked Questions about Update Posts Date