WD Post Renew Security & Risk Analysis

wordpress.org/plugins/wd-post-renew

Automatically update post publish dates to make content appear fresh—ideal for news, blogs, and recurring promotions.

0 active installs v1.01 PHP 8.0+ WP 4.7+ Updated Jul 24, 2025
postrenewpostsrenew
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WD Post Renew Safe to Use in 2026?

Generally Safe

Score 100/100

WD Post Renew has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8mo ago
Risk Assessment

The "wd-post-renew" v1.01 plugin exhibits a generally good security posture based on the static analysis. It has no known vulnerabilities (CVEs) and a clean vulnerability history, which is a strong indicator of developer diligence. The absence of dangerous functions, SQL injection risks (all queries use prepared statements), file operations, and external HTTP requests further strengthens its security profile. Nonce and capability checks are present on two entry points, suggesting some level of authorization is being enforced, although the limited number of entry points analyzed (0 AJAX, 0 REST API) makes it difficult to assess the full scope of authorization coverage.

However, a significant concern is the relatively low percentage of properly escaped output (45%). This means that a substantial portion of the data outputted by the plugin might be vulnerable to Cross-Site Scripting (XSS) attacks if malicious data is introduced into the system and rendered without proper sanitization. While there are no identified taint flows or critical code signals indicating immediate exploitation, the lack of comprehensive output escaping presents a potential risk that could be exploited through other means. The plugin's limited attack surface is a positive, but the identified output escaping deficiency requires attention.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

WD Post Renew Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WD Post Renew Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
15 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

45% escaped33 total outputs
Attack Surface

WD Post Renew Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedinclude\main-class.php:20
actionwp_enqueue_scriptsinclude\main-class.php:21
actionadmin_enqueue_scriptsinclude\main-class.php:22
actionadmin_menuinclude\main-class.php:23
filtercron_scheduleswd-post-renew.php:51
actionwdpore_cron_hookwd-post-renew.php:80

Scheduled Events 1

wdpore_cron_hook
Maintenance & Trust

WD Post Renew Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 24, 2025
PHP min version8.0
Downloads315

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

WD Post Renew Developer Profile

Webdiggers

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WD Post Renew

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wd-post-renew/assets/dist/css/admin-style.css/wp-content/plugins/wd-post-renew/assets/dist/js/admin-script.min.js
Script Paths
/wp-content/plugins/wd-post-renew/assets/dist/js/admin-script.min.js
Version Parameters
wd-post-renew/assets/dist/css/admin-style.css?ver=wd-post-renew/assets/dist/js/admin-script.min.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WD Post Renew