World Clocks Security & Risk Analysis

wordpress.org/plugins/world-clocks

Enable world clocks for the sites with different timezones, with a custom block for the WordPress block editor (Gutenberg).

100 active installs v1.0.3 PHP 8.0+ WP 6.4+ Updated Feb 25, 2026
clocktimetimezonewatch
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is World Clocks Safe to Use in 2026?

Generally Safe

Score 100/100

World Clocks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "world-clocks" plugin version 1.0.3 presents a generally positive security posture based on the static analysis. The plugin demonstrates good practices by not exposing any AJAX handlers, REST API routes, shortcodes, or cron events, thereby minimizing its attack surface significantly. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests, combined with a high percentage of properly escaped output and 100% usage of prepared statements for SQL queries, indicates a cautious approach to coding. The plugin also appears to have no known vulnerabilities in its history, which is a strong indicator of its current security state.

However, the analysis does reveal some areas that warrant attention. The complete absence of nonce checks and capability checks across all entry points is a significant concern. While the attack surface is currently zero, if any entry points were to be introduced in the future, they would be inherently unprotected. The taint analysis showing zero flows, while good, is based on zero flows being analyzed, which might mean limited testing or a very simple plugin. A more robust taint analysis could provide deeper assurance.

In conclusion, the "world-clocks" plugin has a strong foundation with minimal attack surface and good coding practices in place for SQL and output handling. The lack of historical vulnerabilities is also a positive sign. The primary weakness lies in the complete absence of authentication and authorization checks (nonces and capabilities), which, while not posing an immediate threat due to the current lack of entry points, represents a latent risk should the plugin evolve. The plugin is recommended for continued monitoring, but the current risks appear to be low, provided no new entry points are added without proper security measures.

Key Concerns

  • No Nonce Checks on Entry Points
  • No Capability Checks on Entry Points
  • Taint Analysis: 0 flows analyzed
Vulnerabilities
None known

World Clocks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

World Clocks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
54 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

95% escaped57 total outputs
Attack Surface

World Clocks Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitincludes\blocks.php:23
actionenqueue_block_editor_assetsincludes\blocks.php:24
actionadmin_enqueue_scriptsincludes\core.php:23
Maintenance & Trust

World Clocks Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 25, 2026
PHP min version8.0
Downloads2K

Community Trust

Rating80/100
Number of ratings1
Active installs100
Developer Profile

World Clocks Developer Profile

Sanket Parmar

4 plugins · 160 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect World Clocks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/world-clocks/dist/admin-style.css
Version Parameters
world-clocks/dist/admin-style.css?ver=

HTML / DOM Fingerprints

JS Globals
SPWPCLOCK
FAQ

Frequently Asked Questions about World Clocks