WP-Cron Control Security & Risk Analysis

wordpress.org/plugins/wp-cron-control

This plugin allows you to take control over the execution of cron jobs.

1K active installs v0.7.1 PHP + WP 3.4+ Updated Nov 28, 2017
croncron-jobspost-missed-schedulescheduled-postswp-cron
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Cron Control Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Cron Control has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The wp-cron-control plugin v0.7.1 exhibits a generally good security posture based on the static analysis. The absence of dangerous functions, the consistent use of prepared statements for all SQL queries, and the limited external HTTP requests are positive indicators. The plugin also shows a commitment to basic security by including a capability check, which is a good starting point for access control.

However, there are notable areas for improvement. A significant concern is the low percentage of properly escaped output (42%). This indicates that a substantial portion of data displayed to users may not be adequately sanitized, potentially opening the door for Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the complete lack of nonce checks is a significant oversight, particularly if any of the cron events or other functionalities could be triggered externally or by an attacker. The plugin's vulnerability history is clean, which is a strong positive, suggesting good development practices or perhaps a low profile that hasn't attracted widespread attacks yet. Overall, while the plugin avoids common critical vulnerabilities like raw SQL or dangerous function usage, the unescaped output and missing nonce checks present real risks that need to be addressed for a more robust security profile.

Key Concerns

  • Insufficient output escaping (42% proper)
  • Missing nonce checks
Vulnerabilities
None known

WP-Cron Control Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Cron Control Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
18
13 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

42% escaped31 total outputs
Attack Surface

WP-Cron Control Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initwp-cron-control.php:35
actionadmin_menuwp-cron-control.php:36
actioninitwp-cron-control.php:130

Scheduled Events 2

publish_future_post
publish_future_post
Maintenance & Trust

WP-Cron Control Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedNov 28, 2017
PHP min version
Downloads87K

Community Trust

Rating70/100
Number of ratings10
Active installs1K
Developer Profile

WP-Cron Control Developer Profile

Automattic

213 plugins · 19.2M total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
1384 days
View full developer profile
Detection Fingerprints

How We Detect WP-Cron Control

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-cron-control/css/wp-cron-control.css/wp-content/plugins/wp-cron-control/js/wp-cron-control.js
Script Paths
/wp-content/plugins/wp-cron-control/js/wp-cron-control.js
Version Parameters
wp-cron-control/style.css?ver=wp-cron-control/script.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-wpcroncontrol-setting
FAQ

Frequently Asked Questions about WP-Cron Control