Wp Digital clock Security & Risk Analysis

wordpress.org/plugins/wp-digital-clock

This is an awesome digital clock that you can use in wp using shortcode.

40 active installs v2.0 PHP 7.0+ WP 4.0+ Updated Mar 14, 2024
digitalclock
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Wp Digital clock Safe to Use in 2026?

Generally Safe

Score 85/100

Wp Digital clock has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The wp-digital-clock plugin version 2.0 exhibits a strong security posture based on the provided static analysis. The plugin demonstrates excellent adherence to secure coding practices, with all SQL queries utilizing prepared statements and all outputs being properly escaped. The absence of dangerous functions, file operations, and external HTTP requests further contributes to its security. Furthermore, the plugin has no recorded vulnerabilities, including no known CVEs, indicating a history of stable and secure development.

While the static analysis reveals a minimal attack surface with only one shortcode and no AJAX handlers or REST API routes exposed without authentication, a notable concern is the complete absence of nonce checks and capability checks. This means that the plugin's functionality, even though currently limited in entry points, is not protected against potential cross-site request forgery (CSRF) attacks or unauthorized access by users without the necessary permissions if new entry points are added or existing ones are modified in future versions.

In conclusion, wp-digital-clock v2.0 is commendably secure regarding direct code execution vulnerabilities and data handling. However, the lack of authentication and authorization checks on its sole entry point (the shortcode) presents a significant potential weakness that could be exploited if the plugin's functionality expands or if an attacker can trick a logged-in user into interacting with it in an unintended way. This oversight, despite an otherwise clean record, warrants attention for future development.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Wp Digital clock Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wp Digital clock Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Wp Digital clock Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wp_digital_clock] main-body.php:24
WordPress Hooks 1
actionwp_enqueue_scriptswp-digital-clock.php:26
Maintenance & Trust

Wp Digital clock Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMar 14, 2024
PHP min version7.0
Downloads3K

Community Trust

Rating100/100
Number of ratings3
Active installs40
Alternatives

Wp Digital clock Alternatives

No alternatives data available yet.

Developer Profile

Wp Digital clock Developer Profile

amanhstu

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wp Digital clock

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-digital-clock/css/style.css/wp-content/plugins/wp-digital-clock/js/time-js.js
Script Paths
/wp-content/plugins/wp-digital-clock/js/time-js.js
Version Parameters
wp-digital-clock/css/style.css?ver=wp-digital-clock/js/time-js.js?ver=

HTML / DOM Fingerprints

JS Globals
currentTime
Shortcode Output
<div id="clock"></div>
FAQ

Frequently Asked Questions about Wp Digital clock