WP Scheduled Read-Only Security & Risk Analysis

wordpress.org/plugins/wp-scheduled-read-only

Schedule readonly mode for your WordPress site

10 active installs v1.3.2 PHP + WP 3.8+ Updated Dec 22, 2021
blockcommentsdisallowmultisitereadonly
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Scheduled Read-Only Safe to Use in 2026?

Generally Safe

Score 85/100

WP Scheduled Read-Only has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "wp-scheduled-read-only" plugin, version 1.3.2, exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, such as unprotected AJAX handlers, REST API routes, or shortcodes, is a significant positive indicator. Furthermore, the code signals reveal a clean bill of health regarding dangerous functions, file operations, and external HTTP requests. The use of prepared statements for all SQL queries is commendable, and the presence of nonce and capability checks, even if limited, demonstrates an awareness of basic WordPress security principles.

Despite the positive indicators, a notable concern arises from the output escaping. With 100% of outputs not being properly escaped, this presents a potential risk for cross-site scripting (XSS) vulnerabilities. Although the taint analysis did not reveal any unsanitized paths or critical/high severity flows, the lack of output escaping means that if any user-supplied data were to be processed and displayed without proper sanitization, an XSS attack would be possible. The plugin's vulnerability history being completely clear is reassuring, suggesting a history of secure development or prompt patching. However, the current lack of output escaping needs immediate attention to mitigate potential XSS risks.

In conclusion, "wp-scheduled-read-only" v1.3.2 is generally secure with a minimal attack surface and robust handling of database queries and authentication. The primary weakness lies in the complete absence of output escaping, which opens the door to XSS vulnerabilities. Addressing this specific issue would significantly enhance the plugin's overall security. The clean vulnerability history is a good sign, but it should not overshadow the identified code weaknesses.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

WP Scheduled Read-Only Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Scheduled Read-Only Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
save_conf (readonly.php:138)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Scheduled Read-Only Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_initreadonly.php:32
actionadmin_post_wp_scheduled_readonlyreadonly.php:34
filtercomments_templatereadonly.php:36
actionwp_headreadonly.php:37
actionwp_loadedreadonly.php:38
filtercomments_openreadonly.php:133
Maintenance & Trust

WP Scheduled Read-Only Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedDec 22, 2021
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Scheduled Read-Only Developer Profile

Bastien Ho

12 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
15 days
View full developer profile
Detection Fingerprints

How We Detect WP Scheduled Read-Only

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-scheduled-read-only/readonly.php

HTML / DOM Fingerprints

Data Attributes
name="eelv_readonly[active]"name="eelv_readonly[from]"name="eelv_readonly[to]"name="eelv_readonly[who][]"
FAQ

Frequently Asked Questions about WP Scheduled Read-Only