
WP Scheduled Read-Only Security & Risk Analysis
wordpress.org/plugins/wp-scheduled-read-onlySchedule readonly mode for your WordPress site
Is WP Scheduled Read-Only Safe to Use in 2026?
Generally Safe
Score 85/100WP Scheduled Read-Only has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-scheduled-read-only" plugin, version 1.3.2, exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, such as unprotected AJAX handlers, REST API routes, or shortcodes, is a significant positive indicator. Furthermore, the code signals reveal a clean bill of health regarding dangerous functions, file operations, and external HTTP requests. The use of prepared statements for all SQL queries is commendable, and the presence of nonce and capability checks, even if limited, demonstrates an awareness of basic WordPress security principles.
Despite the positive indicators, a notable concern arises from the output escaping. With 100% of outputs not being properly escaped, this presents a potential risk for cross-site scripting (XSS) vulnerabilities. Although the taint analysis did not reveal any unsanitized paths or critical/high severity flows, the lack of output escaping means that if any user-supplied data were to be processed and displayed without proper sanitization, an XSS attack would be possible. The plugin's vulnerability history being completely clear is reassuring, suggesting a history of secure development or prompt patching. However, the current lack of output escaping needs immediate attention to mitigate potential XSS risks.
In conclusion, "wp-scheduled-read-only" v1.3.2 is generally secure with a minimal attack surface and robust handling of database queries and authentication. The primary weakness lies in the complete absence of output escaping, which opens the door to XSS vulnerabilities. Addressing this specific issue would significantly enhance the plugin's overall security. The clean vulnerability history is a good sign, but it should not overshadow the identified code weaknesses.
Key Concerns
- 0% of outputs properly escaped
WP Scheduled Read-Only Security Vulnerabilities
WP Scheduled Read-Only Code Analysis
Output Escaping
Data Flow Analysis
WP Scheduled Read-Only Attack Surface
WordPress Hooks 6
Maintenance & Trust
WP Scheduled Read-Only Maintenance & Trust
Maintenance Signals
Community Trust
WP Scheduled Read-Only Alternatives
Block List Updater
blacklist-updater
Automatic updating of the comment block list in WordPress with antispam keys from GitHub.
WPS HTML Blocks
wps-html-blocks
This plugin adds a custom HTML post type, with shortcode to place anywhere on your site.
Block Comment Spam Bots
block-comment-spam-bots
A simple to use plugin that stops automated spam. Install and forget, and any automated spam targeting your native WordPress comments is immediately t …
TomS reCAPTCHA
toms-recaptcha
Integrated Google ReCaptcha for WordPress.Protect the login, register, lostpassword and comment forms. Support Woocommerce, Ultimate Member and more p …
VigilanTor
vigilantor
Add a layer of security to your WordPress site with the ability to block Tor users from commenting, registering, logging in and more.
WP Scheduled Read-Only Developer Profile
12 plugins · 2K total installs
How We Detect WP Scheduled Read-Only
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-scheduled-read-only/readonly.phpHTML / DOM Fingerprints
name="eelv_readonly[active]"name="eelv_readonly[from]"name="eelv_readonly[to]"name="eelv_readonly[who][]"