Year Remaining Security & Risk Analysis

wordpress.org/plugins/year-remaining

Year Remaining is a plugin that allows WordPress users to integrate the Year Remaining progress bar into the WordPress Dashboard as well as on pages o …

0 active installs v0.3 PHP 7.0+ WP 5.2+ Updated May 6, 2025
calendardateprogresstimeyear
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Year Remaining Safe to Use in 2026?

Generally Safe

Score 100/100

Year Remaining has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "year-remaining" plugin version 0.3 exhibits a generally strong security posture based on the provided static analysis. The code adheres to several best practices, including the complete absence of dangerous functions, the use of prepared statements for all SQL queries, and proper output escaping for all identified outputs. Furthermore, there are no file operations or external HTTP requests, and the plugin doesn't seem to be introducing outdated bundled libraries. The attack surface is minimal, with only one shortcode and no unprotected AJAX handlers or REST API routes.

However, a key concern arises from the complete lack of nonce checks and capability checks. While the static analysis doesn't reveal any immediate vulnerabilities stemming from this (likely due to the limited attack surface and no detected taint flows), it represents a significant weakness. If the shortcode were to become more complex or interact with sensitive data in the future, or if an attacker could somehow trigger it without proper authorization, these missing checks could become exploitable. The absence of any vulnerability history is positive, suggesting that the developers have not historically introduced critical or high-severity flaws. Overall, the plugin is well-developed from a security perspective in its current state, but the missing authorization checks leave a potential gap that should be addressed.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Year Remaining Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Year Remaining Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

Year Remaining Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[year_remaining] year-remaining.php:43
WordPress Hooks 1
actionwp_dashboard_setupyear-remaining.php:55
Maintenance & Trust

Year Remaining Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 6, 2025
PHP min version7.0
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Year Remaining Developer Profile

Andrew Hoyer

3 plugins · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Year Remaining

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
▓▓▓▓▓▓▓▓▓▓ 100%▓▓▓▓▓▓▓▓▓░ 90%▓▓▓▓▓▓▓▓░░ 80%▓▓▓▓▓▓▓░░░ 70%
FAQ

Frequently Asked Questions about Year Remaining