4cgandhi Security & Risk Analysis

wordpress.org/plugins/4cgandhi

Hindi Font Converter is an innovative system to convert popular Hindi fonts to Unicode and vice-versa.

10 active installs v1.0 PHP + WP 4.3+ Updated Jan 19, 2021
4cgandhi-to-unicodechanakya-to-unicodekruti-dev-10-to-unicodeunicode-to-4cgandhiunicode-to-chanakya
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is 4cgandhi Safe to Use in 2026?

Generally Safe

Score 85/100

4cgandhi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "4cgandhi" plugin v1.0 exhibits a strong security posture based on the provided static analysis. The code appears to follow several best practices, including the absence of dangerous functions, 100% use of prepared statements for SQL queries, and proper output escaping. Crucially, there are no identified taint flows with unsanitized paths, indicating that user-supplied data is likely handled securely within the analyzed code. The plugin also has a clean vulnerability history with no recorded CVEs, which suggests a history of secure development or a lack of public scrutiny.

However, a significant area of concern is the complete lack of nonce and capability checks across all identified entry points. While the attack surface is currently small, consisting of a single shortcode with no apparent authentication checks, this presents a substantial risk. Should any future updates introduce new functionalities or if the shortcode's functionality becomes more sensitive, the absence of these fundamental security measures could expose the site to various attacks, such as Cross-Site Request Forgery (CSRF). The plugin's strengths lie in its clean code and SQL handling, but its weakness is a reliance on the current minimal attack surface rather than robust security controls for all potential inputs.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

4cgandhi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

4cgandhi Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

4cgandhi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

4cgandhi Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[4cgandhi] 4cgandhi.php:23
WordPress Hooks 1
actionwp_enqueue_scripts4cgandhi.php:68
Maintenance & Trust

4cgandhi Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJan 19, 2021
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

4cgandhi Alternatives

No alternatives data available yet.

Developer Profile

4cgandhi Developer Profile

Ridham

4 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect 4cgandhi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/4cgandhi/fontconverter/converter.css/wp-content/plugins/4cgandhi/fontconverter/krutidev.js/wp-content/plugins/4cgandhi/fontconverter/chankya.js/wp-content/plugins/4cgandhi/fontconverter/4cgandhi.js
Script Paths
/wp-content/plugins/4cgandhi/fontconverter/krutidev.js/wp-content/plugins/4cgandhi/fontconverter/chankya.js/wp-content/plugins/4cgandhi/fontconverter/4cgandhi.js

HTML / DOM Fingerprints

CSS Classes
pakainfocolumn-hindi-fontsubmit
Data Attributes
id="legacy_text"id="converter1"onclick="convert_to_unicode();"onclick="convert_to_unicode1();"onclick="convert_to_unicode2();"id="unicode_text"+4 more
JS Globals
convert_to_unicodeconvert_to_unicode1convert_to_unicode2Convert_to_4CGandhiConvert_Unicode_to_ChanakyaConvert_to_Kritidev_010
Shortcode Output
[4cgandhi]
FAQ

Frequently Asked Questions about 4cgandhi