Embed Kindle Security & Risk Analysis

wordpress.org/plugins/embed-kindle

Version 1.0.1 Tags: Kindle, embed, Kindle Reader, Kindle viewer, viewer, affiliate, e-book, Amazon, Amazon Kindle, sample, e-book, ebook, digital book …

10 active installs v1.0.1 PHP + WP + Updated Nov 2, 2012
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Embed Kindle Safe to Use in 2026?

Generally Safe

Score 85/100

Embed Kindle has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'embed-kindle' plugin v1.0.1 exhibits a generally good security posture with no known vulnerabilities and a limited attack surface. The static analysis reveals no dangerous functions, no direct SQL queries (all use prepared statements), and no file operations or external HTTP requests, which are all positive indicators. Taint analysis also found no critical or high-severity issues, suggesting that data handling within the plugin is not introducing obvious vulnerabilities.

However, there are significant concerns regarding output escaping. With 100% of observed outputs being unescaped, this presents a considerable risk. If any user-controlled data is rendered directly on the frontend, it could lead to Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the absence of nonce checks and capability checks on its single shortcode, while not immediately exploitable due to the lack of complex interactions or sensitive data handling identified in the static analysis, represents a missed security control that could be exploited in conjunction with other weaknesses or in future plugin updates.

The plugin's history of zero known CVEs is a strong positive, suggesting diligent development or a lack of targeting. However, the static analysis findings, particularly the unescaped output and lack of nonces/capabilities on its entry point, indicate that the plugin's security is not as robust as it could be. While the current impact might be low, these weaknesses create potential pathways for attacks if the plugin's functionality or the data it handles evolves.

Key Concerns

  • Unescaped output found
  • Shortcode lacks nonce checks
  • Shortcode lacks capability checks
Vulnerabilities
None known

Embed Kindle Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Embed Kindle Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Embed Kindle Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[embed_kindle] includes\Akky\EmbedKindle.php:26
WordPress Hooks 4
actionadmin_initincludes\Akky\EmbedKindle.php:22
actionwp_print_scriptsincludes\Akky\EmbedKindle.php:30
actionadmin_menuincludes\Akky\EmbedKindle.php:35
actionadmin_initincludes\Akky\EmbedKindle.php:39
Maintenance & Trust

Embed Kindle Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedNov 2, 2012
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Embed Kindle Alternatives

No alternatives data available yet.

Developer Profile

Embed Kindle Developer Profile

Yakkyofy

4 plugins · 80 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Embed Kindle

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
http://kindleweb.s3.amazonaws.com/app/KindleReader-min.js

HTML / DOM Fingerprints

CSS Classes
embed-kindle-warning
Data Attributes
data-affiliate_id
JS Globals
KindleReader
Shortcode Output
<div id='kindleReaderDiv<script type="text/javascript">KindleReader.LoadSample({containerIDasin
FAQ

Frequently Asked Questions about Embed Kindle