Esmâ-ül Hüsnâ Security & Risk Analysis

wordpress.org/plugins/esma-ul-husna

Allah'ın 99 ismini rastgele bir şekilde sayfanızda gösterebileceğiniz bileşen içeren bir eklenti.

10 active installs v1.0 PHP + WP + Updated Unknown
allahesmahusnaisimname
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Esmâ-ül Hüsnâ Safe to Use in 2026?

Generally Safe

Score 100/100

Esmâ-ül Hüsnâ has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "esma-ul-husna" v1.0 plugin exhibits a mixed security posture. On the positive side, the plugin has a minimal attack surface with no registered AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are generally good security practices. The absence of any recorded vulnerabilities or CVEs also suggests a history of stable code.

However, several significant concerns emerge from the static analysis. The presence of the `create_function` is a critical red flag, as this function is deprecated and can lead to severe security vulnerabilities if not handled with extreme care, especially if its arguments are user-controlled. The low percentage (21%) of properly escaped output is also a major concern, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce checks and capability checks, coupled with zero documented flows in taint analysis, might create a false sense of security; without proper checks, an attacker could potentially exploit any future or undiscovered entry points.

In conclusion, while the plugin's attack surface and reliance on prepared statements are strengths, the use of `create_function` and the widespread lack of output escaping present substantial security risks. The absence of vulnerability history is positive but doesn't negate the inherent risks identified in the code. Addressing the output escaping and the `create_function` usage should be a priority.

Key Concerns

  • Use of create_function
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Esmâ-ül Hüsnâ Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Esmâ-ül Hüsnâ Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
11
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("euh_widget");'));esma-ul-husna.php:158

Output Escaping

21% escaped14 total outputs
Attack Surface

Esmâ-ül Hüsnâ Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initesma-ul-husna.php:158
Maintenance & Trust

Esmâ-ül Hüsnâ Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Esmâ-ül Hüsnâ Developer Profile

sustun

8 plugins · 90 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Esmâ-ül Hüsnâ

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/esma-ul-husna/euh-widget.css/wp-content/plugins/esma-ul-husna/euh-widget.js
Script Paths
/wp-content/plugins/esma-ul-husna/euh-widget.js
Version Parameters
esma-ul-husna/euh-widget.css?ver=esma-ul-husna/euh-widget.js?ver=

HTML / DOM Fingerprints

CSS Classes
euh-widget-titleeuh-widget-content
FAQ

Frequently Asked Questions about Esmâ-ül Hüsnâ