
Esmâ-ül Hüsnâ Security & Risk Analysis
wordpress.org/plugins/esma-ul-husnaAllah'ın 99 ismini rastgele bir şekilde sayfanızda gösterebileceğiniz bileşen içeren bir eklenti.
Is Esmâ-ül Hüsnâ Safe to Use in 2026?
Generally Safe
Score 100/100Esmâ-ül Hüsnâ has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "esma-ul-husna" v1.0 plugin exhibits a mixed security posture. On the positive side, the plugin has a minimal attack surface with no registered AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are generally good security practices. The absence of any recorded vulnerabilities or CVEs also suggests a history of stable code.
However, several significant concerns emerge from the static analysis. The presence of the `create_function` is a critical red flag, as this function is deprecated and can lead to severe security vulnerabilities if not handled with extreme care, especially if its arguments are user-controlled. The low percentage (21%) of properly escaped output is also a major concern, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce checks and capability checks, coupled with zero documented flows in taint analysis, might create a false sense of security; without proper checks, an attacker could potentially exploit any future or undiscovered entry points.
In conclusion, while the plugin's attack surface and reliance on prepared statements are strengths, the use of `create_function` and the widespread lack of output escaping present substantial security risks. The absence of vulnerability history is positive but doesn't negate the inherent risks identified in the code. Addressing the output escaping and the `create_function` usage should be a priority.
Key Concerns
- Use of create_function
- Low percentage of properly escaped output
- No nonce checks
- No capability checks
Esmâ-ül Hüsnâ Security Vulnerabilities
Esmâ-ül Hüsnâ Code Analysis
Dangerous Functions Found
Output Escaping
Esmâ-ül Hüsnâ Attack Surface
WordPress Hooks 1
Maintenance & Trust
Esmâ-ül Hüsnâ Maintenance & Trust
Maintenance Signals
Community Trust
Esmâ-ül Hüsnâ Alternatives
WPS Hide Login
wps-hide-login
Change wp-login.php to anything you want.
Edit Author Slug
edit-author-slug
Allows an admin (or capable user) to edit the author slug of a user, and change the author base.
Phoenix Media Rename
phoenix-media-rename
The Phoenix Media Rename plugin allows you to easily rename (and retitle) your media files, once uploaded.
Media File Renamer: Rename for better SEO (AI-Powered)
media-file-renamer
Rename filenames and media metadata for SEO and tidiness. Using AI, manually, in bulk, or in so many other ways!
Username Changer
username-changer
Unlock the power to change WordPress usernames with complete security and data integrity.
Esmâ-ül Hüsnâ Developer Profile
8 plugins · 90 total installs
How We Detect Esmâ-ül Hüsnâ
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/esma-ul-husna/euh-widget.css/wp-content/plugins/esma-ul-husna/euh-widget.js/wp-content/plugins/esma-ul-husna/euh-widget.jsesma-ul-husna/euh-widget.css?ver=esma-ul-husna/euh-widget.js?ver=HTML / DOM Fingerprints
euh-widget-titleeuh-widget-content