furikake Security & Risk Analysis

wordpress.org/plugins/furikake

This plug-in provides Furigana (A.K.A. "Yomigana". Japanese phonetic of Chinese characters) to the text of web pages.

10 active installs v0.2.0 PHP 5.6+ WP 4.9.6+ Updated Unknown
furiganaphoneticyomigana
100
A · Safe
CVEs total1
Unpatched0
Last CVEJan 1, 2018
Safety Verdict

Is furikake Safe to Use in 2026?

Generally Safe

Score 100/100

furikake has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 1, 2018
Risk Assessment

The furikake plugin version 0.2.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices by having no dangerous functions, utilizing prepared statements for all SQL queries, and performing nonce and capability checks on its single entry point (a shortcode). Additionally, there are no external HTTP requests or bundled libraries, which reduces the potential for cross-dependencies and supply chain attacks. The absence of any critical or high-severity taint flows is also a strong indicator of sound coding in that area.

However, significant concerns arise from the output escaping. A mere 23% of output is properly escaped, leaving a substantial portion vulnerable to Cross-Site Scripting (XSS) attacks. While the static analysis shows no immediate critical vulnerabilities, this low escaping rate represents a considerable risk for users interacting with the plugin's output. The vulnerability history, though dated, shows a past medium-severity 'Open Redirect' vulnerability. While currently unpatched issues are zero, this historical pattern suggests that the plugin's developers may not have a consistent track record of addressing security vulnerabilities promptly or thoroughly, especially regarding input validation and output sanitization.

In conclusion, while furikake v0.2.0 has strengths in its limited attack surface and database interaction security, the critical weakness in output escaping presents a tangible XSS risk. The past medium-severity vulnerability, even though resolved, warrants caution regarding the overall security development lifecycle of the plugin. Future versions should prioritize robust output sanitization to mitigate these risks.

Key Concerns

  • Low percentage of properly escaped output
  • Past medium severity vulnerability history
Vulnerabilities
1

furikake Security Vulnerabilities

CVEs by Year

1 CVE in 2018
2018
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2017-1000434medium · 6.1URL Redirection to Untrusted Site ('Open Redirect')

furikake <= 0.1.0 - Open Redirect

Jan 1, 2018 Patched in 0.1.1 (2213d)
Code Analysis
Analyzed Mar 16, 2026

furikake Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
31
9 escaped
Nonce Checks
1
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

23% escaped40 total outputs
Attack Surface

furikake Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[furikake] furikake.php:64
WordPress Hooks 5
actionadmin_menufurikake.php:61
filterplugin_action_linksfurikake.php:67
filterafter_setup_themefurikake.php:70
filtershutdownfurikake.php:71
filterbody_classfurikake.php:79
Maintenance & Trust

furikake Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedUnknown
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

furikake Developer Profile

jidaikobo

5 plugins · 210 total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
1109 days
View full developer profile
Detection Fingerprints

How We Detect furikake

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
furikake_on
Shortcode Output
[furikake]
FAQ

Frequently Asked Questions about furikake