HamyarWP Security & Risk Analysis

wordpress.org/plugins/hamyarwp

ابزارک نمایش جدیدترین ارسال‌های همیار وردپرس ...

10 active installs v1.0 PHP + WP + Updated May 31, 2015
hamyar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is HamyarWP Safe to Use in 2026?

Generally Safe

Score 85/100

HamyarWP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The HamyarWP plugin v1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events indicates a very limited attack surface, which is a positive security characteristic. Furthermore, the lack of dangerous functions, file operations, and external HTTP requests further reduces potential avenues for exploitation.

However, a significant concern arises from the output escaping analysis. With 2 total outputs and 0% properly escaped, there is a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. This means that any user-supplied data that is displayed by the plugin could be injected with malicious scripts, leading to session hijacking, defacement, or other client-side attacks. The lack of nonce and capability checks is also a concern, as it suggests that internal functionality might not be adequately protected from unauthorized access or manipulation if an entry point were ever discovered.

The plugin's vulnerability history is clean, with no recorded CVEs. This suggests that historically, the plugin has not had publicly disclosed security flaws, which is encouraging. Coupled with the limited attack surface and the apparent use of prepared statements for SQL queries, these factors contribute to a perception of a secure plugin. However, the identified output escaping issue represents a critical weakness that needs immediate attention, as it directly impacts the security of end-users interacting with the plugin's output.

Key Concerns

  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

HamyarWP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

HamyarWP Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 16, 2026

HamyarWP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

HamyarWP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_dashboard_setupindex.php:70
filteradmin_footer_textindex.php:75
actionwp_before_admin_bar_renderindex.php:88
actionadmin_bar_menuindex.php:108
Maintenance & Trust

HamyarWP Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedMay 31, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

HamyarWP Alternatives

No alternatives data available yet.

Developer Profile

HamyarWP Developer Profile

Nima Saberi

5 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect HamyarWP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hamyarwp/logo.png

HTML / DOM Fingerprints

CSS Classes
rss-widget
Data Attributes
id="posts_number"name="posts_number"
Shortcode Output
<img src="" style="width: 20px;height: 20px;margin: 0 0px 0 10px;float: right;" /> <a href="http://hamyarwp.com/" target="_blank"><b>همیار وردپرس</b> ؛ اکسیژن وردپرسی‌ها</a>
FAQ

Frequently Asked Questions about HamyarWP