Hello Dolly Guaraná Security & Risk Analysis

wordpress.org/plugins/hello-dolly-guarana

Uma sátira ao Hello Dolly, feita com o nosso famoso amiguinho. This is a brazilian meme, problably you dont will understand. Sorry. :P

0 active installs v1.0.1 PHP + WP 1.0.0+ Updated Jan 25, 2019
dollyfunhellomeme
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hello Dolly Guaraná Safe to Use in 2026?

Generally Safe

Score 85/100

Hello Dolly Guaraná has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The security posture of the "hello-dolly-guarana" v1.0.1 plugin appears to be strong in several key areas, indicating good development practices. The static analysis reveals no identified attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events that are not properly authenticated or protected. Furthermore, there are no dangerous functions or external HTTP requests detected, and all SQL queries utilize prepared statements, which significantly mitigates the risk of SQL injection vulnerabilities. The absence of any recorded CVEs or historical vulnerabilities further supports a positive security assessment.

However, there are significant concerns regarding output escaping. With 100% of outputs not being properly escaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data processed by the plugin and then displayed to users without proper sanitization or escaping could be manipulated by attackers to inject malicious scripts. Additionally, the presence of file operations without further context on their nature is a minor concern, as it could be a vector for vulnerabilities if not handled securely. The lack of nonce and capability checks, while not directly leading to an attack surface in this instance, suggests a potential oversight in fundamental WordPress security practices that could become problematic in more complex scenarios or future updates.

In conclusion, while the "hello-dolly-guarana" plugin excels in preventing common injection and unauthorized access vectors, its complete lack of output escaping is a critical weakness that overshadows its strengths. The plugin is highly susceptible to XSS attacks. Until this is addressed, its overall security is compromised. The absence of historical vulnerabilities is a positive sign, but it cannot negate the immediate and severe risk posed by unescaped output.

Key Concerns

  • Unescaped output detected
  • File operations present without context
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Hello Dolly Guaraná Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Hello Dolly Guaraná Release Timeline

v1.0.1Current
Code Analysis
Analyzed Mar 17, 2026

Hello Dolly Guaraná Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Hello Dolly Guaraná Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_noticeshello-dolly-guarana.php:30
actionadmin_headhello-dolly-guarana.php:58
Maintenance & Trust

Hello Dolly Guaraná Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 25, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Hello Dolly Guaraná Developer Profile

Roberto Pereira da Costa

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hello Dolly Guaraná

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<div id='dolly_guarana'></div>
FAQ

Frequently Asked Questions about Hello Dolly Guaraná