
Hikari Email & URL Obfuscator Security & Risk Analysis
wordpress.org/plugins/hikari-email-url-obfuscatorEmail and normal links are obfuscated, hiding them from spambots. It automatically encodes each link, then uses JavaScript to decode and show them.
Is Hikari Email & URL Obfuscator Safe to Use in 2026?
Generally Safe
Score 85/100Hikari Email & URL Obfuscator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The hikari-email-url-obfuscator plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by having no recorded CVEs, no file operations, no external HTTP requests, and all SQL queries utilizing prepared statements. The attack surface is also zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits potential entry points. However, several critical concerns are raised by the static analysis. The plugin uses the `str_rot13` function, which is often associated with obfuscation and can be a red flag for potential security issues if not handled carefully. More significantly, 100% of output is not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis reveals two flows with unsanitized paths, suggesting potential for path traversal or other file system-related vulnerabilities, even though no direct file operations were detected. The absence of any nonce or capability checks on any entry points, while the attack surface is zero, could still be a concern if the plugin were to evolve and add entry points without implementing proper authorization checks. The lack of historical vulnerabilities is a positive indicator, but it does not negate the risks identified in the current code analysis. The plugin's strengths lie in its limited attack surface and secure database interactions, but its weaknesses in output escaping and potential unsanitized paths present significant risks that require immediate attention.
Key Concerns
- 100% of output is not properly escaped
- 2 flows with unsanitized paths
- Dangerous function str_rot13 used
- 0 Nonce checks on entry points
- 0 Capability checks on entry points
Hikari Email & URL Obfuscator Security Vulnerabilities
Hikari Email & URL Obfuscator Release Timeline
Hikari Email & URL Obfuscator Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Hikari Email & URL Obfuscator Attack Surface
WordPress Hooks 21
Maintenance & Trust
Hikari Email & URL Obfuscator Maintenance & Trust
Maintenance Signals
Community Trust
Hikari Email & URL Obfuscator Alternatives
Email Address Obfuscation
email-address-obfuscation
Email Address Obfuscation prevents email harvesting by hiding email address appearing in your pages, while remaining visible to your site visitors.
Pixeline's Email Protector
pixelines-email-protector
Write email addresses without worrying about spambots and email harvesters.
Email Me
email-me
Creates an email link from the shortcode [emailme] that spam bots don't find. Has clever parameters for convenience...
Make Safe
makesafe
Obfuscates email addresses.
Contact Camo
planleft-contact-camo
Contact Camo protects email addresses by obfuscating or completely hiding them in both the source code and the DOM.
Hikari Email & URL Obfuscator Developer Profile
9 plugins · 430 total installs
How We Detect Hikari Email & URL Obfuscator
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/hikari-email-url-obfuscator/HkMuob.css/wp-content/plugins/hikari-email-url-obfuscator/HkMuob.js/wp-content/plugins/hikari-email-url-obfuscator/HkMuob.jsHTML / DOM Fingerprints
Emails and URLs obfuscated by
Hikari Email & URL Obfuscator - http://Hikari.ws/email-url-obfuscator/<!-- HkMuob NO OBFUSCATE -->HkMuob