Hikari Email & URL Obfuscator Security & Risk Analysis

wordpress.org/plugins/hikari-email-url-obfuscator

Email and normal links are obfuscated, hiding them from spambots. It automatically encodes each link, then uses JavaScript to decode and show them.

50 active installs v0.08.10 PHP + WP 2.8.0+ Updated Oct 14, 2010
emailjavascriptobfuscatepage-rankspam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hikari Email & URL Obfuscator Safe to Use in 2026?

Generally Safe

Score 85/100

Hikari Email & URL Obfuscator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The hikari-email-url-obfuscator plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by having no recorded CVEs, no file operations, no external HTTP requests, and all SQL queries utilizing prepared statements. The attack surface is also zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits potential entry points. However, several critical concerns are raised by the static analysis. The plugin uses the `str_rot13` function, which is often associated with obfuscation and can be a red flag for potential security issues if not handled carefully. More significantly, 100% of output is not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis reveals two flows with unsanitized paths, suggesting potential for path traversal or other file system-related vulnerabilities, even though no direct file operations were detected. The absence of any nonce or capability checks on any entry points, while the attack surface is zero, could still be a concern if the plugin were to evolve and add entry points without implementing proper authorization checks. The lack of historical vulnerabilities is a positive indicator, but it does not negate the risks identified in the current code analysis. The plugin's strengths lie in its limited attack surface and secure database interactions, but its weaknesses in output escaping and potential unsanitized paths present significant risks that require immediate attention.

Key Concerns

  • 100% of output is not properly escaped
  • 2 flows with unsanitized paths
  • Dangerous function str_rot13 used
  • 0 Nonce checks on entry points
  • 0 Capability checks on entry points
Vulnerabilities
None known

Hikari Email & URL Obfuscator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Hikari Email & URL Obfuscator Release Timeline

v0.07.17
v0.06.06
v0.05.01
v0.04.05
vHkMuob.css
vHkMuob.js
vhikari-tools.php
vhikariobfuscator-core.php
vhikariobfuscator-options.php
vhikariobfuscator.php
vlicense.txt
vreadme.txt
Code Analysis
Analyzed Apr 16, 2026

Hikari Email & URL Obfuscator Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
59
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

str_rot13$js_url = str_rot13($original_URL);hikariobfuscator-core.php:352
str_rot13$js_attibutes = str_rot13($attibutes);hikariobfuscator-core.php:353
str_rot13$js_content=str_rot13($original_content);hikariobfuscator-core.php:357

Output Escaping

0% escaped59 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
debugRequestParameters (hikari-tools.php:928)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Hikari Email & URL Obfuscator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 21
actioninithikari-tools.php:34
actionadmin_inithikari-tools.php:449
actionadmin_menuhikari-tools.php:450
filterthe_contenthikariobfuscator-core.php:106
filterthe_excerpthikariobfuscator-core.php:107
filtercomment_texthikariobfuscator-core.php:110
filtercomment_text_rsshikariobfuscator-core.php:111
filtercomment_excerpthikariobfuscator-core.php:112
filtercomment_urlhikariobfuscator-core.php:113
filterget_comment_author_url_linkhikariobfuscator-core.php:116
filterget_comment_author_linkhikariobfuscator-core.php:117
filterget_comment_author_urlhikariobfuscator-core.php:118
filterwidget_texthikariobfuscator-core.php:121
filterwidget_execphphikariobfuscator-core.php:125
filternavt_codeblockhikariobfuscator-core.php:126
filterhksmtc_twitter_linkhikariobfuscator-core.php:127
filterHkTC_get_comment_titlehikariobfuscator-core.php:128
actionwp_print_styleshikariobfuscator-core.php:132
actionwp_headhikariobfuscator-core.php:133
actionwp_headhikariobfuscator-core.php:136
actionwp_print_footer_scriptshikariobfuscator-core.php:138
Maintenance & Trust

Hikari Email & URL Obfuscator Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedOct 14, 2010
PHP min version
Downloads19K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

Hikari Email & URL Obfuscator Developer Profile

shidouhikari

9 plugins · 430 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hikari Email & URL Obfuscator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hikari-email-url-obfuscator/HkMuob.css/wp-content/plugins/hikari-email-url-obfuscator/HkMuob.js
Script Paths
/wp-content/plugins/hikari-email-url-obfuscator/HkMuob.js

HTML / DOM Fingerprints

HTML Comments
Emails and URLs obfuscated by Hikari Email & URL Obfuscator - http://Hikari.ws/email-url-obfuscator/<!-- HkMuob NO OBFUSCATE -->
JS Globals
HkMuob
FAQ

Frequently Asked Questions about Hikari Email & URL Obfuscator