Hikari Tools Framework Security & Risk Analysis

wordpress.org/plugins/hikari-tools

A plugin development framework with a lot of reusable code and a nice settings page builder.

10 active installs v1.07.05 PHP + WP 2.8.0+ Updated Oct 22, 2010
dependancyframeworkhktoolsoptionstool
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hikari Tools Framework Safe to Use in 2026?

Generally Safe

Score 85/100

Hikari Tools Framework has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The 'hikari-tools' plugin version 1.07.05 exhibits a mixed security posture. On the positive side, there are no known CVEs, a lack of bundled libraries, and all SQL queries utilize prepared statements, indicating some good development practices. However, significant concerns arise from the static analysis. The complete absence of output escaping across all identified outputs is a major red flag, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities.

Furthermore, the presence of the `create_function` dangerous function is a concern, as it can be exploited for code injection if user input is not rigorously sanitized before being passed to it. The taint analysis revealing two flows with unsanitized paths, even without critical or high severity, points to potential avenues for exploit if these paths are reachable. The lack of any nonce or capability checks on the limited entry points, while small in number, means that any potential vulnerability within those entry points would be exposed to unauthenticated or low-privileged users.

In conclusion, while the plugin benefits from a clean vulnerability history and secure SQL practices, the critical issues of universal unescaped output and the use of `create_function` alongside the taint analysis findings present substantial security risks. The limited attack surface is a mitigating factor, but the identified weaknesses require immediate attention.

Key Concerns

  • 0% of output properly escaped
  • Dangerous function 'create_function' used
  • Taint analysis shows unsanitized paths
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Hikari Tools Framework Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Hikari Tools Framework Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
14 prepared
Unescaped Output
81
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('admin_notices',create_function(null,hikari-tools.php:48
create_functionadd_action('admin_notices',create_function(null,hikari-tools.php:58

SQL Query Safety

100% prepared14 total queries

Output Escaping

0% escaped81 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
debugRequestParameters (class.hikari-tools.php:1248)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Hikari Tools Framework Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitclass.hikari-tools.php:34
actionadmin_initclass.hikari-tools.php:475
actionadmin_menuclass.hikari-tools.php:476
actionadmin_noticeshikari-tools.php:48
actionadmin_noticeshikari-tools.php:58
Maintenance & Trust

Hikari Tools Framework Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedOct 22, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Hikari Tools Framework Developer Profile

shidouhikari

6 plugins · 350 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hikari Tools Framework

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hikari-tools/assets/css//wp-content/plugins/hikari-tools/assets/js/
Script Paths
/wp-content/plugins/hikari-tools/assets/js/hikari-tools.js/wp-content/plugins/hikari-tools/assets/js/hikari-tools.min.js
Version Parameters
hikari-tools/assets/css/hikari-tools.css?ver=hikari-tools/assets/js/hikari-tools.js?ver=hikari-tools/assets/js/hikari-tools.min.js?ver=

HTML / DOM Fingerprints

CSS Classes
HkTools
HTML Comments
Copyright Hikari (http://wordpress.Hikari.ws), 2010If you want to redistribute this script, please leave a link to http://hikari.WSParts of this code are provided or based on ideas and/or code written by othersTranslations to different languages are provided by users of this script+6 more
Data Attributes
data-iddata-id-value
JS Globals
HkTools
FAQ

Frequently Asked Questions about Hikari Tools Framework