
Hikari Tools Framework Security & Risk Analysis
wordpress.org/plugins/hikari-toolsA plugin development framework with a lot of reusable code and a nice settings page builder.
Is Hikari Tools Framework Safe to Use in 2026?
Generally Safe
Score 85/100Hikari Tools Framework has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'hikari-tools' plugin version 1.07.05 exhibits a mixed security posture. On the positive side, there are no known CVEs, a lack of bundled libraries, and all SQL queries utilize prepared statements, indicating some good development practices. However, significant concerns arise from the static analysis. The complete absence of output escaping across all identified outputs is a major red flag, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities.
Furthermore, the presence of the `create_function` dangerous function is a concern, as it can be exploited for code injection if user input is not rigorously sanitized before being passed to it. The taint analysis revealing two flows with unsanitized paths, even without critical or high severity, points to potential avenues for exploit if these paths are reachable. The lack of any nonce or capability checks on the limited entry points, while small in number, means that any potential vulnerability within those entry points would be exposed to unauthenticated or low-privileged users.
In conclusion, while the plugin benefits from a clean vulnerability history and secure SQL practices, the critical issues of universal unescaped output and the use of `create_function` alongside the taint analysis findings present substantial security risks. The limited attack surface is a mitigating factor, but the identified weaknesses require immediate attention.
Key Concerns
- 0% of output properly escaped
- Dangerous function 'create_function' used
- Taint analysis shows unsanitized paths
- No nonce checks on entry points
- No capability checks on entry points
Hikari Tools Framework Security Vulnerabilities
Hikari Tools Framework Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Hikari Tools Framework Attack Surface
WordPress Hooks 5
Maintenance & Trust
Hikari Tools Framework Maintenance & Trust
Maintenance Signals
Community Trust
Hikari Tools Framework Alternatives
Kirki Customizer Framework
kirki
The Ultimate Customizer Framework for WordPress Theme Developers
Premium Addons for KingComposer
premium-addons-for-kingcomposer
Tons of unique shortcodes elements addon for KingComposer Page Builder.
MooTools
mootools
Safely adds the MooTools JavaScript framework to your WordPress generated pages.
Beans Visual Hook Guide
beans-visual-hook-guide
A useful companion tool for theme development with the Beans Framework. Displays all possible Markup Action Hooks made available by the Beans HTML AP …
Octagon Elements for Elementor
octagon-elements-lite-for-elementor
Tons of unique shortcodes elements addon for Elementor Page Builder.
Hikari Tools Framework Developer Profile
6 plugins · 350 total installs
How We Detect Hikari Tools Framework
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/hikari-tools/assets/css//wp-content/plugins/hikari-tools/assets/js//wp-content/plugins/hikari-tools/assets/js/hikari-tools.js/wp-content/plugins/hikari-tools/assets/js/hikari-tools.min.jshikari-tools/assets/css/hikari-tools.css?ver=hikari-tools/assets/js/hikari-tools.js?ver=hikari-tools/assets/js/hikari-tools.min.js?ver=HTML / DOM Fingerprints
HkToolsCopyright Hikari (http://wordpress.Hikari.ws), 2010If you want to redistribute this script, please leave a link to
http://hikari.WSParts of this code are provided or based on ideas and/or code written by othersTranslations to different languages are provided by users of this script+6 moredata-iddata-id-valueHkTools