Hura Custom Cursors Security & Risk Analysis

wordpress.org/plugins/hura-custom-cursors

Customizing your website cursor.

100 active installs v1.0 PHP + WP 3.0+ Updated Dec 8, 2025
cursorstyle
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Hura Custom Cursors Safe to Use in 2026?

Generally Safe

Score 100/100

Hura Custom Cursors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "hura-custom-cursors" v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any recorded vulnerabilities in its history is a positive indicator. The code analysis reveals a commendable adherence to secure coding practices, with no dangerous functions identified, all SQL queries utilizing prepared statements, and a high percentage of output being properly escaped. Furthermore, the plugin avoids file operations and external HTTP requests, limiting potential attack vectors. However, a notable concern is the complete lack of nonce checks and the limited number of capability checks, especially given that the plugin has entry points that could potentially be exposed without proper authentication or authorization. While the static analysis shows no critical taint flows, the absence of taint analysis data for unsanitized paths still leaves a theoretical risk if any input were to be mishandled, although the current data suggests this is unlikely. The plugin's strengths lie in its clean code and avoidance of common vulnerabilities. The primary weakness lies in the potential for insufficient authentication on its entry points, which, while currently showing no vulnerabilities, could become a target if the plugin were to be updated with more complex functionality without proper security checks.

Key Concerns

  • No nonce checks on entry points
  • Limited capability checks on entry points
Vulnerabilities
None known

Hura Custom Cursors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hura Custom Cursors Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
27 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

93% escaped29 total outputs
Attack Surface

Hura Custom Cursors Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuHuraApps-Custom-Cursors.php:16
actionwp_footerHuraApps-Custom-Cursors.php:17
Maintenance & Trust

Hura Custom Cursors Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 8, 2025
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Hura Custom Cursors Developer Profile

Kiet Huynh

3 plugins · 1K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hura Custom Cursors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hura-custom-cursors/images/cursors/cursor-/wp-content/plugins/hura-custom-cursors/images/cursors/flag_

HTML / DOM Fingerprints

CSS Classes
hura-flexhura-btn-wraphura-admin-wrapperhura-cursors
Data Attributes
huraapps_customer_cursor
JS Globals
Hura_Apps_Custom_Cursors
FAQ

Frequently Asked Questions about Hura Custom Cursors