Mankutimmana Kagga Security & Risk Analysis

wordpress.org/plugins/kagga

Show a random verse from Mankutimmana Kagga written by D.V.G on your website!

10 active installs v1.1 PHP + WP 2.9+ Updated Unknown
kannadaliterarypoemunicodewidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mankutimmana Kagga Safe to Use in 2026?

Generally Safe

Score 100/100

Mankutimmana Kagga has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'kagga' v1.1 plugin exhibits a generally strong security posture. The attack surface is remarkably clean, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points. The code analysis also shows a complete absence of dangerous functions and file operations, and all SQL queries utilize prepared statements, which are excellent security practices. The plugin does not make external HTTP requests, further reducing potential attack vectors.

However, a significant concern arises from the low percentage of properly escaped output (9%). This indicates a substantial risk of cross-site scripting (XSS) vulnerabilities, as untrusted data, if processed and displayed without adequate sanitization, could be exploited by attackers. The lack of nonce and capability checks, while not directly linked to an observed attack surface in this analysis, represents a missed opportunity to strengthen security, especially if the plugin were to introduce more complex functionalities or interactions in the future.

The vulnerability history is entirely clean, with no known CVEs or past incidents. This suggests a well-maintained codebase or a relatively new plugin that hasn't yet been targeted or extensively reviewed. In conclusion, while the plugin has a very limited attack surface and adheres to best practices in areas like SQL querying, the high number of unescaped outputs presents a clear and present danger. The absence of vulnerabilities to date is positive, but the identified output escaping issue needs immediate attention to prevent potential exploitation.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Mankutimmana Kagga Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mankutimmana Kagga Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

9% escaped11 total outputs
Attack Surface

Mankutimmana Kagga Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initkagga.php:104
filterplugin_row_metakagga.php:124
Maintenance & Trust

Mankutimmana Kagga Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Mankutimmana Kagga Developer Profile

Prasanna SP

6 plugins · 2K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mankutimmana Kagga

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
kagga
FAQ

Frequently Asked Questions about Mankutimmana Kagga