Kayo-co WP Plugin Security & Risk Analysis

wordpress.org/plugins/kayoco-by-croco

This is a plugin for WordPress for kayo-co, a service operated by CROCO Inc.

10 active installs v1.0.0 PHP 7.0+ WP 4.7+ Updated Oct 26, 2022
contextual-related-postsrelatedrelated-articlesrelated-postssimilar-posts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Kayo-co WP Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Kayo-co WP Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "kayoco-by-croco" v1.0.0 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests, coupled with the exclusive use of prepared statements for its limited SQL operations, are strong indicators of secure coding practices. Furthermore, the lack of recorded vulnerabilities in its history suggests a history of responsible development and maintenance. However, there are areas for improvement that prevent a perfect score. The plugin has a critical lack of security checks, specifically zero nonce checks and zero capability checks. This means that its single shortcode, which represents a potential entry point, could be exploited by unauthenticated or low-privileged users if it performs any sensitive actions or exposes user-controllable data. Additionally, the output escaping is not fully implemented, with 67% proper escaping, indicating a potential for cross-site scripting (XSS) vulnerabilities in the remaining 33% of outputs.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Unescaped output (33%)
Vulnerabilities
None known

Kayo-co WP Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Kayo-co WP Plugin Release Timeline

v1.0.0Current
v0.0.1
Code Analysis
Analyzed Apr 16, 2026

Kayo-co WP Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface

Kayo-co WP Plugin Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[kayoco] src/Croco/Options/Tag.php:66
WordPress Hooks 3
actionplugins_loadedcroco-kayoco.php:48
actionadmin_menusrc/Croco/Admin/Setting.php:45
actionwp_enqueue_scriptssrc/Croco/Options/Tag.php:65
Maintenance & Trust

Kayo-co WP Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedOct 26, 2022
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Kayo-co WP Plugin Developer Profile

crocowpplugin

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Kayo-co WP Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kayoco-by-croco/src/Croco/Options/Tag.php
Script Paths
https://kayo-co.biz-samurai.com/kayoco-recommend-embed.js

HTML / DOM Fingerprints

Data Attributes
id="croco-recommend"
JS Globals
window['CrocoRecommendObject']='ct'window['ct'] = window['ct'] || function()window['ct'].q = window['ct'].q || []window['ct']('iswpp', 1)window['ct']('script', script)window['ct']('host','kayo-co.biz-samurai.com')+1 more
Shortcode Output
<div id="croco-recommend"></div>
FAQ

Frequently Asked Questions about Kayo-co WP Plugin