Kento Top Author Security & Risk Analysis

wordpress.org/plugins/kento-top-authors

Top Author list By Count Post

10 active installs v1.0 PHP + WP 3.8+ Updated Jun 9, 2015
author-listmembers-listtop-authortop-members
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Kento Top Author Safe to Use in 2026?

Generally Safe

Score 85/100

Kento Top Author has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'kento-top-authors' plugin version 1.0 exhibits a mixed security posture. On one hand, it demonstrates strong security practices by avoiding dangerous functions, implementing prepared statements for all SQL queries, and having no recorded vulnerabilities or CVEs. The attack surface also appears minimal, with no AJAX handlers, REST API routes, shortcodes, or cron events, suggesting a limited scope for direct attack vectors.

However, a significant concern arises from the complete lack of output escaping. With 12 total outputs analyzed and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data, if not meticulously handled by the WordPress core or theme before reaching these output points, could be injected and executed in the browser of other users. Additionally, the taint analysis reveals 2 flows with unsanitized paths, indicating potential issues where data could be processed in an unsafe manner, although no critical or high severity was assigned, suggesting these might be lower-impact but still noteworthy.

The absence of capability checks and nonce checks in any of the analyzed code segments is also a concern, particularly if any of the plugin's functionalities, even those not directly exposed as AJAX or REST endpoints, could be triggered in a way that modifies data or performs sensitive actions. The vulnerability history being clean is a positive indicator, but it doesn't negate the identified code-level weaknesses that could be exploited.

Key Concerns

  • Unescaped output
  • Taint flow with unsanitized path
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Kento Top Author Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Kento Top Author Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
kento_top_authors_widget_control (index.php:42)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Kento Top Author Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_enqueue_scriptsindex.php:21
Maintenance & Trust

Kento Top Author Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJun 9, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Kento Top Author Developer Profile

PluginsPoint

20 plugins · 600 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Kento Top Author

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kento-top-authors/css/style.css

HTML / DOM Fingerprints

CSS Classes
top-authorstop-authors-listtop-authors-imagetop-authors-nametop-authors-post
Data Attributes
name="widgettitle"name="number"name="kta_style"name="submitted"
FAQ

Frequently Asked Questions about Kento Top Author