
Kento Vote Security & Risk Analysis
wordpress.org/plugins/kento-voteVote on Post and Display Who Voted via gravatar thumbnail.
Is Kento Vote Safe to Use in 2026?
Generally Safe
Score 85/100Kento Vote has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The kento-vote plugin v1.2 exhibits a concerning security posture due to significant unprotected entry points and a lack of robust security checks. While the plugin demonstrates good practices in output escaping and avoids dangerous functions, its reliance on direct AJAX handlers without authentication is a major vulnerability. The taint analysis reveals two critical flows with unsanitized paths, indicating potential for injection attacks or other data manipulation, despite the absence of recorded CVEs. The lack of any recorded vulnerabilities in its history is positive but doesn't negate the immediate risks identified in the code analysis, particularly the two unprotected AJAX endpoints.
The plugin's primary weakness lies in its attack surface. With two AJAX handlers identified and both lacking authentication, any user, including unauthenticated ones, can potentially trigger these functions. This, combined with the two critical taint flows originating from unsanitized paths, suggests a high risk of malicious exploitation. The absence of nonce checks and capability checks on these entry points further exacerbates this issue. The plugin does perform SQL queries, and while a portion are prepared, the overall lack of granular security controls on its exposed functions is a significant concern.
In conclusion, kento-vote v1.2 presents a substantial security risk. Its strong points are the absence of dangerous functions, proper output escaping, and no logged vulnerabilities to date. However, these strengths are overshadowed by the critical weaknesses of unprotected AJAX endpoints and critical taint flows. The plugin requires immediate attention to secure its entry points before it can be considered safe for use.
Key Concerns
- Unprotected AJAX handlers found
- Critical taint flows with unsanitized paths
- No nonce checks on AJAX handlers
- No capability checks on AJAX handlers
Kento Vote Security Vulnerabilities
Kento Vote Release Timeline
Kento Vote Code Analysis
SQL Query Safety
Data Flow Analysis
Kento Vote Attack Surface
AJAX Handlers 2
WordPress Hooks 2
Maintenance & Trust
Kento Vote Maintenance & Trust
Maintenance Signals
Community Trust
Kento Vote Alternatives
WP PostVoting
wp-postvoting
"WP PostVoting" plugin allows visitors to vote on your blog's content with a widget of the most voted posts.
Polls CP
cp-polls
Create classic polls and advanced polls with dependant questions. Voting / survey system.
OpinionCamp – Poll Block
opinioncamp
OpinionCamp is a block-based poll plugin for WordPress that lets you collect polls, votes, and opinions directly inside the Gutenberg editor.
Kento Like Post
kento-like-post
Facebook Style like button for WordPress with like count and user thumbnails.
MicroPoll
micropoll
Easily integrate web-based polls from MicroPoll into WordPress
Kento Vote Developer Profile
22 plugins · 640 total installs
How We Detect Kento Vote
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/kento-vote/css/style.css/wp-content/plugins/kento-vote/js/kento-vote.js/wp-content/plugins/kento-vote/js/kento-vote.jskento-vote/style.css?ver=kento-vote.js?ver=HTML / DOM Fingerprints
kento-vote-loginlogin-usernamelogin-passwordlogin-rememberlogin-submitid="kento-vote-login"id="log"id="pwd"id="rememberme"name="redirect_to"MyAjax