Kırk Hadis Security & Risk Analysis

wordpress.org/plugins/kirk-hadis

Bu eklenti, Türkiye Cumhuriyeti Diyanet İşleri Başkanlığı resmi internet sitesinden alınan 40 hadisi, rastgele bir şekilde ziyaretçilerinize göstermek …

10 active installs v1.0 PHP + WP + Updated Aug 15, 2010
40dinhadisislamkirk
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Kırk Hadis Safe to Use in 2026?

Generally Safe

Score 85/100

Kırk Hadis has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The 'kirk-hadis' plugin v1.0 exhibits a strong security posture in several key areas. The static analysis reveals no identified attack surface, meaning there are no exposed AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals indicate a complete absence of dangerous functions and external HTTP requests. The plugin also demonstrates good practice by using prepared statements for all its SQL queries and has no file operations or bundled libraries to consider for outdated versions. This suggests a well-contained and potentially secure plugin architecture.

However, a significant concern arises from the lack of output escaping, with 0% of the 4 identified outputs being properly escaped. This represents a potential vulnerability to cross-site scripting (XSS) attacks, where malicious scripts could be injected into the plugin's output and executed in a user's browser. The absence of nonce checks and capability checks, coupled with no identified authentication checks on entry points, further amplifies this risk. The taint analysis showing zero flows is positive but might be limited by the absence of detected entry points.

With no known vulnerability history, this plugin has a clean track record. However, the static analysis findings, particularly the unescaped output and lack of authorization checks on hypothetical future entry points, highlight areas that require immediate attention. The plugin's strengths lie in its contained nature and secure database interactions, but the identified output sanitation and authorization gaps present a notable risk that needs to be addressed to achieve a truly secure state.

Key Concerns

  • Unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Kırk Hadis Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Kırk Hadis Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Kırk Hadis Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedkirk-hadis.php:11
Maintenance & Trust

Kırk Hadis Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedAug 15, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Kırk Hadis Developer Profile

sustun

8 plugins · 90 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Kırk Hadis

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kirk-hadis/kh-widget.css/wp-content/plugins/kirk-hadis/kh-widget.js
Script Paths
/wp-content/plugins/kirk-hadis/kh-widget.js
Version Parameters
kirk-hadis/kh-widget.css?ver=kirk-hadis/kh-widget.js?ver=

HTML / DOM Fingerprints

CSS Classes
kh_widget
FAQ

Frequently Asked Questions about Kırk Hadis