Koyomi Security & Risk Analysis

wordpress.org/plugins/koyomi

Display current moon phase, dates, and Japanese old dates with graphical images.

10 active installs v0.0.4 PHP + WP 2.5+ Updated Aug 5, 2011
japanese-calendarkoyomimoon-phasesidebar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Koyomi Safe to Use in 2026?

Generally Safe

Score 85/100

Koyomi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The plugin "koyomi" v0.0.4 demonstrates a generally strong security posture from a static analysis perspective. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code exhibits good practices regarding SQL queries by exclusively using prepared statements and a lack of dangerous functions or file operations.

However, a notable concern arises from the output escaping. With only 29% of identified outputs being properly escaped, there is a significant risk of cross-site scripting (XSS) vulnerabilities. The lack of nonces and capability checks on any potential entry points (though none were identified) also represents a weakness, as any future expansion of the plugin's functionality without these security measures would be immediately vulnerable. The clean vulnerability history is positive, indicating a lack of known exploits, but this should not overshadow the identified code-level risks.

In conclusion, while "koyomi" v0.0.4 has a minimal attack surface and uses prepared statements for SQL, the prevalent issue of unescaped output presents a clear and present danger of XSS. The absence of any identified entry points is a strength, but the lack of essential security checks like nonces and capability checks in the existing code base is a notable weakness that needs attention.

Key Concerns

  • Insufficient output escaping (29% proper)
  • Lack of nonce checks
  • Lack of capability checks
Vulnerabilities
None known

Koyomi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Koyomi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

Koyomi Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedwidget_koyomi.php:327
Maintenance & Trust

Koyomi Maintenance & Trust

Maintenance Signals

WordPress version tested2.7
Last updatedAug 5, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Koyomi Developer Profile

V.J.Catkick

10 plugins · 110 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Koyomi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/koyomi/image/moon/

HTML / DOM Fingerprints

CSS Classes
koyomi_todaykoyomi_old
Data Attributes
id="widget_j_koyomi"id="koyomi_outer"id="moonphase"
Shortcode Output
<div id="koyomi_outer"<div id="moonphase"
FAQ

Frequently Asked Questions about Koyomi