Kumori (曇) Security & Risk Analysis

wordpress.org/plugins/kumori

It's a plugin that lets the users upload video files and transcode them on-the-cloud!

10 active installs v0.23 PHP + WP 3.5.1+ Updated Feb 10, 2015
amazonawscloudtranscode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Kumori (曇) Safe to Use in 2026?

Generally Safe

Score 85/100

Kumori (曇) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "kumori" plugin v0.23 presents a mixed security posture. On the positive side, the static analysis reveals no known CVEs, a complete absence of dangerous functions, and a commendable 100% usage of prepared statements for its SQL queries. Furthermore, there are no external HTTP requests or cron events, and the attack surface is reported as zero. This suggests a deliberate effort to avoid common web application vulnerabilities.

However, significant concerns arise from the output escaping and taint analysis. With 0% of outputs properly escaped, the plugin is highly vulnerable to cross-site scripting (XSS) attacks. Any data displayed to users without proper sanitization could be exploited. The taint analysis also identified two flows with unsanitized paths, although these are not categorized as critical or high severity. The absence of nonce checks and capability checks, coupled with two file operations that might be susceptible if inputs are not carefully validated, warrants attention. The lack of any recorded vulnerability history could indicate either a very secure plugin or a lack of historical scrutiny.

In conclusion, while "kumori" v0.23 demonstrates good practices in areas like SQL handling and attack surface minimization, its severe deficiency in output escaping creates a significant risk of XSS vulnerabilities. The identified unsanitized paths in taint analysis, along with the absence of nonce and capability checks for its file operations, should be addressed to improve its overall security.

Key Concerns

  • 0% of outputs properly escaped
  • 2 flows with unsanitized paths
  • No nonce checks
  • No capability checks
  • 2 file operations
Vulnerabilities
None known

Kumori (曇) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Kumori (曇) Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
72
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped72 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
<ETrActions> (kumori\ETrActions.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Kumori (曇) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menukumori.php:18
actionadmin_initkumori.php:120
Maintenance & Trust

Kumori (曇) Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 10, 2015
PHP min version
Downloads2K

Community Trust

Rating74/100
Number of ratings3
Active installs10
Developer Profile

Kumori (曇) Developer Profile

gpower2

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Kumori (曇)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kumori/kumori/kumori_logo2_png24.png

HTML / DOM Fingerprints

Data Attributes
id="gv_kumori_aws_access_id"id="gv_kumori_aws_secret_key"id="gv_kumori_aws_region"id="gv_kumori_debug_mode"
FAQ

Frequently Asked Questions about Kumori (曇)