Kurator Security & Risk Analysis

wordpress.org/plugins/kurator

Share your curation post on your blog

10 active installs v1.0 PHP + WP + Updated Feb 28, 2018
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Kurator Safe to Use in 2026?

Generally Safe

Score 85/100

Kurator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The plugin 'kurator' v1.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with exposed attack vectors is commendable. Furthermore, the code signals show no dangerous functions, file operations, or external HTTP requests, and importantly, all SQL queries utilize prepared statements. This indicates a conscientious development approach towards preventing common vulnerabilities.

However, a significant concern arises from the "Output escaping: 2 total outputs, 0% properly escaped" signal. This directly points to a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, as unsanitized output can be exploited by attackers to inject malicious scripts into the website. The lack of nonce and capability checks, while potentially not an issue given the zero attack surface, could become a risk if the plugin's functionality expands in the future without proper security considerations.

The vulnerability history being completely clear is a positive sign, suggesting a stable and well-maintained codebase. In conclusion, while the plugin demonstrates excellent practices in preventing direct attack vectors and SQL injection, the blatant absence of output escaping presents a critical security weakness that requires immediate attention. The plugin's strengths lie in its limited attack surface and secure data handling, but its weakness in output sanitization creates a significant risk.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Kurator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Kurator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Kurator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedkurator.php:37
actionadmin_menuKurator_Admin.php:3
actionadmin_initKurator_Admin.php:24
actionwp_enqueue_scriptsKurator_Client.php:3
actionwp_headKurator_Client.php:5
Maintenance & Trust

Kurator Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedFeb 28, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Kurator Alternatives

No alternatives data available yet.

Developer Profile

Kurator Developer Profile

iSoluce

2 plugins · 30 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Kurator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kurator/js/kurator.js
Script Paths
/wp-content/plugins/kurator/js/kurator.js

HTML / DOM Fingerprints

CSS Classes
kurator-link
FAQ

Frequently Asked Questions about Kurator