LINE for WordPress Security & Risk Analysis

wordpress.org/plugins/line-wp

You can link articles posted on WordPress to LINE.

0 active installs v1.0.1 PHP + WP 5.7+ Updated Apr 7, 2021
botjapaneselinemessenger
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LINE for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

LINE for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "line-wp" v1.0.1 exhibits a generally strong security posture, particularly concerning its handling of SQL queries and its minimal attack surface. The use of prepared statements for all SQL queries is a significant strength, preventing common SQL injection vulnerabilities. Furthermore, the plugin has a very small attack surface with only one AJAX handler, and importantly, this entry point appears to have authentication checks in place, which is excellent practice. The absence of any known vulnerabilities in its history further reinforces this positive assessment, suggesting a development team that prioritizes security or a plugin that has been rigorously tested.

However, there are areas that warrant attention. The static analysis reveals that only 63% of output is properly escaped. This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is displayed without adequate sanitization. While the taint analysis shows no critical or high severity flows with unsanitized paths, the presence of two analyzed flows with unsanitized paths, even if deemed low risk by the tools, suggests that this could be an area where vulnerabilities might emerge with future code changes or more sophisticated attack vectors. The single file operation and single external HTTP request, while not inherently risky, are points that should be monitored for secure implementation.

In conclusion, "line-wp" v1.0.1 demonstrates good security practices in critical areas like SQL handling and access control. Its clean vulnerability history is a strong indicator of its current safety. The primary weakness lies in output escaping, which needs to be addressed to mitigate potential XSS risks. The unsanitized taint flows, though currently low impact, highlight the need for continued vigilance and thorough code reviews.

Key Concerns

  • Low output escaping percentage
  • Taint flows with unsanitized paths
Vulnerabilities
None known

LINE for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LINE for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
39
65 escaped
Nonce Checks
1
Capability Checks
2
File Operations
1
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

63% escaped104 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
jp4wc_save_methods (includes\jp4wc-framework\class-jp4wc-framework.php:382)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

LINE for WordPress Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_wc4jp_ratedline-wp.php:57
WordPress Hooks 11
actionadmin_menuincludes\admin\class-admin-setting.php:39
actionadmin_initincludes\admin\class-admin-setting.php:40
actionadmin_enqueue_scriptsincludes\admin\class-admin-setting.php:41
actionadd_meta_boxesincludes\admin\class-admin-setting.php:43
actionpublish_postincludes\class-line-wp-post-send-line.php:40
actionadmin_noticesincludes\class-line-wp-post-send-line.php:41
actionadmin_noticesincludes\class-line-wp-post-send-line.php:42
filterline_post_messageincludes\class-line-wp-post-send-line.php:43
filteradmin_footer_textline-wp.php:58
actionplugins_loadedline-wp.php:82
actionplugins_loadedline-wp.php:200
Maintenance & Trust

LINE for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.0
Last updatedApr 7, 2021
PHP min version
Downloads959

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

LINE for WordPress Developer Profile

shohei.tanaka

6 plugins · 11K total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
101 days
View full developer profile
Detection Fingerprints

How We Detect LINE for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/line-wp/assets/css/line-wp.css/wp-content/plugins/line-wp/assets/js/line-wp.js
Script Paths
/wp-content/plugins/line-wp/assets/js/line-wp.js
Version Parameters
line-wp/assets/css/line-wp.css?ver=line-wp/assets/js/line-wp.js?ver=

HTML / DOM Fingerprints

CSS Classes
wc4jp-rating-link
Data Attributes
data-rated
JS Globals
wc_enqueue_js
FAQ

Frequently Asked Questions about LINE for WordPress