Oni Daiko Security & Risk Analysis

wordpress.org/plugins/oni-daiko

Shows a list of the latest posts from all blogs under your WordPress Multisite.

10 active installs v0.5.5 PHP + WP 3.0.4+ Updated Oct 8, 2011
multipostsrecentsitewidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Oni Daiko Safe to Use in 2026?

Generally Safe

Score 85/100

Oni Daiko has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The oni-daiko plugin version 0.5.5 exhibits a mixed security posture. On the positive side, it shows a strong adherence to secure database practices with 100% of SQL queries utilizing prepared statements, indicating a low risk of SQL injection. Furthermore, the absence of known CVEs and a clean vulnerability history suggest a generally stable and well-maintained codebase in terms of publicly disclosed vulnerabilities.

However, several concerning aspects emerge from the static analysis. The presence of the `create_function` is a significant red flag, as it can lead to arbitrary code execution if not handled with extreme care. The taint analysis revealing two flows with unsanitized paths, while not classified as critical or high severity, still represent potential avenues for attack, especially in conjunction with other weaknesses. The most striking weakness is the extremely low percentage of properly escaped output (11%), which drastically increases the risk of Cross-Site Scripting (XSS) vulnerabilities across various entry points. The complete lack of nonce and capability checks on all identified entry points (which are none in this specific report, but the lack of checks when they *are* present is a concern) also points to a potential lack of proper authorization and protection against CSRF attacks if any new entry points are introduced or if the reporting is incomplete.

In conclusion, while the plugin avoids common database and known vulnerability issues, the high risk of XSS due to inadequate output escaping and the use of `create_function` are serious concerns. The two unsanitized taint flows, though not currently categorized as critical, exacerbate these risks. Developers should prioritize addressing the output escaping and the `create_function` usage to significantly improve the plugin's security.

Key Concerns

  • Dangerous function create_function used
  • Low output escaping percentage (11%)
  • Flows with unsanitized paths detected
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Oni Daiko Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Oni Daiko Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
1 prepared
Unescaped Output
34
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("Oni_daiko_Widget_NewPost");'oni_daiko_widgets.php:96

SQL Query Safety

100% prepared1 total queries

Output Escaping

11% escaped38 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
oni_daiko_setting_menu (oni_daiko_settings.php:1)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Oni Daiko Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_headoni_daiko.php:82
actionwp_headoni_daiko.php:86
actionadmin_menuoni_daiko.php:94
actioninitoni_daiko_settings.php:58
actionwidgets_initoni_daiko_widgets.php:96
Maintenance & Trust

Oni Daiko Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedOct 8, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Oni Daiko Developer Profile

DigitalCube Inc.

2 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Oni Daiko

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/oni-daiko/admin/style.css/wp-content/plugins/oni-daiko/css/oni_daiko.css

HTML / DOM Fingerprints

Shortcode Output
[oni_daiko_template_tag]
FAQ

Frequently Asked Questions about Oni Daiko