
Oni Daiko Security & Risk Analysis
wordpress.org/plugins/oni-daikoShows a list of the latest posts from all blogs under your WordPress Multisite.
Is Oni Daiko Safe to Use in 2026?
Generally Safe
Score 85/100Oni Daiko has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The oni-daiko plugin version 0.5.5 exhibits a mixed security posture. On the positive side, it shows a strong adherence to secure database practices with 100% of SQL queries utilizing prepared statements, indicating a low risk of SQL injection. Furthermore, the absence of known CVEs and a clean vulnerability history suggest a generally stable and well-maintained codebase in terms of publicly disclosed vulnerabilities.
However, several concerning aspects emerge from the static analysis. The presence of the `create_function` is a significant red flag, as it can lead to arbitrary code execution if not handled with extreme care. The taint analysis revealing two flows with unsanitized paths, while not classified as critical or high severity, still represent potential avenues for attack, especially in conjunction with other weaknesses. The most striking weakness is the extremely low percentage of properly escaped output (11%), which drastically increases the risk of Cross-Site Scripting (XSS) vulnerabilities across various entry points. The complete lack of nonce and capability checks on all identified entry points (which are none in this specific report, but the lack of checks when they *are* present is a concern) also points to a potential lack of proper authorization and protection against CSRF attacks if any new entry points are introduced or if the reporting is incomplete.
In conclusion, while the plugin avoids common database and known vulnerability issues, the high risk of XSS due to inadequate output escaping and the use of `create_function` are serious concerns. The two unsanitized taint flows, though not currently categorized as critical, exacerbate these risks. Developers should prioritize addressing the output escaping and the `create_function` usage to significantly improve the plugin's security.
Key Concerns
- Dangerous function create_function used
- Low output escaping percentage (11%)
- Flows with unsanitized paths detected
- No capability checks on entry points
- No nonce checks on entry points
Oni Daiko Security Vulnerabilities
Oni Daiko Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Oni Daiko Attack Surface
WordPress Hooks 5
Maintenance & Trust
Oni Daiko Maintenance & Trust
Maintenance Signals
Community Trust
Oni Daiko Alternatives
Multisite Taxonomy Widget
multisite-taxonomy-widget
List the latest posts of a specific taxonomy from your blog-network.
Recent Posts With Authors Widget
recent-posts-with-authors-widget
Shows a list of recent posts with the author of each post - for multi-author blogs.
Recent Posts Widget With Thumbnails
recent-posts-widget-with-thumbnails
List the most recent posts with post titles, thumbnails, excerpts, authors, categories, dates and more!
Social LikeBox & Feed
facebook-by-weblizar
Display your FaceBook Feed and Like box on your website with this outstanding plugin. It is completely customizable, responsive and the code is search …
Ultimate Posts Widget
ultimate-posts-widget
The ultimate widget for displaying posts, custom post types or sticky posts with an array of options.
Oni Daiko Developer Profile
2 plugins · 70 total installs
How We Detect Oni Daiko
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/oni-daiko/admin/style.css/wp-content/plugins/oni-daiko/css/oni_daiko.cssHTML / DOM Fingerprints
[oni_daiko_template_tag]