出勤・勤怠プラグイン Security & Risk Analysis

wordpress.org/plugins/os-attendance-management

出勤・退勤などの勤怠(勤務状況)が管理できるプラグインです。

10 active installs v1.3.21 PHP + WP 3.1+ Updated Sep 16, 2017
admin%e5%87%ba%e5%8b%a4%e5%8b%a4%e6%80%a0
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is 出勤・勤怠プラグイン Safe to Use in 2026?

Generally Safe

Score 85/100

出勤・勤怠プラグイン has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "os-attendance-management" plugin v1.3.21 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for all SQL queries and has no known past vulnerabilities. The absence of external HTTP requests and file operations further contributes to a generally stable foundation. However, significant concerns arise from the static analysis results. The presence of the `unserialize` function, even if not immediately flagged as a critical taint flow, is a known vector for remote code execution if user-supplied data is involved. Furthermore, a high severity taint flow with unsanitized paths indicates a potential for vulnerabilities that require immediate attention. The low percentage of properly escaped output (19%) suggests a risk of cross-site scripting (XSS) vulnerabilities, especially if user-generated content is displayed without sufficient sanitization.

While the plugin's attack surface appears limited and all identified entry points have checks, the internal code quality presents risks. The critical flaw lies in the combination of the `unserialize` function and the identified high-severity unsanitized taint flow. The lack of historical vulnerabilities is a positive indicator of past development diligence, but it does not negate the risks present in the current version's code. A balanced conclusion is that the plugin has strengths in its adherence to secure database practices and a clean vulnerability history, but the presence of dangerous functions and unsanitized data flows, coupled with poor output escaping, creates a notable risk profile that needs to be addressed.

Key Concerns

  • High severity taint flow with unsanitized paths
  • Low output escaping percentage (19%)
  • Dangerous function detected (unserialize)
Vulnerabilities
None known

出勤・勤怠プラグイン Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

出勤・勤怠プラグイン Release Timeline

v1.0.31
v1.0.5
v1.0.4
v1.0.3
v1.0.1
v1.0
Code Analysis
Analyzed Apr 16, 2026

出勤・勤怠プラグイン Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
9 prepared
Unescaped Output
121
29 escaped
Nonce Checks
5
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$umeta_values = unserialize($s_umeta_values);attendanceProfClass.php:230

SQL Query Safety

100% prepared9 total queries

Output Escaping

19% escaped150 total outputs
Data Flows · Security
4 unsanitized

Data Flow Analysis

7 flows4 with unsanitized paths
custom_profile_fields (attendanceProfClass.php:179)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

出勤・勤怠プラグイン Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[attendance] attendanceMainClass.php:10
[os-am-userprof] attendanceProfClass.php:15
WordPress Hooks 14
actionadmin_initattendanceAdminClass.php:8
actionadmin_initattendanceAdminClass.php:11
actionadmin_menuattendanceAdminClass.php:13
actionadmin_initattendanceAdminClass.php:23
actionadmin_initattendanceAdminClass.php:333
actionplugins_loadedattendanceClass.php:7
actionplugins_loadedattendanceClass.php:9
actionwp_headattendanceClass.php:11
actionplugins_loadedattendanceMainClass.php:8
actionwp_headattendanceMainClass.php:228
actionadmin_initattendanceProfClass.php:8
filterpersonal_optionsattendanceProfClass.php:10
actionprofile_updateattendanceProfClass.php:12
actionedit_user_profile_updateattendanceProfClass.php:13
Maintenance & Trust

出勤・勤怠プラグイン Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedSep 16, 2017
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

出勤・勤怠プラグイン Developer Profile

OLIVESYSTEM

4 plugins · 630 total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect 出勤・勤怠プラグイン

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/os-attendance-management/css/admin-style.css/wp-content/plugins/os-attendance-management/css/user-style.css/wp-content/plugins/os-attendance-management/css/style.css/wp-content/plugins/os-attendance-management/js/common.js/wp-content/plugins/os-attendance-management/js/admin.js/wp-content/plugins/os-attendance-management/js/user.js
Script Paths
/wp-content/plugins/os-attendance-management/js/common.js/wp-content/plugins/os-attendance-management/js/admin.js/wp-content/plugins/os-attendance-management/js/user.js
Version Parameters
os-attendance-management/css/admin-style.css?ver=os-attendance-management/css/user-style.css?ver=os-attendance-management/css/style.css?ver=os-attendance-management/js/common.js?ver=os-attendance-management/js/admin.js?ver=os-attendance-management/js/user.js?ver=

HTML / DOM Fingerprints

CSS Classes
osam-admin-wraposam-option-wraposam-list-wraposam-post-wraposam-help-wraposam-write-wraposam-format-wraposam-agreement-wrap
Data Attributes
data-osam-user-iddata-osam-working-id
JS Globals
osam_common_dataattendanceAdminattendanceUserattendanceProf
FAQ

Frequently Asked Questions about 出勤・勤怠プラグイン