PowerFM Radyo Security & Risk Analysis

wordpress.org/plugins/powerfm-radyo

Bu eklenti sayesinde Wordpress blogunuzda PowerFM kurulmaktadır.

10 active installs v2.0 PHP + WP 4.0+ Updated Feb 14, 2018
muzikpowerradioradyowidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PowerFM Radyo Safe to Use in 2026?

Generally Safe

Score 85/100

PowerFM Radyo has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The plugin "powerfm-radyo" v2.0 exhibits a generally strong security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the attack surface. Furthermore, the code signals indicate a lack of dangerous functions, file operations, and external HTTP requests, which are common vectors for exploits. The consistent use of prepared statements for SQL queries is a significant strength, mitigating SQL injection risks.

However, a critical concern emerges from the output escaping analysis, where 100% of identified outputs are not properly escaped. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website. The complete lack of nonce and capability checks is also noteworthy, especially given the absence of specific entry points analyzed. While the taint analysis reported no issues, this may be due to the limited attack surface or scope of the analysis.

The plugin's vulnerability history is clean, with no recorded CVEs. This suggests a history of responsible development or that the plugin has not been a significant target for public vulnerability discovery. Despite the lack of historical vulnerabilities, the identified output escaping issues require immediate attention to prevent potential exploitation and ensure a secure user experience. The strengths in SQL handling and limited attack surface are positive, but the XSS risk is a significant weakness.

Key Concerns

  • All identified outputs are unescaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

PowerFM Radyo Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PowerFM Radyo Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

PowerFM Radyo Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

PowerFM Radyo Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 14, 2018
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

PowerFM Radyo Developer Profile

cihanoztunc

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PowerFM Radyo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<img src="http://radyo.gen.tr/gorsel/power-fm-dinle_400x400_17.jpg" width=300px alt="Powerfm"><audio controls loop><source src="http://powerfm.listenpowerapp.com/powerfm/mpeg/icecast.audio" />Lütfen Bekleyiniz.</audio>
FAQ

Frequently Asked Questions about PowerFM Radyo