Reconews Security & Risk Analysis

wordpress.org/plugins/reconews

Reconewsは投稿されたコンテンツの内容を解析して、関連する外部のニュースやコンテンツを取得して投稿ページに表示することで内容の充実を図ることができます。 外部ニュースは下記のいずれかのサイトより取得することができます bing (bingの検索結果が表示されます。) Googleニュース …

10 active installs v0.3 PHP + WP 3.5+ Updated Oct 24, 2017
%e3%83%8b%e3%83%a5%e3%83%bc%e3%82%b9%e9%96%a2%e9%80%a3%e8%a8%98%e4%ba%8bnews%e6%8a%95%e7%a8%bf
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Reconews Safe to Use in 2026?

Generally Safe

Score 85/100

Reconews has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "reconews" v0.3 plugin exhibits a generally strong security posture, with no reported vulnerabilities and a limited attack surface. The static analysis reveals a conscientious approach to security, as evidenced by the high percentage of SQL queries using prepared statements and a decent proportion of properly escaped outputs. The presence of nonce and capability checks, though few, also indicates an awareness of core WordPress security principles. The plugin avoids common pitfalls like bundled libraries and direct file operations.

However, a significant concern arises from the presence of the `unserialize()` function. While the static analysis does not currently show any exploitable taint flows involving this function, `unserialize()` is inherently dangerous when used with untrusted input. Without explicit sanitization or validation of data before unserialization, it presents a substantial risk of arbitrary code execution if an attacker can control the serialized data. The limited number of analyzed taint flows and the small overall number of entry points suggest that this risk might be currently contained, but it represents a critical potential weakness that demands careful scrutiny and robust input validation.

In conclusion, "reconews" v0.3 has commendable security practices in place, particularly regarding database interactions and output handling. The absence of past vulnerabilities is a positive indicator. Nevertheless, the sole identified dangerous function, `unserialize()`, casts a shadow over its otherwise clean record. The plugin's current security is good, but this single function introduces a latent high-risk vulnerability that could be exploited if not properly managed. Developers should prioritize securing any input processed by `unserialize()` or consider removing its usage entirely.

Key Concerns

  • Usage of unserialize() function
Vulnerabilities
None known

Reconews Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Reconews Code Analysis

Dangerous Functions
1
Raw SQL Queries
1
11 prepared
Unescaped Output
6
14 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$news_data = unserialize($data->news_data);index.php:390

SQL Query Safety

92% prepared12 total queries

Output Escaping

70% escaped20 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
adomin (index.php:83)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Reconews Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuindex.php:45
actionwp_insert_postindex.php:46
filterthe_contentindex.php:47
Maintenance & Trust

Reconews Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedOct 24, 2017
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Reconews Developer Profile

MASAAKI

3 plugins · 10K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
311 days
View full developer profile
Detection Fingerprints

How We Detect Reconews

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/reconews/css/style.css/wp-content/plugins/reconews/js/script.js
Script Paths
/wp-content/plugins/reconews/js/script.js
Version Parameters
reconews/style.css?ver=reconews/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wp-heading-inline
HTML Comments
<!-- /.wrap -->
Data Attributes
name="reconews_title"name="reconews_update_frequency"name="reconews_view_count"name="reconews_engine"id="reconews_form"name="reconews_nonce_field"+1 more
FAQ

Frequently Asked Questions about Reconews