RiverCraft Security & Risk Analysis

wordpress.org/plugins/rivercraft

RiverCraft permet d'unir votre serveur Minecraft et votre site/blog Wordpress à l'aide de JSONAPI.

10 active installs v1.3.2 PHP + WP 3.0+ Updated Sep 8, 2013
bukkitjsonapiminecraft
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is RiverCraft Safe to Use in 2026?

Generally Safe

Score 85/100

RiverCraft has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "rivercraft" plugin version 1.3.2 demonstrates a generally positive security posture based on the provided static analysis. The absence of any registered AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code signals indicate a lack of dangerous functions, no file operations, and the use of prepared statements for all SQL queries, which are excellent security practices. The plugin also refrains from making external HTTP requests, further reducing potential vulnerabilities.

However, the analysis does reveal some areas for concern. A notable weakness is the low percentage of properly escaped output (14%). This indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or dynamic content may not be adequately neutralized before being displayed to users. Additionally, the absence of nonce checks and capability checks across any identified entry points (though there are none explicitly listed as unprotected) suggests a potential for security bypasses if new entry points were introduced or if the plugin's scope were to expand.

The vulnerability history showing zero known CVEs and no past issues is a strong indicator of good development practices over time. This, combined with the limited attack surface and secure SQL handling, suggests a robust foundation. Nevertheless, the unescaped output remains a critical flaw that requires immediate attention. The overall conclusion is that while "rivercraft" has a strong foundation in terms of attack surface management and data handling, the high prevalence of unescaped output presents a substantial XSS risk that overshadows its other strengths.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

RiverCraft Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

RiverCraft Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
31
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

14% escaped36 total outputs
Attack Surface

RiverCraft Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menupanel.php:12
actionwidgets_initwidget.php:16
Maintenance & Trust

RiverCraft Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 8, 2013
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

RiverCraft Developer Profile

RiverNight

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RiverCraft

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rivercraft/css/style.css
Version Parameters
rivercraft/css/style.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about RiverCraft