WP-Yomigana Security & Risk Analysis

wordpress.org/plugins/wp-yomigana

このプラグインはWordPressのエディターにrubyタグを入力する機能を追加します。

2K active installs v2.1.0 PHP 5.6+ WP 5.0+ Updated Mar 16, 2020
citedlrubytinymcewysiwyg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Yomigana Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Yomigana has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "wp-yomigana" v2.1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of dangerous functions, file operations, and external HTTP requests is commendable. Furthermore, the strict adherence to prepared statements for all SQL queries and the presence of at least one nonce check indicate good development practices for handling user input and preventing common web vulnerabilities. The zero-known CVEs and lack of recorded vulnerabilities further bolster this positive assessment, suggesting a well-maintained and secure codebase over its history.

However, a significant concern arises from the 33% of output escaping that is not properly handled. While the overall attack surface appears minimal with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication, the unescaped output presents a potential risk. If any of these limited entry points do exist (even if not detected by this analysis) or if there are other ways data can be outputted without proper sanitization, it could lead to Cross-Site Scripting (XSS) vulnerabilities. The absence of capability checks is also a minor concern, as it implies that if any functionality were to be exposed, it might not have proper authorization checks in place.

In conclusion, "wp-yomigana" v2.1.0 is likely a secure plugin, with its core functionality protected by good coding practices like prepared statements and nonce checks. The lack of historical vulnerabilities is a strong indicator of its safety. The primary area for improvement lies in ensuring all output is consistently and properly escaped to mitigate potential XSS risks, which, while not explicitly demonstrated as a flow in the taint analysis, remains a theoretical weakness.

Key Concerns

  • Unescaped output detected
  • Missing capability checks
Vulnerabilities
None known

WP-Yomigana Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Yomigana Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
10 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped15 total outputs
Attack Surface

WP-Yomigana Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionadmin_menusrc\Hametuha\Yomigana\Admin.php:19
actionadmin_initsrc\Hametuha\Yomigana\Admin.php:20
actionadmin_enqueue_scriptssrc\Hametuha\Yomigana\Admin.php:21
filterplugin_action_linkssrc\Hametuha\Yomigana\Admin.php:23
filterplugin_row_metasrc\Hametuha\Yomigana\Admin.php:24
actionadmin_noticessrc\Hametuha\Yomigana\Admin.php:49
filtermce_external_pluginssrc\Hametuha\Yomigana\Bootstrap.php:22
filtertiny_mce_before_initsrc\Hametuha\Yomigana\Bootstrap.php:28
actionwp_enqueue_editorsrc\Hametuha\Yomigana\Bootstrap.php:30
filterwp_kses_allowed_htmlsrc\Hametuha\Yomigana\Bootstrap.php:32
actioninitsrc\Hametuha\Yomigana\Gutenberg.php:22
actioninitsrc\Hametuha\Yomigana\Gutenberg.php:23
actionenqueue_block_editor_assetssrc\Hametuha\Yomigana\Gutenberg.php:24
actionadmin_noticeswp-yomigana.php:32
actionplugins_loadedwp-yomigana.php:38
Maintenance & Trust

WP-Yomigana Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMar 16, 2020
PHP min version5.6
Downloads15K

Community Trust

Rating100/100
Number of ratings3
Active installs2K
Developer Profile

WP-Yomigana Developer Profile

Fumiki Takahashi

14 plugins · 4K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
513 days
View full developer profile
Detection Fingerprints

How We Detect WP-Yomigana

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-yomigana/assets/css/ruby-admin.css/wp-content/plugins/wp-yomigana/assets/css/jquery-ui.css/wp-content/plugins/wp-yomigana/assets/js/dist/editor_plugin.js/wp-content/plugins/wp-yomigana/assets/js/dist/editor-helper.js
Script Paths
/wp-content/plugins/wp-yomigana/assets/js/dist/editor_plugin.js/wp-content/plugins/wp-yomigana/assets/js/dist/editor-helper.js
Version Parameters
wp-yomigana-adminwp-yomigana-editor-helper

HTML / DOM Fingerprints

Data Attributes
data-wp-yomigana-id
JS Globals
WpYomigana
FAQ

Frequently Asked Questions about WP-Yomigana