
WP-Yomigana Security & Risk Analysis
wordpress.org/plugins/wp-yomiganaこのプラグインはWordPressのエディターにrubyタグを入力する機能を追加します。
Is WP-Yomigana Safe to Use in 2026?
Generally Safe
Score 85/100WP-Yomigana has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-yomigana" v2.1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of dangerous functions, file operations, and external HTTP requests is commendable. Furthermore, the strict adherence to prepared statements for all SQL queries and the presence of at least one nonce check indicate good development practices for handling user input and preventing common web vulnerabilities. The zero-known CVEs and lack of recorded vulnerabilities further bolster this positive assessment, suggesting a well-maintained and secure codebase over its history.
However, a significant concern arises from the 33% of output escaping that is not properly handled. While the overall attack surface appears minimal with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication, the unescaped output presents a potential risk. If any of these limited entry points do exist (even if not detected by this analysis) or if there are other ways data can be outputted without proper sanitization, it could lead to Cross-Site Scripting (XSS) vulnerabilities. The absence of capability checks is also a minor concern, as it implies that if any functionality were to be exposed, it might not have proper authorization checks in place.
In conclusion, "wp-yomigana" v2.1.0 is likely a secure plugin, with its core functionality protected by good coding practices like prepared statements and nonce checks. The lack of historical vulnerabilities is a strong indicator of its safety. The primary area for improvement lies in ensuring all output is consistently and properly escaped to mitigate potential XSS risks, which, while not explicitly demonstrated as a flow in the taint analysis, remains a theoretical weakness.
Key Concerns
- Unescaped output detected
- Missing capability checks
WP-Yomigana Security Vulnerabilities
WP-Yomigana Code Analysis
Output Escaping
WP-Yomigana Attack Surface
WordPress Hooks 15
Maintenance & Trust
WP-Yomigana Maintenance & Trust
Maintenance Signals
Community Trust
WP-Yomigana Alternatives
Black Studio TinyMCE Widget
black-studio-tinymce-widget
The visual editor widget for WordPress.
Visual Term Description Editor
visual-term-description-editor
Replaces the plain-text category and tag description editor with a visual editor.
Advanced TinyMCE Configuration
advanced-tinymce-configuration
Set advanced TinyMCE options for the classic block and classic editor.
Cleanup HTML
clean-html
Adds a button to your classic editor visual toolbar that when clicked strips all div, 'table', span tags from your post HTML code -- those a …
Advanced Post Excerpt
advanced-post-excerpt
Replace the default Post Excerpt meta box with a superior editing experience.
WP-Yomigana Developer Profile
14 plugins · 4K total installs
How We Detect WP-Yomigana
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-yomigana/assets/css/ruby-admin.css/wp-content/plugins/wp-yomigana/assets/css/jquery-ui.css/wp-content/plugins/wp-yomigana/assets/js/dist/editor_plugin.js/wp-content/plugins/wp-yomigana/assets/js/dist/editor-helper.js/wp-content/plugins/wp-yomigana/assets/js/dist/editor_plugin.js/wp-content/plugins/wp-yomigana/assets/js/dist/editor-helper.jswp-yomigana-adminwp-yomigana-editor-helperHTML / DOM Fingerprints
data-wp-yomigana-idWpYomigana