Yabe Kokoro Security & Risk Analysis

wordpress.org/plugins/yabe-kokoro

Oxygen design sets manager.

0 active installs v1.0.7 PHP 7.4+ WP 6.0+ Updated Nov 6, 2023
design-setsoxygen-buildertemplate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Yabe Kokoro Safe to Use in 2026?

Generally Safe

Score 85/100

Yabe Kokoro has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "yabe-kokoro" plugin version 1.0.7 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs, critical taint flows, dangerous functions, file operations, or external HTTP requests suggests a well-developed and secure codebase. The high percentage of SQL queries using prepared statements is also a positive indicator, mitigating risks of SQL injection. The plugin also lacks a significant attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, further enhancing its security.

However, there are significant concerns regarding output escaping. With 100% of outputs not properly escaped, this presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities. This is a critical oversight that could allow attackers to inject malicious scripts into the website, impacting users and potentially compromising data. Furthermore, the complete absence of nonce checks and capability checks on potential entry points, though currently zero, means that if any were to be introduced in the future, they would be unprotected, leaving them vulnerable. The lack of any recorded vulnerability history is reassuring but doesn't entirely absolve the plugin from potential future issues, especially given the output escaping deficiency.

Key Concerns

  • Outputs are not properly escaped
  • No nonce checks on potential entry points
  • No capability checks on potential entry points
Vulnerabilities
None known

Yabe Kokoro Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Yabe Kokoro Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
57 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

89% prepared64 total queries

Output Escaping

0% escaped9 total outputs
Attack Surface

Yabe Kokoro Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Yabe Kokoro Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedNov 6, 2023
PHP min version7.4
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Yabe Kokoro Developer Profile

Rosua

4 plugins · 140 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Yabe Kokoro

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/yabe-kokoro/build/index.css/wp-content/plugins/yabe-kokoro/build/index.js
Script Paths
/wp-content/plugins/yabe-kokoro/build/index.js
Version Parameters
yabe-kokoro/build/index.css?ver=yabe-kokoro/build/index.js?ver=

HTML / DOM Fingerprints

CSS Classes
yabe-kokoro
Data Attributes
data-yabe-kokoro
REST Endpoints
/wp-json/yabe-kokoro/admin/licenses/index/wp-json/yabe-kokoro/admin/licenses/store/wp-json/yabe-kokoro/admin/licenses/update-status/(?P<id>\d+)/wp-json/yabe-kokoro/admin/licenses/delete/(?P<id>\d+)/wp-json/yabe-kokoro/admin/licenses/detail/(?P<id>\d+)/wp-json/yabe-kokoro/admin/licenses/update/(?P<id>\d+)/wp-json/yabe-kokoro/admin/licenses/search_user/wp-json/yabe-kokoro/admin/licenses/sites/(?P<id>\d+)
FAQ

Frequently Asked Questions about Yabe Kokoro