Yabe Ukiyo Security & Risk Analysis

wordpress.org/plugins/yabe-ukiyo

Bricks remote templates manager.

50 active installs v2.0.10 PHP 7.4+ WP 6.0+ Updated Nov 21, 2025
bricks-builderremote-templatestemplate-library
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Yabe Ukiyo Safe to Use in 2026?

Generally Safe

Score 100/100

Yabe Ukiyo has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The 'yabe-ukiyo' v2.0.10 plugin presents a mixed security picture. On the positive side, the plugin demonstrates good practices by having no recorded vulnerabilities in its history and no identified critical or high severity taint flows. Furthermore, it avoids dangerous functions, file operations, and external HTTP requests, all of which are strong indicators of a secure development approach. The high percentage of SQL queries using prepared statements also suggests a good understanding of preventing SQL injection.

However, there are significant areas of concern. The complete absence of output escaping for all identified outputs (18 total) is a critical weakness, exposing users to potential cross-site scripting (XSS) vulnerabilities. Additionally, the lack of any nonce or capability checks, even with a seemingly small attack surface (0 entry points), raises red flags. While there are no explicit unprotected entry points in the static analysis, this absence of authorization and security checks on any potential interaction points is a major oversight that could be exploited if any new entry points are introduced or if the current entry points have subtle bypasses. The vulnerability history being clean is positive but doesn't negate the immediate risks identified in the code analysis.

In conclusion, while the plugin benefits from a clean vulnerability history and a focus on preventing common SQL issues, the critical flaw of unescaped output and the concerning lack of authorization checks present a substantial risk. The plugin would require significant remediation in these areas to achieve a truly secure posture.

Key Concerns

  • 0% of outputs properly escaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Yabe Ukiyo Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Yabe Ukiyo Code Analysis

Dangerous Functions
0
Raw SQL Queries
9
72 prepared
Unescaped Output
18
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

89% prepared81 total queries

Output Escaping

0% escaped18 total outputs
Attack Surface

Yabe Ukiyo Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Yabe Ukiyo Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedNov 21, 2025
PHP min version7.4
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

Yabe Ukiyo Developer Profile

Rosua

4 plugins · 140 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Yabe Ukiyo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/yabe-ukiyo/src/js/yabe-ukiyo.js/wp-content/plugins/yabe-ukiyo/src/css/yabe-ukiyo.css
Script Paths
/wp-content/plugins/yabe-ukiyo/src/js/yabe-ukiyo.js
Version Parameters
yabe-ukiyo/src/js/yabe-ukiyo.js?ver=yabe-ukiyo/src/css/yabe-ukiyo.css?ver=

HTML / DOM Fingerprints

JS Globals
yabeUkiyoRemoteTemplatesbricksData.remoteTemplateSettings
REST Endpoints
/wp-json/yabe-ukiyo/v1/admin/wp-json/bricks/v1/get-templates-data
FAQ

Frequently Asked Questions about Yabe Ukiyo