Gutenberg Blocks – ACF Blocks Suite Security & Risk Analysis

wordpress.org/plugins/acf-blocks

Supercharge your Gutenberg editor with high-quality creative Gutenberg Blocks. Ready-to-use ACF Blocks!

500 active installs v2.6.11 PHP 5.6+ WP 5.0+ Updated Jan 28, 2025
acfacf-blockblockgutenberggutenberg-block
70
B · Generally Safe
CVEs total1
Unpatched1
Last CVEJun 19, 2025
Safety Verdict

Is Gutenberg Blocks – ACF Blocks Suite Safe to Use in 2026?

Mostly Safe

Score 70/100

Gutenberg Blocks – ACF Blocks Suite is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved.

1 known CVE 1 unpatched Last CVE: Jun 19, 2025Updated 1yr ago
Risk Assessment

The 'acf-blocks' plugin v2.6.11 exhibits a mixed security posture. On the positive side, the static analysis reveals a notably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication. Furthermore, all SQL queries are properly prepared, indicating good database interaction practices. However, a significant concern arises from the low percentage of properly escaped output (13%), suggesting a high potential for Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin's historical vulnerability types. The absence of nonce and capability checks on entry points, while currently not directly exploitable due to the limited attack surface, represents a missed security control that could become problematic if new entry points are introduced without proper validation. The plugin's vulnerability history includes a medium severity CVE related to XSS, which is currently unpatched. This pattern, combined with the output escaping issues, points to a recurring weakness in sanitizing user-provided data before it's displayed, posing a tangible risk to users. While the plugin has strengths in its limited attack surface and secure SQL handling, the prevalent output escaping deficiency and the presence of an unpatched XSS vulnerability demand immediate attention.

Key Concerns

  • Unpatched CVE (medium severity)
  • Low output escaping rate (13%)
  • No nonce checks
  • No capability checks
  • Bundled outdated library (Freemius v1.0)
Vulnerabilities
1 published

Gutenberg Blocks – ACF Blocks Suite Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-50041medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Gutenberg Blocks – ACF Blocks Suite <= 2.6.11 - Authenticated (Contributor+) Stored Cross-Site Scripting

Jun 19, 2025Unpatched
Version History

Gutenberg Blocks – ACF Blocks Suite Release Timeline

v2.6.11Current1 CVE
v2.6.101 CVE
v2.6.91 CVE
v2.6.81 CVE
v2.6.71 CVE
v2.6.61 CVE
v2.6.51 CVE
v2.6.41 CVE
v2.6.31 CVE
v2.6.21 CVE
v2.6.11 CVE
v2.6.01 CVE
v2.5.11 CVE
v2.5.01 CVE
v2.4.01 CVE
v2.2.11 CVE
v2.2.01 CVE
v2.1.01 CVE
v2.0.11 CVE
v2.0.01 CVE
Code Analysis
Analyzed Mar 16, 2026

Gutenberg Blocks – ACF Blocks Suite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
425
62 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Freemius1.0

SQL Query Safety

100% prepared2 total queries

Output Escaping

13% escaped487 total outputs
Attack Surface

Gutenberg Blocks – ACF Blocks Suite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
filterblock_categories_allacf-blocks.php:101
filterblock_categoriesacf-blocks.php:108
filteracf/settings/save_jsonacf-blocks.php:116
filteracf/settings/load_jsonacf-blocks.php:125
filteracf/load_value/name=acfb_post_list_elementsacf-blocks.php:149
filteracf/load_value/name=acfb_post_grid_elementsacf-blocks.php:179
filteracf/load_field/name=2_grid_layoutsacf-blocks.php:211
filteracf/load_field/name=3_grid_layoutsacf-blocks.php:220
filteracf/load_field/name=4_grid_layoutsacf-blocks.php:233
filteracf/load_field/name=social_networkacf-blocks.php:255
filteracf/load_field/name=acfb_post_tiled_collage_three_grid_layoutsacf-blocks.php:273
filteracf/load_field/name=acfb_post_tiled_collage_four_grid_layoutsacf-blocks.php:281
filteracf/load_field/name=acfb_post_tiled_collage_five_grid_layoutsacf-blocks.php:290
filteracf/load_field/name=acfb_post_typeacf-blocks.php:351
actionadmin_enqueue_scriptsacf-blocks.php:400
actionwp_enqueue_scriptsacf-blocks.php:420
actionacf/include_field_typesacf-blocks.php:437
actionacf/register_fieldsacf-blocks.php:439
actionacf/render_field/name=acfb_meta_select_fieldacf-blocks.php:641
filterupload_mimesacf-blocks.php:642
actionadmin_menuadmin\class-acf-admin-page.php:4
actionacf/initfree-acf-blocks.php:3
actionacf/input/admin_enqueue_scriptsfree-acf-blocks.php:359
Maintenance & Trust

Gutenberg Blocks – ACF Blocks Suite Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 28, 2025
PHP min version5.6
Downloads37K

Community Trust

Rating68/100
Number of ratings13
Active installs500
Developer Profile

Gutenberg Blocks – ACF Blocks Suite Developer Profile

WP Engine

16 plugins · 3.5M total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
831 days
View full developer profile
Detection Fingerprints

How We Detect Gutenberg Blocks – ACF Blocks Suite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-blocks/free-acf-blocks.php/wp-content/plugins/acf-blocks/pro-acf-blocks.php/wp-content/plugins/acf-blocks/img/gtwo-one.png/wp-content/plugins/acf-blocks/img/gtwo-two.png/wp-content/plugins/acf-blocks/img/gthree-one.png/wp-content/plugins/acf-blocks/img/gthree-two.png/wp-content/plugins/acf-blocks/img/gthree-three.png/wp-content/plugins/acf-blocks/img/gthree-four.png+1 more

HTML / DOM Fingerprints

CSS Classes
acf-block-library
Data Attributes
data-acf-block-typedata-acf-block-preview
JS Globals
acfBlocksConfig
FAQ

Frequently Asked Questions about Gutenberg Blocks – ACF Blocks Suite