ACF OpenStreetMap Field into a Block Security & Risk Analysis

wordpress.org/plugins/acf-openstreetmap-field-block

Very simple plugin that adds an OpenStreetMap ACF block to the WordPress block editor.

10 active installs v1.0 PHP + WP + Updated May 7, 2021
acfopenstreetmaposm
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ACF OpenStreetMap Field into a Block Safe to Use in 2026?

Generally Safe

Score 85/100

ACF OpenStreetMap Field into a Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The static analysis of the "acf-openstreetmap-field-block" v1.0 plugin reveals a generally good security posture, with no identified dangerous functions, SQL injection vulnerabilities, or file operations. The plugin also demonstrates a commitment to secure data handling by using prepared statements for all its SQL queries and escaping 80% of its output. The absence of external HTTP requests, cron events, shortcodes, AJAX handlers, and REST API routes significantly limits the plugin's attack surface. Furthermore, the lack of any recorded vulnerabilities in its history suggests a history of secure development practices.

However, the analysis does highlight a notable concern: the complete absence of nonce checks and capability checks. This lack of authorization and integrity checks across all potential entry points, even though the current attack surface is zero, represents a significant potential risk. If any new entry points are introduced in future versions without proper authorization, they could be exploited. While the current version appears safe due to its minimal attack surface, this oversight in fundamental security controls is a weakness that could lead to future vulnerabilities if not addressed.

In conclusion, the plugin exhibits strengths in its careful handling of data and its limited attack surface. The development team has clearly prioritized avoiding common pitfalls like raw SQL and dangerous functions. The main weakness lies in the complete omission of nonce and capability checks, which is a critical security practice for any WordPress plugin, regardless of its current attack surface. This should be a priority for future development to ensure the long-term security of the plugin.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Unescaped output (20%)
Vulnerabilities
None known

ACF OpenStreetMap Field into a Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ACF OpenStreetMap Field into a Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped5 total outputs
Attack Surface

ACF OpenStreetMap Field into a Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionacf/initacf-openstreetmap-field-block.php:14
actionacf/initacf-openstreetmap-field-block.php:66
Maintenance & Trust

ACF OpenStreetMap Field into a Block Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMay 7, 2021
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

ACF OpenStreetMap Field into a Block Developer Profile

julianoe

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF OpenStreetMap Field into a Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-openstreetmap-field-block/acf-osm-block.js

HTML / DOM Fingerprints

CSS Classes
acf-osm-block
Data Attributes
data-center-latdata-center-lngdata-zoomdata-return-formatdata-layersdata-allow-map-layers+2 more
FAQ

Frequently Asked Questions about ACF OpenStreetMap Field into a Block