Any CPT Listing Block Security & Risk Analysis

wordpress.org/plugins/any-cpt-listing-block

In the Vision to Make Gutenberg for WordPress limitless with zero coding skill we have added this block to help users add latest any kind of posts or …

10 active installs v1.0.2 PHP 7.4+ WP 6.0+ Updated Nov 9, 2023
blockscptcustomgutenbergpost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Any CPT Listing Block Safe to Use in 2026?

Generally Safe

Score 85/100

Any CPT Listing Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "any-cpt-listing-block" plugin version 1.0.2 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries, exclusively using prepared statements, and has no recorded vulnerability history, suggesting a generally stable codebase. However, significant concerns arise from the static analysis. The plugin exposes a single REST API route that lacks any permission callbacks, creating an unprotected entry point into the application. Furthermore, a concerning 0% of its output is properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks across its limited attack surface also contributes to potential security weaknesses.

The lack of proper output escaping is the most immediate and severe risk, making it highly susceptible to XSS attacks where malicious scripts could be injected and executed in a user's browser. The unprotected REST API route, while a single point, is also a critical vulnerability as it allows unauthorized interaction with plugin functionalities. The absence of nonce and capability checks further exacerbates these issues by not enforcing necessary security measures to validate user actions and permissions. The plugin's current lack of known CVEs is a positive but does not negate the evident flaws in its current implementation.

Key Concerns

  • Unprotected REST API route
  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Any CPT Listing Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Any CPT Listing Block Release Timeline

v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Any CPT Listing Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface
1 unprotected

Any CPT Listing Block Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/wp/v2/available_typesany-cpt-listing-block.php:113
WordPress Hooks 2
actioninitany-cpt-listing-block.php:26
actionrest_api_initany-cpt-listing-block.php:27
Maintenance & Trust

Any CPT Listing Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedNov 9, 2023
PHP min version7.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Any CPT Listing Block Developer Profile

IT Path Solutions

13 plugins · 11K total installs

80
trust score
Avg Security Score
89/100
Avg Patch Time
77 days
View full developer profile
Detection Fingerprints

How We Detect Any CPT Listing Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/any-cpt-listing-block/build/index.css/wp-content/plugins/any-cpt-listing-block/build/index.js
Script Paths
/wp-content/plugins/any-cpt-listing-block/build/index.js

HTML / DOM Fingerprints

CSS Classes
acpt-mainacpt-front-screenacpt-rowacpt-block-itemacpt-gridacpt-list
Data Attributes
acpt-three-col
REST Endpoints
/wp-json/wp/v2/available_types
FAQ

Frequently Asked Questions about Any CPT Listing Block