Aploblocks – Styling and Patterns for the block editor Security & Risk Analysis

wordpress.org/plugins/aploblocks

Aploblocks adds extra design features to the core wordpress blocks. It is designed for block themes and helps you achieve incredible designs with ver …

300 active installs v1.0.2 PHP 7.4+ WP 6.1+ Updated Feb 26, 2024
block-editorgutenberglayoutspatternssticky-header
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Aploblocks – Styling and Patterns for the block editor Safe to Use in 2026?

Generally Safe

Score 85/100

Aploblocks – Styling and Patterns for the block editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The plugin 'aploblocks' v1.0.2 demonstrates a mixed security posture. On the positive side, it shows excellent practices regarding SQL queries and output escaping, with 100% of both being handled securely. There are no known past vulnerabilities or critical taint flows, suggesting a generally stable codebase and a responsible development approach. The absence of dangerous functions and the use of prepared statements are significant strengths.

However, there are notable areas of concern. The plugin exposes one REST API route without any permission callbacks, creating a direct, unprotected entry point into the application. This lack of authorization check on a potentially accessible endpoint is a significant risk, as it could allow unauthorized actions or information disclosure. The total of one unprotected entry point, specifically this REST API route, is a clear weakness that needs immediate attention. While the static analysis did not reveal critical issues like unsanitized paths in taint flows or raw SQL, the identified unprotected REST API route is a direct, exploitable vulnerability.

In conclusion, 'aploblocks' v1.0.2 exhibits good internal code hygiene for SQL and output, with no historical vulnerabilities. The primary weakness lies in its exposed REST API endpoint lacking authentication or authorization. This single, unprotected entry point poses a tangible risk that outweighs the otherwise positive indicators in the code analysis. Addressing this unprotected REST API route should be the highest priority for improving the plugin's security.

Key Concerns

  • REST API route without permission callbacks
Vulnerabilities
None known

Aploblocks – Styling and Patterns for the block editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Aploblocks – Styling and Patterns for the block editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries
Attack Surface
1 unprotected

Aploblocks – Styling and Patterns for the block editor Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GETPOST/wp-json/aploblocks/v2/patterninc\rest-api.php:145
WordPress Hooks 4
actionwp_enqueue_scriptsaploblocks.php:111
actionenqueue_block_editor_assetsaploblocks.php:112
actioninitinc\register_styles.php:78
actionrest_api_initinc\rest-api.php:144
Maintenance & Trust

Aploblocks – Styling and Patterns for the block editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedFeb 26, 2024
PHP min version7.4
Downloads6K

Community Trust

Rating94/100
Number of ratings3
Active installs300
Developer Profile

Aploblocks – Styling and Patterns for the block editor Developer Profile

aploweb

1 plugin · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Aploblocks – Styling and Patterns for the block editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/aploblocks/assets/css/block-styles.css/wp-content/plugins/aploblocks/assets/js/site.js/wp-content/plugins/aploblocks/assets/js/index.js/wp-content/plugins/aploblocks/assets/js/patterninserter.js/wp-content/plugins/aploblocks/assets/css/editor.css/wp-content/plugins/aploblocks/assets/css/patterninserter.css/wp-content/plugins/aploblocks/assets/css/pattern-color-convert.css
Script Paths
/wp-content/plugins/aploblocks/assets/js/site.js/wp-content/plugins/aploblocks/assets/js/index.js/wp-content/plugins/aploblocks/assets/js/patterninserter.js
Version Parameters
aploblocks/assets/css/block-styles.css?ver=aploblocks/assets/js/site.js?ver=aploblocks/assets/js/index.js?ver=aploblocks/assets/js/patterninserter.js?ver=aploblocks/assets/css/editor.css?ver=aploblocks/assets/css/patterninserter.css?ver=aploblocks/assets/css/pattern-color-convert.css?ver=aploblocks/assets/css/block-styles.css?ver=

HTML / DOM Fingerprints

CSS Classes
aploblocks-extension-wrapperaploblocks-pattern-inserter-body
HTML Comments
Registers a rest endpoint & callbackthe callback function is provided a pattern id which then gets requested from the apigets a pattern from the pattern api given a pattern id, uploads media if required andreturns the modified pattern to the editor+3 more
Data Attributes
data-aploblocks-pattern-id
JS Globals
aploblocksplugindirurl
REST Endpoints
/wp-json/aploblocks/v2/pattern
FAQ

Frequently Asked Questions about Aploblocks – Styling and Patterns for the block editor