Back List Security & Risk Analysis

wordpress.org/plugins/back-list

Adds Whitelist and Blacklist options for Trackbacks and Pingbacks

10 active installs v0.5 PHP + WP 3.0+ Updated Unknown
anti-spamblacklistcommentssecurity
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Back List Safe to Use in 2026?

Generally Safe

Score 100/100

Back List has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'back-list' plugin v0.5 exhibits a strong security posture based on the provided static analysis. It has a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, the code shows good practices by avoiding dangerous functions, conducting all SQL queries using prepared statements, and having no file operations or external HTTP requests. The presence of two nonce checks is a positive indicator of security awareness, although the absence of capability checks on any entry points is a notable concern.

Taint analysis shows no flows with unsanitized paths, indicating a lack of common injection vulnerabilities within the analyzed code. The plugin also has no recorded vulnerability history, which suggests a well-maintained and secure development process over time. However, the critical weakness identified is the 57% rate of properly escaped output. This means a significant portion of data outputted by the plugin is not properly escaped, leaving it potentially vulnerable to Cross-Site Scripting (XSS) attacks. While other areas appear secure, this unescaped output presents a tangible risk.

In conclusion, 'back-list' v0.5 is generally well-secured, especially regarding its attack surface and data handling for SQL. The lack of known vulnerabilities and the use of prepared statements are commendable. The primary area requiring immediate attention is the unescaped output, which could lead to XSS vulnerabilities. Addressing this, along with the lack of capability checks, will further strengthen its security profile.

Key Concerns

  • Unescaped output identified
  • No capability checks on entry points
Vulnerabilities
None known

Back List Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Back List Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
4 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

57% escaped7 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
admin_init (back-list.php:164)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Back List Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterpreprocess_commentback-list.php:36
actionadmin_initback-list.php:155
filtercomment_row_actionsback-list.php:156
Maintenance & Trust

Back List Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Back List Developer Profile

w3prodigy

5 plugins · 920 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Back List

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
id="back_list_blog"id="back_list_white"id="back_list_black"
FAQ

Frequently Asked Questions about Back List