Blackhole for Bad Bots Security & Risk Analysis

wordpress.org/plugins/blackhole-bad-bots

Blackhole is a WordPress security plugin that detects and traps bad bots in a virtual black hole, where they are denied access to your entire site.

30K active installs v3.8.1 PHP 5.6.20+ WP 4.7+ Updated Mar 20, 2026
anti-spamblackholebotshoneypotsecurity
91
A · Safe
CVEs total2
Unpatched0
Last CVEMar 25, 2026
Safety Verdict

Is Blackhole for Bad Bots Safe to Use in 2026?

Generally Safe

Score 91/100

Blackhole for Bad Bots has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

2 known CVEsLast CVE: Mar 25, 2026Updated 1mo ago
Risk Assessment

The plugin 'blackhole-bad-bots' v3.8 exhibits a mixed security posture. On one hand, the static analysis reveals a remarkably small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. This is a strong indicator of good security design regarding potential entry points. The presence of nonce and capability checks, while limited to a few instances, also suggests some attention to authorization. However, significant concerns arise from the handling of SQL queries and output escaping. The fact that 100% of the single SQL query does not use prepared statements is a critical vulnerability, opening the door to SQL injection attacks. Furthermore, with less than half of the output operations being properly escaped, there's a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. The plugin's vulnerability history, specifically a past critical CVE related to 'Authorization Bypass Through User-Controlled Key,' reinforces the notion that authorization and input validation are areas that require robust and consistent implementation. While the current version shows a reduction in exploitable attack vectors, the underlying code quality concerns regarding SQL and output handling remain.

Key Concerns

  • SQL queries lack prepared statements
  • Insufficient output escaping
  • Past critical CVE indicating auth bypass risk
Vulnerabilities
2 published

Blackhole for Bad Bots Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

Critical
1
High
1

2 total CVEs

CVE-2026-4329high · 7.2Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Blackhole for Bad Bots <= 3.8 - Unauthenticated Stored Cross-Site Scripting via User-Agent HTTP Header

Mar 25, 2026 Patched in 3.8.1 (1d)
CVE-2022-1165critical · 9.1Authorization Bypass Through User-Controlled Key

Blackhole for Bad Bots <= 3.3.1 - Arbitrary IP Address Blocking via IP Spoofing

Jan 31, 2022 Patched in 3.3.2 (722d)
Version History

Blackhole for Bad Bots Release Timeline

v3.8.1Current
v3.81 CVE
v3.7.51 CVE
v3.7.41 CVE
v3.7.31 CVE
v3.7.21 CVE
v3.7.11 CVE
v3.71 CVE
v3.6.11 CVE
v3.61 CVE
v3.51 CVE
v3.4.11 CVE
v3.41 CVE
v3.3.51 CVE
v3.3.41 CVE
v3.3.31 CVE
v3.3.21 CVE
Code Analysis
Analyzed Mar 16, 2026

Blackhole for Bad Bots Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
56
45 escaped
Nonce Checks
5
Capability Checks
5
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

45% escaped101 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
blackhole_tools_admin_notice (inc\settings-reset.php:5)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Blackhole for Bad Bots Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 24
actionadmin_initblackhole.php:53
actionadmin_initblackhole.php:54
actioninitblackhole.php:55
filterplugin_action_linksblackhole.php:56
filterplugin_row_metablackhole.php:57
filteradmin_footer_textblackhole.php:58
filtersafe_style_cssblackhole.php:59
actionadmin_enqueue_scriptsblackhole.php:61
actionadmin_print_scriptsblackhole.php:62
actionadmin_noticesblackhole.php:63
actionadmin_initblackhole.php:64
actionadmin_initblackhole.php:65
actionadmin_initblackhole.php:66
actionadmin_initblackhole.php:67
actionadmin_initblackhole.php:68
actionadmin_initblackhole.php:69
actionadmin_initblackhole.php:70
actionadmin_menublackhole.php:71
actionlogin_footerblackhole.php:73
actionwp_footerblackhole.php:74
actioninitblackhole.php:75
filterrobots_txtblackhole.php:77
actionload-toplevel_page_blackhole_settingsinc\contextual-help.php:452
actionload-blackhole_page_blackhole_badbotsinc\contextual-help.php:514
Maintenance & Trust

Blackhole for Bad Bots Maintenance & Trust

Maintenance Signals

WordPress version tested7.0
Last updatedMar 20, 2026
PHP min version5.6.20
Downloads891K

Community Trust

Rating94/100
Number of ratings148
Active installs30K
Developer Profile

Blackhole for Bad Bots Developer Profile

Jeff Starr

31 plugins · 1.2M total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
320 days
View full developer profile
Detection Fingerprints

How We Detect Blackhole for Bad Bots

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blackhole-bad-bots/js/blackhole-bad-bots-admin.js/wp-content/plugins/blackhole-bad-bots/css/blackhole-bad-bots-admin.css
Script Paths
/wp-content/plugins/blackhole-bad-bots/js/blackhole-bad-bots-admin.js
Version Parameters
blackhole-bad-bots/js/blackhole-bad-bots-admin.js?ver=blackhole-bad-bots/css/blackhole-bad-bots-admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
blackhole-bad-bots-admin-wrap
HTML Comments
<!-- Blackhole for Bad Bots -->
JS Globals
blackhole_bad_bots_params
FAQ

Frequently Asked Questions about Blackhole for Bad Bots