Blade Security & Risk Analysis

wordpress.org/plugins/blade

Brings Laravel's great template engine, Blade, to Wordpress. Just install and start using blade in your theme.

200 active installs v0.3.7 PHP + WP 3.0.0+ Updated Dec 1, 2015
bladeenginelaraveltemplate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blade Safe to Use in 2026?

Generally Safe

Score 85/100

Blade has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'blade' plugin v0.3.7 exhibits a strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface from these common entry points. The code further demonstrates good practices with zero dangerous functions, 100% prepared SQL statements, and 100% properly escaped output. The absence of any recorded vulnerabilities, including CVEs, further solidifies its currently safe status.

However, there are a couple of areas that warrant attention. The plugin performs a single file operation, which could be a potential vector if not handled with extreme care, although the static analysis did not flag any specific issues related to this. More significantly, the plugin has zero nonce checks and zero capability checks. While the current analysis shows no unprotected entry points, this lack of built-in security checks means that if any new entry points were to be introduced in the future without proper authorization mechanisms, they could be immediately exploitable. This absence of fundamental security layers is a concern for future-proofing.

In conclusion, the 'blade' plugin v0.3.7 is currently very secure due to its minimal attack surface and good coding practices in SQL and output handling. The vulnerability history further reinforces this. The primary weakness lies in the absence of authorization checks like nonces and capability checks, which, while not an issue in the current configuration, represents a significant risk if the plugin evolves or if future updates introduce unforeseen vulnerabilities. It is recommended to implement these checks to ensure long-term security.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • File operations present
Vulnerabilities
None known

Blade Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Blade Release Timeline

v0.3.7Current
v0.3.2
v0.2.2
v0.1.1
v0.1.0
Code Analysis
Analyzed Mar 16, 2026

Blade Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

Blade Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actiontemplate_includeapplication\controllers\main-controller.php:30
filterindex_templateapplication\controllers\main-controller.php:33
filterpage_templateapplication\controllers\main-controller.php:36
filterbp_template_includeapplication\controllers\main-controller.php:39
Maintenance & Trust

Blade Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedDec 1, 2015
PHP min version
Downloads7K

Community Trust

Rating80/100
Number of ratings7
Active installs200
Developer Profile

Blade Developer Profile

Mikael Mattsson

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Blade

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blade/assets/js/blade.js/wp-content/plugins/blade/assets/css/blade.css
Script Paths
/wp-content/plugins/blade/assets/js/blade.js
Version Parameters
blade/assets/js/blade.js?ver=blade/assets/css/blade.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Blade