Blinds Dark Mode Security & Risk Analysis

wordpress.org/plugins/blinds

Blinds gives you and your users the option to enable dark mode interface in WordPress blog or website.

10 active installs v0.0.7 PHP + WP 4.6+ Updated Unknown
dark-modedarkmodenight-modenightmode
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blinds Dark Mode Safe to Use in 2026?

Generally Safe

Score 100/100

Blinds Dark Mode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The plugin 'blinds' v0.0.7 exhibits a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code's adherence to prepared statements for all SQL queries and the lack of file operations or external HTTP requests are strong security practices. The complete absence of known CVEs and a clean vulnerability history indicate a well-maintained and secure plugin to date.

However, a significant concern arises from the lack of output escaping. With two total outputs and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data that is displayed to users and originates from user input or external sources could potentially be exploited. Additionally, the absence of nonce and capability checks on any potential, albeit currently nonexistent, entry points leaves room for future vulnerabilities if new features are introduced without proper security considerations. The lack of taint analysis flows is noted, but without any entry points or unsanitized paths identified, it doesn't currently indicate a problem, though it highlights that the plugin's functionality may be very limited.

In conclusion, while the plugin has excellent foundational security practices, the unescaped output is a critical weakness that needs immediate attention. The limited attack surface and clean vulnerability history are strong points, but the potential for XSS due to poor output escaping is a significant risk that outweighs these strengths. Addressing the output escaping is paramount to improving the plugin's overall security.

Key Concerns

  • Unescaped output found
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Blinds Dark Mode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Blinds Dark Mode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Blinds Dark Mode Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterthe_contentblinds.php:69
filterthe_excerptblinds.php:70
filterwoocommerce_before_shop_loopblinds.php:71
filterwoocommerce_before_single_productblinds.php:72
filterin_admin_headerblinds.php:75
Maintenance & Trust

Blinds Dark Mode Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Blinds Dark Mode Developer Profile

Ike Felix

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Blinds Dark Mode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blinds/blinds.js
Script Paths
/wp-content/plugins/blinds/blinds.js

HTML / DOM Fingerprints

Shortcode Output
<div style="position: fixed; top: 3rem; right: 3rem; z-index: 9999999999;" id="osd_blinds_widget_id"></div>
FAQ

Frequently Asked Questions about Blinds Dark Mode