Block Context Security & Risk Analysis

wordpress.org/plugins/block-context

Change Gutenberg block visibility for specific users.

70 active installs v0.1.0 PHP 5.3+ WP 3.0+ Updated May 7, 2021
blockblocksformattinggutenbergvisibility
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Block Context Safe to Use in 2026?

Generally Safe

Score 85/100

Block Context has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The 'block-context' plugin v0.1.0 exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code analysis reveals no dangerous functions, file operations, external HTTP requests, or bundled libraries, which are common sources of vulnerabilities. The adherence to prepared statements for all SQL queries and proper output escaping demonstrates excellent coding practices, mitigating risks related to data injection and cross-site scripting. The lack of any recorded vulnerabilities in its history further reinforces this positive assessment.

However, a key observation is the complete absence of any nonces, capability checks, or any form of authentication or permission checks across all entry points. While the current version has no exposed entry points, this lack of built-in security mechanisms presents a significant concern should the plugin's functionality evolve to include user-facing or administrative features in the future. This indicates a potential for future vulnerabilities if new entry points are introduced without proper security controls. In conclusion, the plugin is currently highly secure due to its minimal attack surface and clean coding. The primary area for improvement and a potential future risk lies in the complete lack of authentication and authorization checks.

Key Concerns

  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Block Context Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Block Context Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Block Context Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedblock-context.php:21
actionenqueue_block_editor_assetsphp\BlockContextPlugin.php:52
filterrender_blockphp\BlockContextPlugin.php:53
Maintenance & Trust

Block Context Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMay 7, 2021
PHP min version5.3
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs70
Developer Profile

Block Context Developer Profile

Kaspars

5 plugins · 50K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Block Context

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/block-context/js/dist/editor.js
Script Paths
/wp-content/plugins/block-context/js/dist/editor.js
Version Parameters
block-context/js/dist/editor.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Block Context