Block Referers Security & Risk Analysis

wordpress.org/plugins/block-referers

Block unwanted visitors from viewing your WordPress site.

10 active installs v1.0.0 PHP + WP 4.2+ Updated Apr 20, 2020
analyticsanalytics-spamanti-referralanti-referreranti-spam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Block Referers Safe to Use in 2026?

Generally Safe

Score 85/100

Block Referers has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'block-referers' plugin version 1.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, file operations, or external HTTP requests is commendable. Furthermore, the plugin implements nonce and capability checks, which are crucial for protecting against common WordPress vulnerabilities. The total absence of any known CVEs, either historical or currently unpatched, further reinforces this positive security assessment.

However, there is a minor concern regarding output escaping. While most outputs are properly escaped, 33% are not, which could potentially lead to cross-site scripting (XSS) vulnerabilities if the unescaped data originates from untrusted sources. The taint analysis showing zero unsanitized paths is a significant positive, indicating that even if data were to reach an output, it's unlikely to be malicious. The minimal attack surface with zero unprotected entry points is a major strength.

In conclusion, 'block-referers' v1.0.0 appears to be a secure plugin with excellent development practices in place. The main area for improvement is ensuring all outputs are consistently escaped to eliminate any residual risk of XSS. Given the lack of any critical or high-severity issues and the plugin's robust security history, the overall risk is low.

Key Concerns

  • Percentage of unescaped output
Vulnerabilities
None known

Block Referers Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Block Referers Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface

Block Referers Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedincludes\class-block-referers.php:139
actionadmin_menuincludes\class-block-referers.php:161
actionsend_headersincludes\class-block-referers.php:182
Maintenance & Trust

Block Referers Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 20, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Block Referers Developer Profile

Ethan Allen

2 plugins · 410 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Block Referers

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Block Referers