Block used images Security & Risk Analysis

wordpress.org/plugins/block-used-images

Modern Tribe Events is a great plugin.

0 active installs v1.0 PHP + WP 4.6+ Updated Jul 24, 2017
eventsmodern-tribe-event
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Block used images Safe to Use in 2026?

Generally Safe

Score 85/100

Block used images has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "block-used-images" plugin version 1.0 presents a generally strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis indicates no dangerous functions, external HTTP requests, or file operations, and all detected SQL queries are properly prepared. This suggests a thoughtful approach to security by the developers in these areas.

However, a notable concern arises from the output escaping. With one total output analyzed and 0% properly escaped, this indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users, if not properly sanitized, could be exploited by attackers. The absence of nonce and capability checks also means that if any hidden entry points were to be discovered or introduced in future versions, they might be unprotected. The clean vulnerability history is a positive sign, but it does not negate the immediate risks identified in the code analysis.

In conclusion, while the plugin's limited attack surface and secure handling of SQL and external requests are commendable, the lack of output escaping is a critical weakness that requires immediate attention. Developers should prioritize implementing proper output sanitization to prevent potential XSS attacks. The absence of any found vulnerabilities in the history is encouraging, suggesting a potentially responsible development team, but the current code analysis highlights a specific, exploitable flaw.

Key Concerns

  • Unescaped output found
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Block used images Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Block used images Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Block used images Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionsave_postblock-used-images.php:50
actionadmin_noticesblock-used-images.php:56
Maintenance & Trust

Block used images Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedJul 24, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Block used images Developer Profile

dessainsaraiva

3 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Block used images

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
error
FAQ

Frequently Asked Questions about Block used images