Blocks for CiviCRM Security & Risk Analysis

wordpress.org/plugins/blocks-for-civicrm

Gutenberg block in place of CiviCRM shortcode

70 active installs v1.4.5 PHP + WP 5.4+ Updated Aug 21, 2025
blockcivicrmcrmgutenberg
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blocks for CiviCRM Safe to Use in 2026?

Generally Safe

Score 100/100

Blocks for CiviCRM has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The static analysis of the 'blocks-for-civicrm' plugin v1.4.5 reveals a generally strong security posture with no identified entry points that are unprotected. The absence of dangerous functions, external HTTP requests, and file operations is also a positive indicator. Furthermore, all SQL queries are properly prepared, which is a crucial defense against SQL injection vulnerabilities. The plugin also shows no known CVEs in its history, suggesting a history of responsible development and maintenance regarding security.

However, a significant concern arises from the output escaping. With only 50% of outputs properly escaped, there is a clear risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, if not handled carefully, could be injected into the frontend and executed by a user's browser. The lack of nonce checks and capability checks on potential, though not explicitly identified, entry points is also a weakness. While the current analysis shows no unprotected entry points, the absence of these fundamental WordPress security mechanisms leaves a gap that could be exploited if new entry points are introduced or if existing ones are found to be inadequately secured in the future.

In conclusion, while the plugin demonstrates good practices in preventing SQL injection and has a clean vulnerability history, the inadequate output escaping presents a notable risk of XSS. Developers should prioritize addressing the unescaped outputs to improve the plugin's overall security. The lack of specific checks like nonces and capability checks on what appear to be protected entry points is a point of attention for future development and auditing.

Key Concerns

  • Unescaped output identified
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Blocks for CiviCRM Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Blocks for CiviCRM Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

Blocks for CiviCRM Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedblocks-for-civicrm-plugin.php:14
actioninitinc\block_civicrm.php:11
actionadmin_noticesinc\block_civicrm.php:16
actionenqueue_block_editor_assetsinc\block_civicrm.php:38
Maintenance & Trust

Blocks for CiviCRM Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 21, 2025
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Blocks for CiviCRM Developer Profile

Bastien Ho

12 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
15 days
View full developer profile
Detection Fingerprints

How We Detect Blocks for CiviCRM

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blocks-for-civicrm/build/index.js/wp-content/plugins/blocks-for-civicrm/build/index.asset.php
Script Paths
/wp-content/plugins/blocks-for-civicrm/build/index.js
Version Parameters
blocks-for-civicrm/build/index.js?ver=blocks-for-civicrm/build/index.asset.php?ver=

HTML / DOM Fingerprints

JS Globals
wp
FAQ

Frequently Asked Questions about Blocks for CiviCRM