BlockX Security & Risk Analysis

wordpress.org/plugins/blockx

Elevate your Gutenberg Block development experience.

30 active installs v1.10.3 PHP 8.1+ WP 5.0+ Updated Jul 1, 2024
blockdevelopergutenbergutils
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BlockX Safe to Use in 2026?

Generally Safe

Score 92/100

BlockX has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The blockx plugin version 1.10.3 demonstrates a generally positive security posture with several strong practices in place. The absence of any known CVEs, unpatched vulnerabilities, or critical/high severity taint flows is a significant strength, indicating a history of security awareness. The plugin also utilizes prepared statements for all its SQL queries and implements capability checks, which are crucial for secure WordPress development. However, there are areas that warrant attention and introduce some risk. The most notable concern is the relatively low percentage of properly escaped output (33%). This indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or dynamic content could be rendered without proper sanitization, allowing attackers to inject malicious scripts. Additionally, the lack of nonce checks on the single AJAX handler is a notable oversight. While the AJAX handler does have capability checks, the absence of nonce verification leaves it susceptible to Cross-Site Request Forgery (CSRF) attacks, where a user could be tricked into executing an action unintentionally. In conclusion, blockx has a good foundation with secure SQL handling and authorization checks, but the identified output escaping and AJAX nonce issues represent tangible risks that should be addressed to improve its overall security.

Key Concerns

  • Low percentage of properly escaped output
  • Missing nonce checks on AJAX handler
Vulnerabilities
None known

BlockX Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

BlockX Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
30
15 escaped
Nonce Checks
0
Capability Checks
7
File Operations
18
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

33% escaped45 total outputs
Attack Surface

BlockX Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_blockx_regenerate_containersclasses\Settings.php:16
WordPress Hooks 13
actioninitclasses\Assets.php:20
actionplugins_loadedclasses\BlockAssetsGenerator.php:23
actioninitclasses\Components\Plugin.php:77
actioninitclasses\Gutenberg.php:52
actionenqueue_block_editor_assetsclasses\Gutenberg.php:105
actionenqueue_block_assetsclasses\Gutenberg.php:128
actionplugins_loadedclasses\Headless.php:18
actionsave_postclasses\PostHooks.php:13
actiondelete_postclasses\PostHooks.php:14
actionrest_api_initclasses\REST.php:22
actionadmin_menuclasses\Settings.php:14
actionadmin_initclasses\Settings.php:15
actionadmin_initclasses\Update.php:14
Maintenance & Trust

BlockX Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJul 1, 2024
PHP min version8.1
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

BlockX Developer Profile

EdwardBock

22 plugins · 2K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
107 days
View full developer profile
Detection Fingerprints

How We Detect BlockX

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blockx/assets/dist/gutenberg.css/wp-content/plugins/blockx/assets/dist/gutenberg.js
Script Paths
/wp-content/plugins/blockx/assets/dist/gutenberg.js

HTML / DOM Fingerprints

CSS Classes
blockx
JS Globals
BlockX
REST Endpoints
/wp-json/blockx/
FAQ

Frequently Asked Questions about BlockX