
Bloglovin Follow Security & Risk Analysis
wordpress.org/plugins/bloglovin-followAllows the user to display their Bloglovin Follow button in posts/pages/ custom post types or in a widget.
Is Bloglovin Follow Safe to Use in 2026?
Generally Safe
Score 85/100Bloglovin Follow has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The bloglovin-follow plugin v1.0 exhibits a mixed security posture, with some encouraging signs but significant areas of concern. On the positive side, the plugin has no known historical vulnerabilities (CVEs) and demonstrates good practice by using prepared statements for all SQL queries. Furthermore, the attack surface is minimal, with only one entry point (a shortcode) and no AJAX handlers or REST API routes exposed without authentication, and no cron events or file operations.
However, the static analysis reveals critical security flaws. The presence of the `create_function` is a major red flag, as it can be exploited for code injection if user input is not strictly sanitized. More alarmingly, 100% of the plugin's outputs are not properly escaped. This is a severe vulnerability that makes the plugin susceptible to Cross-Site Scripting (XSS) attacks, allowing attackers to inject malicious scripts into web pages viewed by users. The complete absence of nonce and capability checks, while not directly exploitable given the limited attack surface, represents a lack of defense-in-depth and could become a problem if the attack surface expands or is modified in future versions.
Given the lack of vulnerability history, it might indicate that this plugin hasn't been heavily targeted or extensively analyzed. However, the identified code signals, particularly the unescaped output and the use of `create_function`, represent immediate and significant risks that could be leveraged by attackers. The plugin's strengths in SQL handling and minimal attack surface are overshadowed by these critical output and code execution vulnerabilities. Users should exercise extreme caution with this plugin.
Key Concerns
- 100% of outputs are not properly escaped (XSS risk)
- Use of dangerous function: create_function (code injection risk)
- Missing nonce checks
- Missing capability checks
Bloglovin Follow Security Vulnerabilities
Bloglovin Follow Release Timeline
Bloglovin Follow Code Analysis
Dangerous Functions Found
Output Escaping
Bloglovin Follow Attack Surface
Shortcodes 1
WordPress Hooks 6
Maintenance & Trust
Bloglovin Follow Maintenance & Trust
Maintenance Signals
Community Trust
Bloglovin Follow Alternatives
Tea Page Content
tea-page-content
Plugin that allows create widget or shortcode with content of any post, and customize look of blocks via templates.
Display Posts – Easy lists, grids, navigation, and more
display-posts-shortcode
Add a listing of content on your website using a simple shortcode. Filter the results by category, author, and more.
Essential Widgets
essential-widgets
Essential Widgets is a WordPress plugin for widgets that allows you to create and add amazing widgets with high customization option
Posts in Page
posts-in-page
Easily add one or more posts to any page using simple shortcodes.
Per Page Sidebars
per-page-sidebars
The Per Page Sidebars (PPS) plugin allows blog administrators to create a unique sidebar for each Page. No template editing is required.
Bloglovin Follow Developer Profile
1 plugin · 40 total installs
How We Detect Bloglovin Follow
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/bloglovin-follow/bloglovin-follow-admin.cssHTML / DOM Fingerprints
[bloglovin-follow-button]