Bloglovin Widget Security & Risk Analysis

wordpress.org/plugins/bloglovin-widget

A Bloglovin' Widget for WordPress which automatically displays your total follower count.

10 active installs v1.3.0 PHP + WP 3.6+ Updated Sep 29, 2015
bloglovinbloglovin-buttonbuttonfollowerswidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bloglovin Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Bloglovin Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'bloglovin-widget' v1.3.0 plugin exhibits a seemingly strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, the code signals show no dangerous functions, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests. This suggests a well-contained and carefully written plugin in terms of these common entry points and sensitive operations.

However, a significant concern arises from the output escaping analysis, which indicates that 100% of the single output identified is not properly escaped. This is a critical weakness that could lead to Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website's frontend. The lack of taint analysis data and vulnerability history, while seemingly positive, provides no further insight into potential risks, leaving the unescaped output as the primary actionable security finding. While the plugin avoids many common pitfalls, the failure to escape output poses a direct and exploitable risk.

Key Concerns

  • 100% of identified outputs are not properly escaped
Vulnerabilities
None known

Bloglovin Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Bloglovin Widget Release Timeline

v1.2.0
Code Analysis
Analyzed Mar 16, 2026

Bloglovin Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Bloglovin Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioncustomize_registerinc\customizer.php:119
actioncustomize_preview_initinc\customizer.php:122
actionwp_headinc\customizer.php:160
Maintenance & Trust

Bloglovin Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 29, 2015
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Bloglovin Widget Developer Profile

pipdig

10 plugins · 80K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
353 days
View full developer profile
Detection Fingerprints

How We Detect Bloglovin Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bloglovin-widget/inc/customizer.js

HTML / DOM Fingerprints

CSS Classes
wp-bloglovin-widgetbloglovin-widget-style-1
HTML Comments
<!-- Bloglovin Widget --><!-- /Bloglovin Widget -->
FAQ

Frequently Asked Questions about Bloglovin Widget