Blogroll Block Security & Risk Analysis

wordpress.org/plugins/blogroll-block

WordPress Blogroll, block edition

80 active installs v1.3.5 PHP 7.0.0+ WP 5.8.0+ Updated Mar 29, 2024
block
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Blogroll Block Safe to Use in 2026?

Generally Safe

Score 85/100

Blogroll Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "blogroll-block" v1.3.5 plugin exhibits a strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code signals indicate a lack of dangerous functions and file operations, and all SQL queries are properly prepared, which are excellent security practices. The plugin also has no recorded vulnerability history, suggesting a history of secure development and maintenance.

However, there are some areas for improvement that present minor concerns. The low percentage of properly escaped output (33%) suggests a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled with sufficient care in the remaining output contexts. The complete lack of nonce and capability checks, while mitigated by the minimal attack surface, would be a significant weakness if entry points were to be introduced in future versions or if hidden vulnerabilities exist. The absence of taint analysis data is also notable; while it may indicate no issues were found, it could also mean the analysis was not comprehensive or that more complex taint paths were not identified.

In conclusion, the plugin is currently in a very secure state with a minimal attack surface and good adherence to secure coding practices like prepared statements. The primary area of concern is the insufficient output escaping. The lack of historical vulnerabilities is a positive indicator. Addressing the output escaping and maintaining vigilance regarding potential future attack vectors and security checks would further solidify its security. The plugin's current score is high due to the lack of critical flaws, but the output escaping issue warrants attention.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Blogroll Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Blogroll Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

Blogroll Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitblogroll-block.php:23
filterpre_option_link_manager_enabledblogroll-block.php:55
Maintenance & Trust

Blogroll Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.0
Last updatedMar 29, 2024
PHP min version7.0.0
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Blogroll Block Developer Profile

Michael Beckwith

9 plugins · 370 total installs

94
trust score
Avg Security Score
91/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Blogroll Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blogroll-block/build/index.js/wp-content/plugins/blogroll-block/build/index.asset.php
Script Paths
/wp-content/plugins/blogroll-block/build/index.js
Version Parameters
blogroll-block/build/index.js?ver=

HTML / DOM Fingerprints

Data Attributes
roll_classroll_limit
Shortcode Output
<ul<ol
FAQ

Frequently Asked Questions about Blogroll Block