BLuR Security & Risk Analysis

wordpress.org/plugins/blur

BLuR - Blue Light "ur" Remover

10 active installs v1.0 PHP + WP 3.0.1+ Updated May 22, 2020
bluelighthealthyreadabilityremovesimple
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is BLuR Safe to Use in 2026?

Generally Safe

Score 85/100

BLuR has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "blur" v1.0 plugin exhibits a remarkably clean static analysis profile, indicating strong adherence to secure coding practices. The absence of dangerous functions, use of prepared statements for all SQL queries, and 100% output escaping are significant strengths. Furthermore, the lack of any external HTTP requests or file operations suggests a limited and well-contained functionality.

However, the complete absence of any entry points (AJAX, REST API, shortcodes, cron events) is unusual and might indicate that the plugin's functionality is not exposed to the WordPress environment in the typical ways, or perhaps that it's a very rudimentary plugin. More critically, the absence of any nonce checks or capability checks across all potential (though currently non-existent) entry points is a significant concern. While there are no entry points reported, if functionality were to be added or discovered later without these fundamental security checks, it could lead to serious vulnerabilities. The vulnerability history is also spotless, which is positive but, in conjunction with the lack of security checks, could simply mean the plugin hasn't been subjected to significant scrutiny or hasn't had features that would typically expose vulnerabilities added yet.

In conclusion, "blur" v1.0 scores highly on proactive security measures within its current codebase. The primary weakness lies in the potential for future vulnerabilities due to the lack of fundamental security checks (nonces, capabilities) on its limited, or potentially non-existent, attack surface. Its clean slate in vulnerability history is a positive indicator but should be viewed with caution given the potential for undiscovered issues or future risks if the plugin evolves without robust security implementations.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

BLuR Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

BLuR Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 16, 2026

BLuR Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

BLuR Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_footerblr.php:67
actionwp_footerblr.php:68
actionwp_footerblr.php:69
Maintenance & Trust

BLuR Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 22, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

BLuR Developer Profile

GeroNikolov

10 plugins · 220 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect BLuR

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
blr-filternooneveningnight
Shortcode Output
<div id='blr-filter'></div>
FAQ

Frequently Asked Questions about BLuR