Blur Text Security & Risk Analysis

wordpress.org/plugins/blur-text

Blur Text with a shortcode. Unblur with a click or hover. Specify a blur color.

100 active installs v2.0.0 PHP + WP 3.9+ Updated Dec 29, 2024
blurblur-texthide-texthover
91
A · Safe
CVEs total1
Unpatched0
Last CVEJan 24, 2025
Safety Verdict

Is Blur Text Safe to Use in 2026?

Generally Safe

Score 91/100

Blur Text has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jan 24, 2025Updated 1yr ago
Risk Assessment

The blur-text plugin v2.0.0 presents a mixed security picture. On the positive side, the static analysis reveals excellent practices regarding SQL queries, with 100% using prepared statements, and all identified outputs are properly escaped. The absence of file operations and external HTTP requests further reduces the potential attack surface. However, the plugin has a documented history of vulnerabilities, specifically a medium-severity Cross-Site Scripting (XSS) issue. While this vulnerability is currently patched, its existence suggests potential weaknesses in input sanitization that may not have been fully addressed or could re-emerge in future versions. The limited attack surface with only one shortcode and no unprotected entry points is a strength, but the absence of nonce and capability checks on the shortcode is a concern, as it could be an entry point for certain attacks if user input is processed without proper validation. The taint analysis reporting zero flows is reassuring for current code but doesn't negate the historical XSS vulnerability. Overall, while the current code demonstrates good security habits, the past vulnerability and lack of specific security checks on the shortcode warrant careful consideration.

Key Concerns

  • Past medium severity XSS vulnerability
  • Missing nonce check on shortcode
  • Missing capability check on shortcode
Vulnerabilities
1 published

Blur Text Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-24627medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Blur Text <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

Jan 24, 2025 Patched in 2.0.0 (5d)
Version History

Blur Text Release Timeline

v2.0.0Current
v1.0.01 CVE
Code Analysis
Analyzed Mar 16, 2026

Blur Text Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Blur Text Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[blur] blur-text.php:50
WordPress Hooks 1
actionwp_enqueue_scriptsblur-text.php:58
Maintenance & Trust

Blur Text Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 29, 2024
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings4
Active installs100
Developer Profile

Blur Text Developer Profile

Linnea Huxford

1 plugin · 100 total installs

94
trust score
Avg Security Score
91/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect Blur Text

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blur-text/blur-text.js
Script Paths
/wp-content/plugins/blur-text/blur-text.js
Version Parameters
blur-text.js?ver=2.0.0

HTML / DOM Fingerprints

CSS Classes
blur_hoverblur_clickblur_nofallbackblur_hide
Shortcode Output
<span class="blur_hover" style="color:black"><span class="blur_click" style="color:black"><span class="blur_hover blur_nofallback" style="color:black"><span class="blur_click blur_nofallback" style="color:black">
FAQ

Frequently Asked Questions about Blur Text