Classic Widgets with Block-based Widgets Security & Risk Analysis

wordpress.org/plugins/classic-widgets-with-block-based-widgets

Restore the classic widgets screen as a new menu item without replacing new block-based widgets.

1K active installs v1.0.1 PHP 7.0+ WP 5.8+ Updated Apr 20, 2025
block-based-widgetsclassic-widgetsdisable-gutenberggutenberg-widgets
78
B · Generally Safe
CVEs total1
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is Classic Widgets with Block-based Widgets Safe to Use in 2026?

Mostly Safe

Score 78/100

Classic Widgets with Block-based Widgets is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Sep 22, 2025Updated 11mo ago
Risk Assessment

The static analysis of "classic-widgets-with-block-based-widgets" v1.0.1 reveals a generally strong security posture regarding its immediate attack surface and code hygiene. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal exposure through these common WordPress entry points. The code demonstrates excellent practices by exclusively using prepared statements for SQL queries and ensuring all outputs are properly escaped, with no detected file operations or external HTTP requests. Furthermore, the absence of critical or high severity taint analysis flows is a positive sign of secure coding.

However, a significant concern arises from the vulnerability history. The plugin has a known critical vulnerability that remains unpatched, specifically a "Missing Authorization" issue. This suggests that despite the current static analysis findings, there's a known exploit path that has not been addressed. The fact that this is the only known vulnerability, but it is critical and unpatched, indicates a potential for serious security breaches if exploited. While the current code seems clean, the historical vulnerability is a major red flag.

In conclusion, the plugin exhibits strengths in its current code quality and limited attack surface. However, the presence of an unpatched critical vulnerability, even if isolated, severely undermines its security. The "Missing Authorization" vulnerability is a serious threat that requires immediate attention, overshadowing the positive aspects of the static analysis. Users should exercise extreme caution until this critical vulnerability is resolved.

Key Concerns

  • Unpatched critical vulnerability
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
1

Classic Widgets with Block-based Widgets Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58029medium · 6.5Missing Authorization

Classic Widgets with Block-based Widgets <= 1.0.1 - Missing Authorization

Sep 22, 2025Unpatched
Code Analysis
Analyzed Mar 17, 2026

Classic Widgets with Block-based Widgets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Classic Widgets with Block-based Widgets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedclassic-and-block-widgets.php:30
filtergutenberg_use_widgets_block_editorclassic-and-block-widgets.php:40
filteruse_widgets_block_editorclassic-and-block-widgets.php:41
actionadmin_menuclassic-and-block-widgets.php:45
filtersubmenu_fileclassic-and-block-widgets.php:51
filterplugin_row_metaclassic-and-block-widgets.php:65
Maintenance & Trust

Classic Widgets with Block-based Widgets Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 20, 2025
PHP min version7.0
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs1K
Developer Profile

Classic Widgets with Block-based Widgets Developer Profile

Sumit Singh

3 plugins · 21K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
383 days
View full developer profile
Detection Fingerprints

How We Detect Classic Widgets with Block-based Widgets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
Classic Widgets
FAQ

Frequently Asked Questions about Classic Widgets with Block-based Widgets