Code Blocks Security & Risk Analysis

wordpress.org/plugins/code-blocks

Add Code Blocks to your posts and pages. Customize the code blocks and add custom CSS to the WordPress Visual Editor.

30 active installs v0.3 PHP + WP 3.0.1+ Updated Apr 24, 2015
blockscodepagespost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Code Blocks Safe to Use in 2026?

Generally Safe

Score 85/100

Code Blocks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis for code-blocks v0.3 reveals a plugin with a seemingly strong security posture. There are no identified entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication checks. Furthermore, the code signals indicate a lack of dangerous functions, all SQL queries utilize prepared statements, and all outputs are properly escaped. There are also no file operations, external HTTP requests, or missing nonce/capability checks evident in the static analysis. The taint analysis also shows no identified unsanitized paths. The vulnerability history is clean, with zero recorded CVEs of any severity, indicating no known past security weaknesses.

While the static analysis and vulnerability history are highly reassuring, it's important to note the complete absence of any identified attack surface or specific code signals. This could mean the plugin is extremely simple and performs no complex operations, or it could indicate limitations in the static analysis tool itself. The lack of any identified entry points or sensitive operations means there are no specific vulnerabilities to deduct points for. However, in real-world scenarios, even simple plugins can sometimes have unforeseen interactions or vulnerabilities. The current assessment is based solely on the provided data and suggests a very low immediate risk.

Vulnerabilities
None known

Code Blocks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Code Blocks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Code Blocks Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Code Blocks Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedApr 24, 2015
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

Code Blocks Developer Profile

subins2000

3 plugins · 60 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Code Blocks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/code-blocks/editor-style.css
Script Paths
/wp-content/plugins/code-blocks/button.php

HTML / DOM Fingerprints

JS Globals
QTags
FAQ

Frequently Asked Questions about Code Blocks