Conditional Block Visibility Security & Risk Analysis

wordpress.org/plugins/conditional-block-visibility

Manage block visibility based on user roles, login status, or device type.

0 active installs v1.0.3 PHP 7.4+ WP 5.8+ Updated Feb 28, 2025
block-visibilitydevice-typelogin-statususer-roles
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Conditional Block Visibility Safe to Use in 2026?

Generally Safe

Score 92/100

Conditional Block Visibility has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "conditional-block-visibility" plugin v1.0.3 exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly minimizes its attack surface, and critically, all identified entry points are either non-existent or properly authenticated. The code analysis reveals no dangerous functions, all SQL queries are prepared, and all output is properly escaped, indicating good development practices for data handling and presentation.

The lack of taint analysis findings and zero recorded vulnerabilities, including critical or high severity ones, further reinforces this positive assessment. The plugin's vulnerability history is clean, suggesting a history of secure development and maintenance. The presence of a capability check also indicates some level of access control is being considered. However, the absence of nonce checks is a minor concern, though its impact is mitigated by the very limited attack surface.

In conclusion, this plugin appears to be very secure. The primary strengths lie in its minimal attack surface and the absence of known vulnerabilities or critical code flaws. The only minor area for improvement would be the addition of nonce checks, even with its current limited entry points, to adhere to the most robust WordPress security standards.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

Conditional Block Visibility Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Conditional Block Visibility Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped4 total outputs
Attack Surface

Conditional Block Visibility Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionenqueue_block_editor_assetsconditional-block-visibility.php:68
filterrender_blockconditional-block-visibility.php:111
Maintenance & Trust

Conditional Block Visibility Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 28, 2025
PHP min version7.4
Downloads489

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Conditional Block Visibility Developer Profile

Sanad Qazi

2 plugins · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Conditional Block Visibility

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/conditional-block-visibility/assets/js/block-visibility.build.js/wp-content/plugins/conditional-block-visibility/assets/css/style.css
Script Paths
assets/js/block-visibility.build.js
Version Parameters
conditional-block-visibility/assets/js/block-visibility.build.js?ver=conditional-block-visibility/assets/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
cbv-visibility-desktopcbv-visibility-tabletcbv-visibility-mobile
Data Attributes
visibility
JS Globals
conditionalBlockVisibilityData
FAQ

Frequently Asked Questions about Conditional Block Visibility