Crosswinds Blocks Security & Risk Analysis

wordpress.org/plugins/crosswinds-blocks

Take your website to the next level with the Crosswinds Blocks plugin!

10 active installs v1.2.1 PHP 7.0+ WP 6.0+ Updated Unknown
accordionsblocksdesigngridtabs
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Crosswinds Blocks Safe to Use in 2026?

Generally Safe

Score 100/100

Crosswinds Blocks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of "crosswinds-blocks" v1.2.1 reveals a generally good security posture with no identified critical or high severity vulnerabilities in taint analysis. The plugin demonstrates strong adherence to secure coding practices by utilizing prepared statements for all its SQL queries and performing output escaping on a significant majority of its outputs. The absence of any known CVEs in its vulnerability history further strengthens this positive assessment, indicating a well-maintained and secure codebase.

However, there are a few areas that warrant attention. The plugin performs 17 file operations without explicit detail on their security implications, and a single external HTTP request could potentially be a vector if not properly validated or handled. The most significant concern is the complete absence of nonce checks for its entry points. Given the zero identified entry points (AJAX, REST API, shortcodes, cron events), this might not pose an immediate threat in the current version. However, it represents a significant weakness that could be exploited if any of these entry points are introduced or if the definition of an "entry point" in the analysis is limited. While the plugin has a capability check, the lack of nonces on all potential interaction points leaves it vulnerable to CSRF attacks if new interaction methods are added in the future.

In conclusion, "crosswinds-blocks" v1.2.1 appears to be a relatively secure plugin, with its strengths lying in its SQL handling and output escaping. The lack of known vulnerabilities and the absence of critical taint flows are commendable. The primary weakness lies in the absence of nonce checks, which, while not currently exploitable due to a limited attack surface, is a fundamental security best practice that should be addressed to ensure future resilience.

Key Concerns

  • 0 Nonce checks on entry points
  • 1 External HTTP requests
  • 84% Output escaping
Vulnerabilities
None known

Crosswinds Blocks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Crosswinds Blocks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
30
162 escaped
Nonce Checks
0
Capability Checks
1
File Operations
17
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

84% escaped192 total outputs
Attack Surface

Crosswinds Blocks Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 30
filtermime_typesadmin\importer\class-wp-import.php:53
filterimport_post_meta_keyadmin\importer\class-wp-import.php:73
filterhttp_request_timeoutadmin\importer\class-wp-import.php:74
actionplugins_loadedcrosswinds-blocks.php:74
actionplugins_loadedincludes\class-crosswinds-blocks.php:111
actioninitincludes\class-crosswinds-blocks.php:121
actioninitincludes\class-crosswinds-blocks.php:122
actionadmin_enqueue_scriptsincludes\class-crosswinds-blocks.php:132
actionadmin_enqueue_scriptsincludes\class-crosswinds-blocks.php:133
actionenqueue_block_editor_assetsincludes\class-crosswinds-blocks.php:134
actionadmin_menuincludes\class-crosswinds-blocks.php:135
actionadmin_initincludes\class-crosswinds-blocks.php:136
actioncrosswinds_framework_blocks_settingsincludes\class-crosswinds-blocks.php:137
actionuser_contactmethodsincludes\class-crosswinds-blocks.php:138
actionrest_api_initincludes\class-crosswinds-blocks.php:139
actionadmin_noticesincludes\class-crosswinds-blocks.php:140
actionwp_enqueue_scriptsincludes\class-crosswinds-blocks.php:150
actionwp_enqueue_scriptsincludes\class-crosswinds-blocks.php:151
actionpre_get_postsincludes\class-crosswinds-blocks.php:152
filterwp_theme_json_data_themeincludes\class-crosswinds-blocks.php:153
actionwp_headincludes\class-crosswinds-blocks.php:154
filterwp_kses_allowed_htmlincludes\class-crosswinds-blocks.php:155
actioninitincludes\class-crosswinds-blocks.php:165
actionblock_categories_allincludes\class-crosswinds-blocks.php:166
actionenqueue_block_editor_assetsincludes\class-crosswinds-blocks.php:167
actionwp_enqueue_scriptsincludes\class-crosswinds-blocks.php:168
actionrender_blockincludes\class-crosswinds-blocks.php:169
actionrender_blockincludes\class-crosswinds-blocks.php:170
actioninitincludes\class-crosswinds-blocks.php:180
actioninitincludes\class-crosswinds-blocks.php:181
Maintenance & Trust

Crosswinds Blocks Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedUnknown
PHP min version7.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Crosswinds Blocks Developer Profile

Jacob Martella

9 plugins · 230 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Crosswinds Blocks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/crosswinds-blocks/build/accordions//wp-content/plugins/crosswinds-blocks/build/accordion//wp-content/plugins/crosswinds-blocks/build/accordion-title//wp-content/plugins/crosswinds-blocks/build/accordion-body//wp-content/plugins/crosswinds-blocks/build/author-social-icons//wp-content/plugins/crosswinds-blocks/build/acf-block//wp-content/plugins/crosswinds-blocks/build/basic-grid//wp-content/plugins/crosswinds-blocks/build/basic-grid-item/+15 more

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Crosswinds Blocks