Custom Block Patterns Security & Risk Analysis

wordpress.org/plugins/custom-block-patterns

You can easily create your own block patterns and register them.

1K active installs v1.4.0 PHP 7.0+ WP 5.5+ Updated Jun 21, 2022
block-patternguternberg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Block Patterns Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Block Patterns has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "custom-block-patterns" plugin v1.4.0 exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any identified attack surface points, such as AJAX handlers, REST API routes, shortcodes, or cron events, significantly limits potential entry points for malicious actors. Furthermore, the code analysis reveals a complete lack of dangerous functions, all SQL queries are correctly prepared, and all output is properly escaped, indicating robust development practices. The absence of any recorded vulnerabilities or CVEs further bolsters this positive assessment, suggesting a history of secure development and maintenance.

While the plugin's current version appears to be highly secure, a primary concern stems from the complete lack of capability checks and nonce checks. Although the current analysis shows no exposed entry points, this could become a critical weakness if the plugin were to be extended or if new entry points were introduced in future versions without adequate security measures. The absence of taint analysis flows is also noted; while this indicates no issues were found, it might also suggest a lack of comprehensive taint analysis was performed. In conclusion, this plugin is currently in excellent standing regarding security, with its primary strength lying in its minimal attack surface and adherence to secure coding standards. The lack of critical or high-risk findings is commendable, making it a low-risk option as it stands, but future development should prioritize the inclusion of authentication and authorization checks.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Custom Block Patterns Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Block Patterns Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Custom Block Patterns Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedcustom-block-patterns.php:20
actioninitinc\gutenberg.php:9
actioninitinc\post_type.php:6
actionadmin_initinc\post_type.php:7
actioninitinc\taxonomy.php:6
filterrestrict_manage_postsinc\taxonomy.php:45
Maintenance & Trust

Custom Block Patterns Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJun 21, 2022
PHP min version7.0
Downloads16K

Community Trust

Rating94/100
Number of ratings3
Active installs1K
Developer Profile

Custom Block Patterns Developer Profile

Ryo

6 plugins · 135K total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect Custom Block Patterns

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-block-patterns/inc/gutenberg.php/wp-content/plugins/custom-block-patterns/inc/post_type.php/wp-content/plugins/custom-block-patterns/inc/taxonomy.php

HTML / DOM Fingerprints

REST Endpoints
/wp-json/wp/v2/loos-cbp
FAQ

Frequently Asked Questions about Custom Block Patterns