Custom Blocks Templates Security & Risk Analysis

wordpress.org/plugins/custom-blocks-templates

Create and set Gutenberg blocks templates for posts, pages and custom post types

20 active installs v1.3.2 PHP 7.2+ WP 5.0+ Updated May 16, 2023
blockdynamicfontawesomegutenbergtemplate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Blocks Templates Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Blocks Templates has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The plugin 'custom-blocks-templates' v1.3.2 exhibits a mixed security posture. On the positive side, the absence of known CVEs and the use of prepared statements for all SQL queries are strong indicators of good security practices and a history of reliable code. The static analysis reveals no direct attack surface through common entry points like AJAX, REST API, shortcodes, or cron events, and importantly, no direct calls to dangerous functions or file operations are identified. However, a significant concern arises from the output escaping, with only 46% of identified outputs being properly escaped. This suggests a potential for Cross-Site Scripting (XSS) vulnerabilities if the unescaped data is user-controllable or originates from untrusted sources. Furthermore, the taint analysis, while showing no critical or high severity issues, did identify 2 flows with unsanitized paths. This, coupled with the low output escaping percentage, warrants further investigation into how these unsanitized paths are handled to ensure they don't lead to exploitable conditions. The lack of explicit capability checks and nonce checks, while not immediately critical given the limited attack surface, could become a weakness if new entry points are introduced or if the plugin's functionality is extended without proper security controls in place. The bundled DataTables library, if outdated, could also introduce vulnerabilities, although this specific risk is not quantifiable from the provided data.

Key Concerns

  • Low output escaping percentage
  • Taint flows with unsanitized paths
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Custom Blocks Templates Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Blocks Templates Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

DataTables

Output Escaping

46% escaped28 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
check_block_password (blocks\private-block\index.php:13)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom Blocks Templates Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedblocks\accordion\index.php:6
actionplugins_loadedblocks\countdown\index.php:6
actionplugins_loadedblocks\csv-tables\index.php:6
actionadmin_post_check_block_passwordblocks\private-block\index.php:5
actionplugins_loadedblocks\private-block\index.php:56
actioninitblocks\social-share-item\index.php:142
Maintenance & Trust

Custom Blocks Templates Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedMay 16, 2023
PHP min version7.2
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs20
Developer Profile

Custom Blocks Templates Developer Profile

Sirvelia

7 plugins · 60 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Blocks Templates

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Blocks Templates