Display Remote Posts Block Security & Risk Analysis

wordpress.org/plugins/display-remote-posts-block

Block to display recent posts from a WordPress or Blogger blog.

800 active installs v1.1.4 PHP 5.6.3+ WP 5.0+ Updated Jan 12, 2026
blockblogbloggerjetpackrss
99
A · Safe
CVEs total1
Unpatched0
Last CVEMay 7, 2025
Download
Safety Verdict

Is Display Remote Posts Block Safe to Use in 2026?

Generally Safe

Score 99/100

Display Remote Posts Block has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: May 7, 2025Updated 2mo ago
Risk Assessment

The "display-remote-posts-block" plugin, in version 1.1.4, presents a mixed security posture. On the positive side, the code adheres to several good security practices. It shows a high percentage of properly escaped output, uses prepared statements exclusively for SQL queries, and includes nonce checks. The absence of critical or high severity taint flows and dangerous functions is also encouraging, suggesting a generally well-written codebase in these areas. However, a significant concern is the presence of an unprotected AJAX handler. This single unprotected entry point can be a gateway for attackers to exploit functionalities without proper authentication or authorization, especially given the plugin's external HTTP request capability.

The vulnerability history indicates a past medium severity SSRF vulnerability. While there are no currently unpatched CVEs, the past occurrence of SSRF, combined with the unprotected AJAX handler and the plugin's ability to make external HTTP requests, raises a flag. This pattern suggests a potential for similar vulnerabilities if not diligently reviewed and secured. The plugin has a relatively small attack surface, which is a strength, but the single unprotected entry point is a critical weakness within that surface.

In conclusion, while the plugin demonstrates good practices in many areas of code security, the unprotected AJAX handler is a critical flaw that demands immediate attention. The past SSRF vulnerability, although patched, warrants caution. Developers should prioritize securing this AJAX handler and thoroughly audit the code related to external HTTP requests to prevent future vulnerabilities.

Key Concerns

  • Unprotected AJAX handler
  • Past medium severity SSRF vulnerability
  • External HTTP requests
Vulnerabilities
1

Display Remote Posts Block Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-47484medium · 6.4Server-Side Request Forgery (SSRF)

Display Remote Posts Block <= 1.1.0 - Authenticated (Contributor+) Server-Side Request Forgery

May 7, 2025 Patched in 1.1.1 (7d)
Code Analysis
Analyzed Mar 16, 2026

Display Remote Posts Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
153 escaped
Nonce Checks
1
Capability Checks
6
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

97% escaped157 total outputs
Attack Surface
1 unprotected

Display Remote Posts Block Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_dismiss_drpb_notice_handlerdisplay-remote-posts-block.php:43
WordPress Hooks 6
actioninitdisplay-remote-posts-block.php:29
actiondisplay_remote_posts_block_crondisplay-remote-posts-block.php:30
actionadmin_noticesdisplay-remote-posts-block.php:42
filterplugin_row_metadisplay-remote-posts-block.php:44
actionadmin_noticesdisplay-remote-posts-block.php:779
filterplugin_row_metaincludes\class-drpb-common.php:293

Scheduled Events 1

display_remote_posts_block_cron
Maintenance & Trust

Display Remote Posts Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 12, 2026
PHP min version5.6.3
Downloads15K

Community Trust

Rating0/100
Number of ratings0
Active installs800
Developer Profile

Display Remote Posts Block Developer Profile

Oliver Campion

12 plugins · 43K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
869 days
View full developer profile
Detection Fingerprints

How We Detect Display Remote Posts Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/display-remote-posts-block/build/index.js
Script Paths
/wp-content/plugins/display-remote-posts-block/build/index.js
Version Parameters
display-remote-posts-block/build/index.asset.php

HTML / DOM Fingerprints

CSS Classes
wp-block-display-remote-postswp-block-display-remote-posts__inner-containerwp-block-post-date
Data Attributes
target="_blank"
Shortcode Output
<div class="wp-block-display-remote-posts wp-block-display-remote-posts__inner-container">
FAQ

Frequently Asked Questions about Display Remote Posts Block