Diviner Blocks Security & Risk Analysis

wordpress.org/plugins/diviner-blocks

Custom Gutenberg Blocks for Diviner WordPress Theme providing added functionality to create better content.

10 active installs v1.0 PHP 5.3+ WP 5.1+ Updated Nov 8, 2020
blocksdivinergutenberg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Diviner Blocks Safe to Use in 2026?

Generally Safe

Score 85/100

Diviner Blocks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The diviner-blocks plugin v1.0 demonstrates a strong static security posture. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis reveals no dangerous functions, no direct SQL queries (all are prepared), no file operations, and no external HTTP requests. The lack of known vulnerabilities in its history is also a positive indicator of its security maturity.

However, a critical concern arises from the output escaping. With one total output and 0% properly escaped, this indicates a high likelihood of cross-site scripting (XSS) vulnerabilities. Any data displayed to users that originates from potentially untrusted sources without proper sanitization can be exploited. The absence of capability checks and nonce checks, while not immediately concerning due to the lack of entry points, could become a significant risk if future versions introduce new features that expose these functionalities without adequate protection.

Overall, while the plugin currently has a very low attack surface and a clean vulnerability history, the unescaped output represents a serious potential weakness. Addressing the output escaping is paramount to mitigating the immediate XSS risk. Future development should prioritize implementing proper capability and nonce checks if new user-interactive features are added.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

Diviner Blocks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Diviner Blocks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Diviner Blocks Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
filterblock_categoriesinc\block_category.php:18
actioninitinc\block_setup.php:66
actionadmin_noticesinc\demo_import.php:12
filterpt-ocdi/import_filesinc\demo_import.php:42
actionadmin_noticesinc\notice.php:12
actionafter_setup_themeinc\plugin_setup.php:14
actionadmin_enqueue_scriptsinc\plugin_setup.php:21
actionadmin_menuinc\plugin_setup.php:30
Maintenance & Trust

Diviner Blocks Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedNov 8, 2020
PHP min version5.3
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Diviner Blocks Developer Profile

indithemes

10 plugins · 890 total installs

90
trust score
Avg Security Score
94/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Diviner Blocks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/diviner-blocks/styles/css/admin.css

HTML / DOM Fingerprints

CSS Classes
diviner-theme-optionsdiviner-admin-page-titlediviner-important-links-titlediviner-important-linkscustom_linkbutton-documentationbutton-theme-pagebutton-contact-us+1 more
Data Attributes
data-hrefdata-tabsdata-widthdata-heightdata-small-headerdata-adapt-container-width+2 more
JS Globals
DIVINER_URLDIVINER_PATH
FAQ

Frequently Asked Questions about Diviner Blocks