
Double Image for Gutenberg Security & Risk Analysis
wordpress.org/plugins/double-imageA custom block designed to insert two images side by side or stacked with optional overlay text.
Is Double Image for Gutenberg Safe to Use in 2026?
Generally Safe
Score 85/100Double Image for Gutenberg has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The double-image plugin v1.2.1 demonstrates a strong security posture based on the provided static analysis. The plugin has a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no known vulnerabilities or CVEs associated with this plugin, nor any history of past security issues. This lack of vulnerabilities and a well-controlled attack surface suggests a development team that is likely security-conscious.
However, a closer look at the code signals reveals a minor area for improvement. While the plugin performs a good job with output escaping (78% properly escaped), there is still a percentage of output that is not being properly sanitized. This, combined with the presence of one nonce check and four capability checks, indicates that while the plugin does implement some security measures, there's a slight potential for information leakage or unauthorized actions if these checks are not consistently applied or if the unescaped outputs are in sensitive contexts. Taint analysis reported zero flows, which is a very positive sign, suggesting that data entered into the plugin is not being improperly propagated in a way that could lead to vulnerabilities.
In conclusion, the double-image plugin v1.2.1 appears to be a relatively safe plugin due to its minimal attack surface and clean vulnerability history. The most significant area to monitor would be the 22% of output that is not properly escaped, as this could present a minor risk if exploited. Overall, the strengths in attack surface management and lack of known vulnerabilities outweigh the minor concerns.
Key Concerns
- Unescaped output detected
Double Image for Gutenberg Security Vulnerabilities
Double Image for Gutenberg Code Analysis
Output Escaping
Double Image for Gutenberg Attack Surface
WordPress Hooks 11
Maintenance & Trust
Double Image for Gutenberg Maintenance & Trust
Maintenance Signals
Community Trust
Double Image for Gutenberg Alternatives
Kadence Blocks — Page Builder Toolkit for Gutenberg Editor
kadence-blocks
20+ AI-powered Gutenberg Blocks with endless options, enabling top-notch efficiency for high-performance dynamic website creation.
Page Builder: Pagelayer – Drag and Drop website builder
pagelayer
The most advanced frontend drag & drop page builder. Pagelayer is a light weight but extremely powerful Website Builder.
Page Builder Gutenberg Blocks – CoBlocks
coblocks
CoBlocks is a suite of page builder WordPress blocks for Gutenberg, with 10+ new blocks and a true page builder experience with rows and columns.
Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE
otter-blocks
Quickly create WordPress pages with 20+ blocks, 100+ ready-to-import designs, and advanced editor extensions. It’s website building, Lego-style!
Stackable – Page Builder Gutenberg Blocks
stackable-ultimate-gutenberg-blocks
Custom Blocks that transform your WordPress Block Editor into a page builder
Double Image for Gutenberg Developer Profile
15 plugins · 2K total installs
How We Detect Double Image for Gutenberg
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/double-image/dist/blocks.style.build.css/wp-content/plugins/double-image/dist/blocks.editor.build.css/wp-content/plugins/double-image/dist/blocks.build.js/wp-content/plugins/double-image/dist/blocks.build.jsdouble-image-style?ver=double-image-editor?ver=double-image-editor?ver=time()HTML / DOM Fingerprints
double_image_editor_config