Dynamic Tables Security & Risk Analysis

wordpress.org/plugins/dynamic-table-blocks

Responsive table blocks with intuitive keyboard navigation, familiar spreadsheet-style interactions, and advanced formatting.

0 active installs v1.2.5 PHP 8.0+ WP 6.1+ Updated Apr 10, 2026
data-tablegutenberg-tableresponsive-tablestable-blocktables
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Dynamic Tables Safe to Use in 2026?

Generally Safe

Score 100/100

Dynamic Tables has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "dynamic-table-blocks" v1.2.5 plugin exhibits a generally strong security posture with several positive indicators. The plugin's reliance on prepared statements for all SQL queries is excellent, and a high percentage of output escaping (90%) demonstrates good defensive coding practices. The presence of numerous capability checks (17) and nonce checks (3) further strengthens its security by validating user permissions and preventing CSRF attacks. The attack surface is minimal and appears to be protected, with no exposed AJAX handlers or REST API routes without proper authentication checks.

However, a few areas warrant attention. The presence of a dangerous function, `set_time_limit`, is a potential concern, as it could be exploited in certain scenarios to extend script execution time, potentially leading to resource exhaustion or denial-of-service conditions if not carefully managed. Furthermore, the taint analysis revealed one flow with an unsanitized path, indicating a potential weakness where user-supplied input could influence file operations or other sensitive actions without proper validation. While there are no known historical vulnerabilities, the presence of these code signals suggests that vigilance is still required.

In conclusion, the plugin is built on a solid foundation of secure coding practices, particularly regarding database interactions and output handling. The minimal and protected attack surface is a significant strength. The primary areas for improvement are the careful review and potential mitigation of the `set_time_limit` function and the thorough sanitization of the identified unsanitized path in the taint analysis to completely eliminate potential risks.

Key Concerns

  • Unsanitized path in taint analysis
  • Use of dangerous function set_time_limit
Vulnerabilities
None known

Dynamic Tables Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Dynamic Tables Release Timeline

v1.2.5Current
v1.2.4
v1.2.3
v1.2.2
v1.2.1
v1.2.0
v1.1.1
v1.1.0
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

Dynamic Tables Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
34 prepared
Unescaped Output
9
78 escaped
Nonce Checks
3
Capability Checks
17
File Operations
9
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

set_time_limit@set_time_limit( 0 );includes/admin/admin.php:397

SQL Query Safety

100% prepared34 total queries

Output Escaping

90% escaped87 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
handle_form (includes/admin/admin.php:167)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Dynamic Tables Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_dtbk_view_tableincludes/admin/admin-dtbk-ajax.php:19
WordPress Hooks 11
actionrest_api_initdynamic-table-blocks.php:141
actioninitdynamic-table-blocks.php:144
actioninitdynamic-table-blocks.php:147
actionadmin_headincludes/admin/admin-list-dynamic-table-blocks.php:35
actionadmin_menuincludes/admin/admin.php:25
actionadmin_post_dtbk_export_downloadincludes/admin/admin.php:27
actionadmin_enqueue_scriptsincludes/admin/admin.php:90
filtercron_schedulesincludes/maintenance.php:114
actionwp_after_insert_postincludes/maintenance.php:121
actionbefore_delete_postincludes/maintenance.php:124
actionwp_after_insert_postincludes/maintenance.php:424
Maintenance & Trust

Dynamic Tables Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 10, 2026
PHP min version8.0
Downloads539

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Dynamic Tables Developer Profile

myfamilyweb

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dynamic Tables

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dynamic-table-blocks/build/index.js/wp-content/plugins/dynamic-table-blocks/build/style-index.css
Script Paths
/wp-content/plugins/dynamic-table-blocks/build/index.js
Version Parameters
dynamic-table-blocks/build/index.js?ver=dynamic-table-blocks/build/style-index.css?ver=

HTML / DOM Fingerprints

CSS Classes
dtbk-table-container
HTML Comments
<!-- Dynamic Table Block -->
Data Attributes
data-dtbk-iddata-dtbk-settings
JS Globals
wp.blocks.registerBlockTypewp.element.createElementwp.editor.InspectorControlswp.components.PanelBodywp.components.TextControlwp.components.TextareaControl+33 more
REST Endpoints
/wp-json/dynamic-table-blocks/v1/tables
FAQ

Frequently Asked Questions about Dynamic Tables