C-Metric – Easy Block Editor Security & Risk Analysis

wordpress.org/plugins/easy-block-editor

The C-Metric Gutenberg Block plugin lets you add dynamic rich text blocks under "C-METRIC" for flexible and powerful content management on your site

0 active installs v1.0.1 PHP 7.4+ WP 5.0+ Updated Oct 1, 2024
blockcustom-blockdynamic-contentgutenbergrich-text
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is C-Metric – Easy Block Editor Safe to Use in 2026?

Generally Safe

Score 92/100

C-Metric – Easy Block Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'easy-block-editor' plugin v1.0.1 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events means there are no apparent direct entry points into the plugin's functionality for potential attackers to exploit. Furthermore, the code analysis reveals excellent security practices, with no dangerous functions, all SQL queries utilizing prepared statements, and all output being properly escaped. File operations, external HTTP requests, nonce checks, and capability checks are also absent, which, in this specific context of zero entry points, contributes to a secure design. The plugin also boasts a clean vulnerability history with no recorded CVEs, indicating a history of secure development or timely patching by the authors.

While the current analysis presents a highly secure profile, the primary concern stems from the complete lack of any detected entry points or security checks (nonces, capabilities). This could indicate an extremely minimal plugin that performs no dynamic actions, or it could mean the static analysis tools were unable to identify any, which is less likely given the comprehensive nature of the report. If the plugin is intended to have any interactive features, the complete absence of nonce and capability checks, while seemingly secure due to lack of entry points, would become a significant risk if any were later introduced or discovered. However, based *solely* on the provided data, the plugin appears to be exceptionally well-secured against common web vulnerabilities, with no exploitable attack surface and a clean history.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

C-Metric – Easy Block Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

C-Metric – Easy Block Editor Release Timeline

v1.0.1Current
Code Analysis
Analyzed Apr 16, 2026

C-Metric – Easy Block Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

C-Metric – Easy Block Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitincludes/easy_block_editor.php:9
actionblock_categories_allincludes/easy_block_editor.php:10
actioninittrunk/includes/easy_block_editor.php:9
actionblock_categories_alltrunk/includes/easy_block_editor.php:10
Maintenance & Trust

C-Metric – Easy Block Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 1, 2024
PHP min version7.4
Downloads893

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

C-Metric – Easy Block Editor Developer Profile

C-Metric

6 plugins · 550 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect C-Metric – Easy Block Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about C-Metric – Easy Block Editor