Experience Block Security & Risk Analysis

wordpress.org/plugins/experience-block

Showcase professional experience with a WordPress block having title, company name, date and description, inspired by LinkedIn's experience section.

0 active installs v1.0.0 PHP 7.4+ WP 6.6+ Updated Mar 16, 2025
blockblocksexperienceprofessional-experience
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Experience Block Safe to Use in 2026?

Generally Safe

Score 92/100

Experience Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of the "experience-block" v1.0.0 plugin reveals a strong initial security posture. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with open attack surfaces significantly reduces the plugin's potential for external exploitation. Furthermore, the code signals indicate good development practices, with no dangerous functions used, all SQL queries being prepared, and output being properly escaped. The lack of file operations, external HTTP requests, and the absence of any taint flows with unsanitized paths further bolster this positive assessment.

While the plugin demonstrates excellent foundational security, the absence of any recorded vulnerability history, including CVEs, is notable. This could indicate either a well-developed and rigorously tested plugin or a lack of widespread use that has historically made it a less attractive target for attackers. However, it's important to note that the static analysis also shows zero nonce checks and zero capability checks. While there are currently no entry points that *require* these checks based on the static analysis, the absence of these security mechanisms in the codebase itself represents a potential weakness if new functionalities that introduce attack surfaces are added in future versions without implementing them.

Key Concerns

  • Missing nonce checks in codebase
  • Missing capability checks in codebase
Vulnerabilities
None known

Experience Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Experience Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Experience Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitexperience-block.php:36
Maintenance & Trust

Experience Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 16, 2025
PHP min version7.4
Downloads276

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Experience Block Developer Profile

Bunty

12 plugins · 250 total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Experience Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/experience-block/build/experience-box//wp-content/plugins/experience-block/build/experience-item/
Script Paths
/wp-content/plugins/experience-block/build/experience-box.js/wp-content/plugins/experience-block/build/experience-item.js
Version Parameters
experience-block/build/experience-box.js?ver=experience-block/build/experience-item.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Experience Block