Extend Search Block Security & Risk Analysis

wordpress.org/plugins/extend-search-block

Extending WordPress Search block with search results modifier fields.

20 active installs v1.0.1 PHP 7.0+ WP 6.1+ Updated Dec 13, 2025
blockmodificationpost-typesearchtaxonomy
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Extend Search Block Safe to Use in 2026?

Generally Safe

Score 100/100

Extend Search Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The static analysis of the "extend-search-block" plugin version 1.0.1 reveals a strong adherence to secure coding practices. The plugin demonstrates an exceptionally low attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals are overwhelmingly positive, showing no dangerous functions, file operations, or external HTTP requests. All SQL queries utilize prepared statements, and all observed output is properly escaped. The complete absence of any taint analysis flows or vulnerability history further contributes to a positive security posture.

While the current data presents an ideal security profile, the complete lack of nonces and capability checks on its entry points (if any were discovered during a more in-depth analysis not fully reflected here) is a potential area of concern, as this could leave the plugin vulnerable to certain types of attacks if functionality were ever to be exposed through these channels without proper authorization. However, given the current analysis showing zero unprotected entry points, this concern is currently theoretical.

In conclusion, based on the provided static analysis and vulnerability history, the "extend-search-block" plugin version 1.0.1 exhibits a very secure design with excellent coding practices. The absence of known vulnerabilities and the robust handling of SQL queries and output escaping are significant strengths. The only potential weakness lies in the theoretical risk of unprotected entry points if they existed and were exploited, but the current data suggests this is not an active threat.

Key Concerns

  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Extend Search Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Extend Search Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped6 total outputs
Attack Surface

Extend Search Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionenqueue_block_editor_assetsincludes\Block.php:34
actionwp_enqueue_scriptsincludes\Block.php:36
filterrender_blockincludes\Block.php:40
filterrender_blockincludes\Block.php:41
filterrender_blockincludes\Block.php:42
filterregister_page_post_type_argsincludes\Block.php:44
Maintenance & Trust

Extend Search Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 13, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Extend Search Block Developer Profile

WebMan Design | Oliver Juhas

21 plugins · 14K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
2137 days
View full developer profile
Detection Fingerprints

How We Detect Extend Search Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/extend-search-block/blocks/search/mods.js/wp-content/plugins/extend-search-block/blocks/search/block.css
Script Paths
/wp-content/plugins/extend-search-block/blocks/search/mods.js
Version Parameters
extend-search-block/mods.js?ver=extend-search-block/block.css?ver=

HTML / DOM Fingerprints

CSS Classes
wp-block-search__select--wp-block-search__select
Data Attributes
data-post-typedata-taxonomy
JS Globals
wmdExtendSearchBlock
Shortcode Output
<input type="hidden" name="post_type[]"<select name="<option value=""
FAQ

Frequently Asked Questions about Extend Search Block