Forty Two Blocks Security & Risk Analysis

wordpress.org/plugins/forty-two-blocks

Enhance your WordPress block editor (Gutenberg) content creation experience with our free blocks!

0 active installs v0.2.0 PHP + WP + Updated Sep 24, 2019
blocksgutenberg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Forty Two Blocks Safe to Use in 2026?

Generally Safe

Score 85/100

Forty Two Blocks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The forty-two-blocks plugin, version 0.2.0, presents a generally strong security posture based on the static analysis. The absence of any discovered AJAX handlers, REST API routes, shortcodes, or cron events with exposed attack vectors is a significant positive. Furthermore, the code's adherence to using prepared statements for all SQL queries and a high percentage of properly escaped output are excellent security practices. The plugin also demonstrates no known vulnerabilities, a testament to its current security state and development history.

However, there are a few areas that warrant attention. The presence of file operations, while not inherently problematic, should be carefully reviewed to ensure no sensitive operations are exposed or mishandled. The complete lack of nonce checks and capability checks across all identified entry points (even though the entry point count is zero) is a notable concern. If any entry points were to be introduced or discovered in the future, the absence of these fundamental security mechanisms would immediately create vulnerabilities. The plugin's limited functionality and early version might contribute to its clean bill of health, but future development should prioritize incorporating these essential security layers as the plugin evolves.

In conclusion, forty-two-blocks v0.2.0 is currently a secure plugin with a minimal attack surface and good coding practices regarding SQL and output sanitization. Its vulnerability history is spotless. The primary area for improvement lies in proactively implementing nonce and capability checks, which would further harden the plugin against potential future threats and ensure robust security as its functionality expands.

Key Concerns

  • File operations present without explicit checks
  • 0 Nonce checks on entry points
  • 0 Capability checks on entry points
Vulnerabilities
None known

Forty Two Blocks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Forty Two Blocks Release Timeline

v0.2.0Current
Code Analysis
Analyzed Mar 17, 2026

Forty Two Blocks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
31 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

91% escaped34 total outputs
Attack Surface

Forty Two Blocks Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_enqueue_scriptsforty-two-blocks.php:58
actionadmin_enqueue_scriptsforty-two-blocks.php:59
actionadmin_print_scriptsforty-two-blocks.php:60
actioninitforty-two-blocks.php:147
Maintenance & Trust

Forty Two Blocks Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedSep 24, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Forty Two Blocks Developer Profile

WP Zone

22 plugins · 40K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
124 days
View full developer profile
Detection Fingerprints

How We Detect Forty Two Blocks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/forty-two-blocks/css/common.css/wp-content/plugins/forty-two-blocks/js/common.js/wp-content/plugins/forty-two-blocks/js/strings/strings-0.1.4-en_US.js/wp-content/plugins/forty-two-blocks/js/strings/strings.js/wp-content/plugins/forty-two-blocks/js/admin.js/wp-content/plugins/forty-two-blocks/css/admin.css
Script Paths
https://use.fontawesome.com/releases/v5.2.0/js/all.js
Version Parameters
forty-two-blocks/css/common.css?ver=forty-two-blocks/js/common.js?ver=forty-two-blocks/js/strings/strings-0.1.4-en_US.js?ver=forty-two-blocks/js/strings/strings.js?ver=forty-two-blocks/js/admin.js?ver=forty-two-blocks/css/admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
aspengrove-blocks-commonaspengrove-blocks-admin
HTML Comments
Copyright (C) 2019 Aspen Grove StudiosParts of this plugin are based on WordPress and the Gutenberg plugin, both part of the WordPress project, copyright 2011-2018 by the contributors. Licensed under the GNU General Public License (GPL), version 2 or later. See the license.txt file in the plugin's root directory for the text of the GPL, version 3. This plugin includes the FlexSlider library; see copyright and licensing info in js/flexslider/jquery.flexslider.js and js/flexslider/LICENSE.md. Credits for individual blocks can be found in each block's PHP file (where applicable) in the blocks/ directory.The following lines are copied from the Forty Two Theme, inc/library/fonts/class-font-customize-control.php May include code copied from WordPress by Automattic, licensed under the GNU General Public License version 2 or higher. Licensed under GNU General Public License version 3 or higher in this project. See license.txt file in the plugin's root directory for license text. Code modified by Aspen Grove Studios, Felix Arntz, and/or Jonathan Hall 2019-09-24 and/or earlier.End code copied from the Forty Two Theme
Data Attributes
data-aspengrove-block-iddata-aspengrove-block-name
JS Globals
aspengrove_blocks_dynamicInspectorControlOptionsaspengrove_blocks_font_data
FAQ

Frequently Asked Questions about Forty Two Blocks