Load Combined Core Block Assets Security & Risk Analysis

wordpress.org/plugins/load-combined-core-block-assets

Temporary workaround for sites experiencing issues with WordPress 6.9's new ability to load block styles on demand in classic themes.

1K active installs v1.0.0 PHP 7.2+ WP 6.9+ Updated Dec 8, 2025
performance
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Load Combined Core Block Assets Safe to Use in 2026?

Generally Safe

Score 100/100

Load Combined Core Block Assets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The 'load-combined-core-block-assets' plugin version 1.0.0 demonstrates a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, SQL queries without prepared statements, unescaped output, file operations, external HTTP requests, or insecure nonce/capability checks on entry points is a significant positive. The zero-count for taint analysis flows with unsanitized paths further reinforces this. The plugin's vulnerability history is also clean, with no known CVEs, indicating a lack of past security issues. This suggests the developers have followed good security practices in its implementation. The primary concern, albeit a minor one due to the lack of other identified risks, is the complete absence of nonce and capability checks across all identified entry points. While the attack surface is currently zero, this pattern could become a concern if new entry points are added in future versions without proper authentication mechanisms. Overall, the plugin appears to be secure for version 1.0.0, but the lack of any authentication on its (currently non-existent) entry points warrants a slight cautionary note for future development.

Key Concerns

  • No nonce checks on any entry points
  • No capability checks on any entry points
Vulnerabilities
None known

Load Combined Core Block Assets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Load Combined Core Block Assets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Load Combined Core Block Assets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtershould_load_separate_core_block_assetsload-combined-core-block-assets.php:50
actionafter_setup_themeload-combined-core-block-assets.php:57
filterstyle_loader_tagload-combined-core-block-assets.php:100
Maintenance & Trust

Load Combined Core Block Assets Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 8, 2025
PHP min version7.2
Downloads2K

Community Trust

Rating100/100
Number of ratings6
Active installs1K
Developer Profile

Load Combined Core Block Assets Developer Profile

Weston Ruter

22 plugins · 437K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
4499 days
View full developer profile
Detection Fingerprints

How We Detect Load Combined Core Block Assets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Note: This combined block library stylesheet (wp-block-library) is used instead of loading separate core block styles because the should_load_separate_core_block_assets filter is returning false. Try loading the URL with ?should_load_separate_core_block_assets=true to restore being able to load block styles on demand and see if there are any issues remaining. -->
FAQ

Frequently Asked Questions about Load Combined Core Block Assets