Moby Blog Security & Risk Analysis

wordpress.org/plugins/moby-blog

Moby Blog - One APP for All Your Wordpress Blog! FREE! Are you a Blogger? Have a WordPress Blog? Turn it for free into a user friendly app for smartph …

10 active installs v1.1.6 PHP + WP 4.0+ Updated Mar 13, 2017
api-restfulljsonmobile-appmobyblogrestful
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Moby Blog Safe to Use in 2026?

Generally Safe

Score 85/100

Moby Blog has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The moby-blog plugin exhibits a mixed security posture. While the plugin has a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication or permission checks, significant concerns arise from the static code analysis. The presence of dangerous functions like `preg_replace` with the 'e' modifier and `unserialize` is a substantial risk. Furthermore, the taint analysis indicates that all analyzed flows involve unsanitized paths, which, although not classified as critical or high severity in this specific analysis, points to a systemic issue in input handling. The limited output escaping (only 22% properly escaped) further exacerbates these risks, as user-controlled data could be rendered insecurely. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator of past secure development. However, this clean history should not overshadow the clear code-level risks identified. The lack of clear indicators of dangerous functions or taint flows being actively exploited in the past might be due to its limited attack surface or that vulnerabilities were present but not publicly disclosed or exploited. The plugin's strengths lie in its minimal attack surface and lack of historical vulnerabilities, but its weaknesses are significant and related to insecure coding practices that could lead to vulnerabilities if exploited. The use of `preg_replace` with the 'e' modifier and `unserialize` without proper sanitization of the input data presents a high risk of remote code execution or denial-of-service vulnerabilities. Additionally, the prevalence of unsanitized paths in taint flows and the low percentage of properly escaped output indicate a general lack of secure coding discipline in handling user-provided data.

Key Concerns

  • Dangerous functions: preg_replace(/e)
  • Dangerous functions: unserialize
  • Taint analysis: All flows unsanitized paths
  • Output escaping: Low percentage properly escaped
  • SQL queries: Low percentage using prepared statements
Vulnerabilities
None known

Moby Blog Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Moby Blog Code Analysis

Dangerous Functions
3
Raw SQL Queries
2
6 prepared
Unescaped Output
62
17 escaped
Nonce Checks
6
Capability Checks
1
File Operations
8
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace("/\[\/eres-post.php:63
unserializereturn unserialize($cachedData[$key][$type]);res_cache.php:125
unserialize$results[$k] = unserialize($v['data']);res_cache.php:140

SQL Query Safety

75% prepared8 total queries

Output Escaping

22% escaped79 total outputs
Data Flows
11 unsanitized

Data Flow Analysis

11 flows11 with unsanitized paths
buildScreen (singletons\api.php:92)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Moby Blog Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actionadmin_noticesres-json-api.php:41
actionadmin_noticesres-json-api.php:45
filterrewrite_rules_arrayres-json-api.php:48
filterrewrite_rules_arrayres-json-api.php:81
actioninitres-json-api.php:118
actioninitres-json-api.php:122
filterquery_varsres-json-api.php:130
filterquery_varsres-json-api.php:137
filterquery_varsres-json-api.php:144
actionparse_requestres-json-api.php:151
actionadmin_enqueue_scriptsres-json-api.php:175
actiontemplate_redirectsingletons\api.php:17
actionadmin_menusingletons\api.php:18
actionupdate_option_res_json_api_basesingletons\api.php:19
actionpre_update_option_res_json_api_controllerssingletons\api.php:20
filterposts_wheresingletons\introspector.php:382
filterposts_wheresingletons\introspector.php:388
filterquery_varssingletons\query.php:16
actionwp_enqueue_scriptssingletons\resBanners.php:18
actionwp_headsingletons\resBanners.php:19
Maintenance & Trust

Moby Blog Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMar 13, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Moby Blog Developer Profile

Restart Labs Srls

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Moby Blog

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/moby-blog/singletons/data/resjsfunc.js/wp-content/plugins/moby-blog/lib/smart-app-banner.css/wp-content/plugins/moby-blog/lib/smart-app-banner.js/wp-content/plugins/moby-blog/lib/config.js/wp-content/plugins/moby-blog/assets/icon.png
Script Paths
/wp-content/plugins/moby-blog/singletons/data/resjsfunc.js/wp-content/plugins/moby-blog/lib/smart-app-banner.js/wp-content/plugins/moby-blog/lib/config.js

HTML / DOM Fingerprints

CSS Classes
res-json-api-warning
JS Globals
resBannersConfig
REST Endpoints
/wp-json/res-api
FAQ

Frequently Asked Questions about Moby Blog