Opening Block Security & Risk Analysis

wordpress.org/plugins/opening-block

This is a block that provides the function to produce the opening animation of a website.

0 active installs v1.1.0 PHP 8.1.22+ WP 6.4+ Updated Apr 27, 2025
animationblockcustomgutenbergopening
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Opening Block Safe to Use in 2026?

Generally Safe

Score 100/100

Opening Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "opening-block" plugin v1.1.0 exhibits a generally good security posture in several areas, notably the absence of dangerous functions, SQL queries using prepared statements exclusively, and proper output escaping. The lack of file operations, external HTTP requests, and bundled libraries also reduces potential attack vectors. However, a significant concern arises from its attack surface.

The plugin exposes one REST API route that lacks permission callbacks, meaning any user, regardless of their role or capabilities, can potentially interact with this endpoint. This creates a critical vulnerability as it represents an unprotected entry point into the WordPress application. The static analysis also indicates no taint flows and a clean vulnerability history, which are positive indicators. Despite the absence of known CVEs and common vulnerability types, the unprotected REST API route is a serious oversight that needs immediate attention.

In conclusion, while the plugin demonstrates good coding practices in data handling and output sanitization, the unprotected REST API endpoint severely compromises its security. This single vulnerability significantly elevates the risk, as it provides an easily exploitable pathway for malicious actors to potentially impact the site. The clean vulnerability history is encouraging, but it does not negate the immediate threat posed by the exposed REST API.

Key Concerns

  • REST API route without permission callbacks
Vulnerabilities
None known

Opening Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Opening Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface
1 unprotected

Opening Block Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/itmar-rest-api/v1/is-block-registered/opening-block.php:76
WordPress Hooks 4
actioninitopening-block.php:32
actioninitopening-block.php:41
actionenqueue_block_assetsopening-block.php:72
actionrest_api_initopening-block.php:75
Maintenance & Trust

Opening Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 27, 2025
PHP min version8.1.22
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Opening Block Developer Profile

Isamu Takeda

9 plugins · 50 total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Opening Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/opening-block/assets/opening.js/wp-content/plugins/opening-block/build/check-blocks.js
Script Paths
/wp-content/plugins/opening-block/assets/opening.js/wp-content/plugins/opening-block/build/check-blocks.js
Version Parameters
opening-block/assets/opening.js?ver=opening-block/build/check-blocks.js?ver=

HTML / DOM Fingerprints

REST Endpoints
/wp-json/itmar-rest-api/v1/is-block-registered/
FAQ

Frequently Asked Questions about Opening Block