Query Blocks Security & Risk Analysis

wordpress.org/plugins/query-blocks

This is a collection of blocks that display WordPress posts. It includes blocks for selectively displaying posts, setting selection, pagination, and d …

0 active installs v1.1.2 PHP 8.1.22+ WP 6.4+ Updated Jan 27, 2026
blockfieldpostquerytaxsonomy
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Query Blocks Safe to Use in 2026?

Generally Safe

Score 100/100

Query Blocks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'query-blocks' plugin v1.1.2 demonstrates a generally positive security posture in several key areas. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and the complete output escaping indicate good coding practices. Furthermore, the plugin has no recorded vulnerabilities, suggesting a stable and well-maintained codebase. The lack of file operations and external HTTP requests also reduces potential attack vectors.

However, a significant concern arises from the static analysis, which reveals two unprotected REST API routes. This directly translates to an unprotected attack surface, as these entry points lack permission callbacks. This means any unauthenticated user could potentially interact with these routes, leading to unintended consequences or information disclosure depending on their functionality. While the taint analysis shows no unsanitized flows, the presence of unprotected REST API endpoints is a critical oversight that needs immediate attention.

In conclusion, while 'query-blocks' v1.1.2 excels in secure coding practices like prepared statements and output escaping, the two unprotected REST API routes present a clear and present risk. The vulnerability history is a strength, showing no prior issues, but it does not mitigate the immediate risk posed by the exposed entry points. Addressing these unprotected routes is paramount to improving the plugin's overall security.

Key Concerns

  • REST API routes without permission callbacks
  • Unprotected REST API entry points
Vulnerabilities
None known

Query Blocks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Query Blocks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries
Attack Surface
2 unprotected

Query Blocks Attack Surface

Entry Points2
Unprotected2

REST API Routes 2

GET/wp-json/itmar-rest-api/v1/single-postquery-blocks.php:96
GET/wp-json/itmar-rest-api/v1/searchquery-blocks.php:124
WordPress Hooks 7
actioninitquery-blocks.php:43
actionadmin_noticesquery-blocks.php:55
actionplugins_loadedquery-blocks.php:66
actionenqueue_block_assetsquery-blocks.php:92
actionrest_api_initquery-blocks.php:95
actionrest_api_initquery-blocks.php:123
filterposts_requestquery-blocks.php:406
Maintenance & Trust

Query Blocks Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJan 27, 2026
PHP min version8.1.22
Downloads734

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Query Blocks Developer Profile

Isamu Takeda

9 plugins · 50 total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Query Blocks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/query-blocks/build/front-module.js?
Script Paths
wp-content/plugins/query-blocks/build/front-module.js
Version Parameters
query-blocks/build/front-module.js?ver=

HTML / DOM Fingerprints

JS Globals
itmar_post_option
REST Endpoints
/itmar-rest-api/v1/single-post/itmar-rest-api/v1/search
FAQ

Frequently Asked Questions about Query Blocks