Single Post Query Loop Selector Security & Risk Analysis

wordpress.org/plugins/query-loop-block-extensions

A Query Loop block variation that allows to search and select a single post to be displayed.

50 active installs v0.1.2 PHP 7.4+ WP 6.1+ Updated Mar 29, 2024
query-loopsingle-postvariation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Single Post Query Loop Selector Safe to Use in 2026?

Generally Safe

Score 85/100

Single Post Query Loop Selector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "query-loop-block-extensions" plugin, at version 0.1.2, demonstrates a strong adherence to secure coding practices based on the provided static analysis. The absence of any identified dangerous functions, the exclusive use of prepared statements for SQL queries, and the 100% proper output escaping are significant positive indicators. Furthermore, the lack of file operations, external HTTP requests, and the absence of any taint analysis findings suggest a well-contained and secure codebase.

The plugin's attack surface is notably zero, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed. This is further reinforced by the absence of any registered vulnerabilities in its history, including critical or high-severity issues. The lack of recorded vulnerabilities, common vulnerability types, or even a last recorded vulnerability suggests a development process that prioritizes security.

Overall, this plugin presents a very low-risk profile. Its strengths lie in its minimal attack surface and the robust implementation of security best practices in its code. The only potential area for consideration, though not a current risk based on the data, is the complete absence of nonce and capability checks. While the current lack of entry points negates this as an immediate threat, future development introducing new entry points without these checks could introduce vulnerabilities.

Vulnerabilities
None known

Single Post Query Loop Selector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Single Post Query Loop Selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Single Post Query Loop Selector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionenqueue_block_editor_assetssingle-post-query-loop-selector.php:17
filterpre_render_blocksingle-post-query-loop-selector.php:37
filterquery_loop_block_query_varssingle-post-query-loop-selector.php:58
Maintenance & Trust

Single Post Query Loop Selector Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMar 29, 2024
PHP min version7.4
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs50
Developer Profile

Single Post Query Loop Selector Developer Profile

Creative Andrew

1 plugin · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Single Post Query Loop Selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/query-loop-block-extensions/build/index.asset.php/wp-content/plugins/query-loop-block-extensions/build/index.js
Script Paths
/wp-content/plugins/query-loop-block-extensions/build/index.js
Version Parameters
single-post-query-loop-selector

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Single Post Query Loop Selector