Recipe Blocks Security & Risk Analysis

wordpress.org/plugins/recipe-blocks

Easy to use blocks for posting recipes that include Details, Ingredients, Directions, and Source URL.

10 active installs v1.2.0 PHP 5.6+ WP 5.0+ Updated May 24, 2019
blockdetailsgutenbergingredentsrecipe
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Recipe Blocks Safe to Use in 2026?

Generally Safe

Score 85/100

Recipe Blocks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The `recipe-blocks` plugin version 1.2.0 exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events significantly minimizes the plugin's attack surface. Furthermore, the code analysis reveals no dangerous functions, file operations, or external HTTP requests. The perfect scores for SQL query preparation and output escaping demonstrate a commitment to robust coding practices, preventing common vulnerabilities like SQL injection and cross-site scripting.

Taint analysis also indicates a clean bill of health, with no identified flows containing unsanitized paths, regardless of severity. The vulnerability history is equally reassuring, with zero known CVEs, no unpatched vulnerabilities, and no recorded common vulnerability types. This indicates a well-maintained and secure codebase that has historically avoided common security pitfalls.

In conclusion, the `recipe-blocks` plugin version 1.2.0 appears to be a very secure option. Its minimal attack surface, strict adherence to secure coding practices in the analyzed areas, and lack of historical vulnerabilities make it a low-risk plugin. The only minor area for consideration, though not a direct security risk in this data, is the absence of nonce and capability checks. While not exploitable with the current code structure, implementing these would be a standard best practice for any future development that might introduce entry points.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Recipe Blocks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Recipe Blocks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Recipe Blocks Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitindex.php:78
filterblock_categoriesindex.php:95
Maintenance & Trust

Recipe Blocks Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.0
Last updatedMay 24, 2019
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Recipe Blocks Developer Profile

Magda Sicknick

7 plugins · 80 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Recipe Blocks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/recipe-blocks/editor.css/wp-content/plugins/recipe-blocks/style.css
Script Paths
/wp-content/plugins/recipe-blocks/block.js
Version Parameters
recipe-blocks/style.css?ver=recipe-blocks/editor.css?ver=

HTML / DOM Fingerprints

CSS Classes
wp-block-recipe-blocks-ingredientswp-block-recipe-blocks-detailswp-block-recipe-blocks-directionswp-block-recipe-blocks-noteswp-block-recipe-blocks-source
FAQ

Frequently Asked Questions about Recipe Blocks