Restricted Blocks – Conditional Visibility Settings for the Block Editor Security & Risk Analysis

wordpress.org/plugins/restricted-blocks

Restricted Blocks is a WordPress plugin that allows you to restrict access to specific Gutenberg blocks based on a great variety of conditions.

100 active installs v1.13 PHP 5.6+ WP 5.0+ Updated Jan 5, 2025
conditional-blocksconditional-contentdynamic-contenthide-contentvisibility
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Restricted Blocks – Conditional Visibility Settings for the Block Editor Safe to Use in 2026?

Generally Safe

Score 92/100

Restricted Blocks – Conditional Visibility Settings for the Block Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "restricted-blocks" plugin, version 1.13, exhibits a generally strong security posture based on the provided static analysis. A significant positive aspect is the absence of any unauthenticated entry points across its AJAX handlers and REST API routes, along with a high percentage of properly escaped outputs and the use of prepared statements for a majority of SQL queries. The plugin also demonstrates a commitment to security through numerous nonce and capability checks, indicating thoughtful development practices. Furthermore, the complete lack of recorded vulnerabilities, including CVEs, in its history is a very encouraging sign and suggests a well-maintained and stable codebase.

However, the analysis does highlight a couple of areas that warrant attention. The presence of two "flows with unsanitized paths" in the taint analysis, although not classified as critical or high severity, indicates a potential avenue for exploitation if user-supplied data is not handled with sufficient sanitization before being used in file operations or other sensitive contexts. While the overall number of entry points is low and all are protected, any potential for path traversal or file manipulation, however minor, should be a focus for improvement. The use of a bundled library (Select2) also presents a potential risk if it's not kept up-to-date with its own security patches, though no specific issues were flagged regarding this in the provided data.

In conclusion, "restricted-blocks" v1.13 is a well-secured plugin with a commendable history of no vulnerabilities and robust security checks. The main area for improvement lies in thoroughly reviewing and ensuring the sanitization of all user-influenced paths to eliminate the identified taint flows. This, combined with ongoing vigilance regarding bundled libraries, would further solidify its already impressive security standing.

Key Concerns

  • Flows with unsanitized paths
Vulnerabilities
None known

Restricted Blocks – Conditional Visibility Settings for the Block Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Restricted Blocks – Conditional Visibility Settings for the Block Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
10
15 prepared
Unescaped Output
5
388 escaped
Nonce Checks
7
Capability Checks
5
File Operations
1
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

60% prepared25 total queries

Output Escaping

99% escaped393 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
display_crud_menu (admin\inc\menu\class-daextrebl-menu-elements.php:1458)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Restricted Blocks – Conditional Visibility Settings for the Block Editor Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 2

authwp_ajax_daextrebl_verify_passwordclass-daextrebl-ajax.php:36
noprivwp_ajax_daextrebl_verify_passwordclass-daextrebl-ajax.php:37

REST API Routes 2

POST/wp-json/restricted-blocks/v1/read-options/inc\class-daextrebl-rest.php:63
POST/wp-json/restricted-blocks/v1/optionsinc\class-daextrebl-rest.php:74
WordPress Hooks 17
actionadmin_enqueue_scriptsadmin\class-daextrebl-admin.php:71
actionadmin_enqueue_scriptsadmin\class-daextrebl-admin.php:72
actionadmin_menuadmin\class-daextrebl-admin.php:75
actionadmin_initadmin\inc\menu\class-daextrebl-menu-elements.php:125
actionadmin_initadmin\inc\menu\class-daextrebl-menu-elements.php:126
actionadmin_initadmin\inc\menu\class-daextrebl-menu-elements.php:127
actionadmin_initadmin\inc\menu\class-daextrebl-menu-elements.php:131
actionenqueue_block_editor_assetsblocks\src\init.php:43
actionrest_api_initinc\class-daextrebl-rest.php:38
actionplugins_loadedinit.php:27
actionplugins_loadedinit.php:31
actionplugins_loadedinit.php:43
actionplugins_loadedinit.php:58
actioninitinit.php:84
filterrender_blockpublic\class-daextrebl-public.php:36
actionwp_enqueue_scriptspublic\class-daextrebl-public.php:39
actionwp_enqueue_scriptspublic\class-daextrebl-public.php:42
Maintenance & Trust

Restricted Blocks – Conditional Visibility Settings for the Block Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 5, 2025
PHP min version5.6
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Restricted Blocks – Conditional Visibility Settings for the Block Editor Developer Profile

DAEXT

13 plugins · 30K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
101 days
View full developer profile
Detection Fingerprints

How We Detect Restricted Blocks – Conditional Visibility Settings for the Block Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/restricted-blocks/admin/css/style.css/wp-content/plugins/restricted-blocks/admin/js/script.js/wp-content/plugins/restricted-blocks/blocks/build/index.js/wp-content/plugins/restricted-blocks/blocks/build/index.css/wp-content/plugins/restricted-blocks/public/css/style.css/wp-content/plugins/restricted-blocks/public/js/script.js/wp-content/plugins/restricted-blocks/shared/css/style.css/wp-content/plugins/restricted-blocks/shared/js/script.js
Script Paths
/wp-content/plugins/restricted-blocks/admin/js/script.js/wp-content/plugins/restricted-blocks/blocks/build/index.js/wp-content/plugins/restricted-blocks/public/js/script.js/wp-content/plugins/restricted-blocks/shared/js/script.js
Version Parameters
restricted-blocks/admin/css/style.css?ver=restricted-blocks/admin/js/script.js?ver=restricted-blocks/blocks/build/index.js?ver=restricted-blocks/blocks/build/index.css?ver=restricted-blocks/public/css/style.css?ver=restricted-blocks/public/js/script.js?ver=restricted-blocks/shared/css/style.css?ver=restricted-blocks/shared/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
daextrebl-admin-toolbar-item-linkdaextrebl-admin-toolbar-item-more-linkdaextrebl-block-editor-wrapper
HTML Comments
<!-- daextrebl --><!-- DO NOT MODIFY: generated by DAEXT Restricted Blocks -->
Data Attributes
data-daextrebl-iddata-daextrebl-block-namedata-daextrebl-restriction-type
JS Globals
window.daextrebl
REST Endpoints
/wp-json/daextrebl/v1/get_settings/wp-json/daextrebl/v1/save_settings
Shortcode Output
[restricted_block][/restricted_block]
FAQ

Frequently Asked Questions about Restricted Blocks – Conditional Visibility Settings for the Block Editor