Reusable Block Count Security & Risk Analysis

wordpress.org/plugins/reusable-block-count

Display a "Reusable blocks" listing page, and a link to view all posts containing a given block.

10 active installs v1.0 PHP 5.6+ WP 5.0+ Updated Jan 15, 2021
blocksgutenbergreusable
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Reusable Block Count Safe to Use in 2026?

Generally Safe

Score 85/100

Reusable Block Count has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "reusable-block-count" plugin version 1.0 demonstrates a strong security posture based on the provided static analysis. The complete absence of any identified attack surface, including AJAX handlers, REST API routes, shortcodes, and cron events, significantly limits the potential for external exploitation. Furthermore, the code analysis reveals no dangerous functions, no raw SQL queries (all are prepared), and no file operations or external HTTP requests, which are common vectors for vulnerabilities. The lack of any recorded CVEs in its history further reinforces its current security standing.

However, the analysis does highlight some areas that, while not currently indicating vulnerabilities, represent potential risks if the plugin were to evolve or if its functionality were to expand. Specifically, the absence of nonce checks and capability checks is a notable concern, as these are fundamental security mechanisms for WordPress plugins. While there are no current entry points requiring these checks, implementing them would be a proactive security measure. Additionally, 25% of the output escaping is not properly handled, which could become a vector for Cross-Site Scripting (XSS) if the plugin's functionality were to incorporate user-supplied data into its output in the future. Overall, the plugin is currently secure due to its limited functionality and attack surface, but it could benefit from incorporating standard WordPress security practices for future development.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
  • Unescaped output found
Vulnerabilities
None known

Reusable Block Count Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Reusable Block Count Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

75% escaped4 total outputs
Attack Surface

Reusable Block Count Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menureusable-block-count.php:23
filtermanage_wp_block_posts_columnsreusable-block-count.php:26
filtermanage_wp_block_posts_custom_columnreusable-block-count.php:27
Maintenance & Trust

Reusable Block Count Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedJan 15, 2021
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Reusable Block Count Developer Profile

George Stephanis

16 plugins · 16K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Reusable Block Count

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- wp:block {"ref":%d} -->
FAQ

Frequently Asked Questions about Reusable Block Count