Simple Blog Card Security & Risk Analysis

wordpress.org/plugins/simple-blog-card

Get OGP and display blog card.

3K active installs v2.38 PHP 8.0+ WP 6.6+ Updated Feb 5, 2026
blockblogcardexternal-linkinternal-linklinkcard
99
A · Safe
CVEs total2
Unpatched0
Last CVEAug 3, 2023
Safety Verdict

Is Simple Blog Card Safe to Use in 2026?

Generally Safe

Score 99/100

Simple Blog Card has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Aug 3, 2023Updated 1mo ago
Risk Assessment

The "simple-blog-card" v2.38 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals a clean attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal footprint for potential exploitation. Furthermore, all output appears to be properly escaped, and there are no file operations or external HTTP requests, which are excellent security practices. The absence of any critical or high-severity taint flows is also a strong positive. However, significant concerns arise from the vulnerability history. The plugin has a history of two medium-severity vulnerabilities, specifically Exposure of Sensitive Information and Cross-site Scripting, with the last one occurring in August 2023. While currently unpatched CVEs are zero, this history suggests a pattern of introducing vulnerabilities that require remediation. The fact that SQL queries are not using prepared statements is a notable weakness, as it could lead to SQL injection vulnerabilities if the input is not rigorously sanitized, despite the lack of identified taint flows in this specific analysis.

In conclusion, while the current version of "simple-blog-card" appears to have a small attack surface and good output escaping, its past vulnerability record and the use of raw SQL queries are significant red flags. The absence of any capability checks or nonce checks, combined with the past medium-severity CVEs, means that users should exercise caution. The plugin developers have demonstrated an ability to introduce security flaws, and the reliance on raw SQL without prepared statements is a fundamental security risk that should be addressed. Continued monitoring and prompt patching of any new vulnerabilities are crucial for users of this plugin.

Key Concerns

  • Raw SQL queries without prepared statements
  • History of 2 medium severity CVEs
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
2

Simple Blog Card Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-4036medium · 4.3Exposure of Sensitive Information to an Unauthorized Actor

Simple Blog Card <= 1.31 - Sensitive Information Exposure

Aug 3, 2023 Patched in 1.32 (173d)
CVE-2023-4035medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Simple Blog Card <= 1.30 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Jul 31, 2023 Patched in 1.31 (176d)
Code Analysis
Analyzed Mar 16, 2026

Simple Blog Card Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
0
78 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

100% escaped78 total outputs
Attack Surface

Simple Blog Card Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Simple Blog Card Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 5, 2026
PHP min version8.0
Downloads41K

Community Trust

Rating100/100
Number of ratings3
Active installs3K
Developer Profile

Simple Blog Card Developer Profile

Katsushi Kawamori

52 plugins · 56K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
190 days
View full developer profile
Detection Fingerprints

How We Detect Simple Blog Card

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-blog-card/admin/css/style.css/wp-content/plugins/simple-blog-card/admin/js/main.js/wp-content/plugins/simple-blog-card/admin/js/settings.js/wp-content/plugins/simple-blog-card/public/css/style.css/wp-content/plugins/simple-blog-card/public/js/main.js
Script Paths
/wp-content/plugins/simple-blog-card/admin/js/main.js/wp-content/plugins/simple-blog-card/admin/js/settings.js/wp-content/plugins/simple-blog-card/public/js/main.js
Version Parameters
simple-blog-card/admin/css/style.css?ver=simple-blog-card/admin/js/main.js?ver=simple-blog-card/admin/js/settings.js?ver=simple-blog-card/public/css/style.css?ver=simple-blog-card/public/js/main.js?ver=

HTML / DOM Fingerprints

CSS Classes
simple-blog-cardsbc-blog-cardsbc-card-imagesbc-card-titlesbc-card-descriptionsbc-card-site-title
Data Attributes
data-sbc-urldata-sbc-iddata-sbc-titledata-sbc-descriptiondata-sbc-imagedata-sbc-site-title
JS Globals
SimpleBlogCard
Shortcode Output
[simple_blog_card[/simple_blog_card]
FAQ

Frequently Asked Questions about Simple Blog Card