Trailblaze Security & Risk Analysis

wordpress.org/plugins/trailblaze

Add breadcrumb navigation to your posts, pages and custom post types with a template tag.

10 active installs v1.1.1 PHP + WP 3.1+ Updated May 2, 2016
breadcrumbbreadcrumbsmenunavigation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Trailblaze Safe to Use in 2026?

Generally Safe

Score 85/100

Trailblaze has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The trailblaze plugin v1.1.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the analysis shows no dangerous functions, no file operations, no external HTTP requests, and a complete absence of critical and high severity taint flows. The code also demonstrates good practices with 100% of SQL queries utilizing prepared statements, and a single capability check indicates some level of access control is implemented.

However, a notable concern arises from the output escaping. With 49% of outputs properly escaped, there's a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that is not properly escaped could be manipulated by attackers to inject malicious scripts. The lack of nonce checks across the board, although tied to the zero entry points, still represents a missed opportunity for robust security on any potential future additions that might introduce interactive elements.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the static analysis results, suggests a developer who is either highly security-conscious or has not yet encountered security flaws in this specific version. The absence of previously recorded vulnerabilities can be seen as a positive indicator, but it does not negate the risks identified in the current code analysis, particularly the output escaping issues.

Key Concerns

  • Output escaping is only 49% proper, risking XSS
  • No nonce checks implemented
Vulnerabilities
None known

Trailblaze Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Trailblaze Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
70
67 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

49% escaped137 total outputs
Attack Surface

Trailblaze Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuincludes\trailblaze-options.php:6
actionadmin_initincludes\trailblaze-options.php:80
filterplugin_action_linkstrailblaze.php:43
actionplugins_loadedtrailblaze.php:75
Maintenance & Trust

Trailblaze Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMay 2, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Trailblaze Developer Profile

Erik Ford

3 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Trailblaze

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Begin Trailblaze Breadcrumbs --><!-- End Trailblaze Breadcrumbs -->
FAQ

Frequently Asked Questions about Trailblaze