Wicked Block Conditions Security & Risk Analysis

wordpress.org/plugins/wicked-block-conditions

Show or hide blocks based on conditions.

700 active installs v1.2.5 PHP 7.4+ WP 5.0+ Updated May 12, 2025
block-visibilityblocksconditional-blocksconditions
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wicked Block Conditions Safe to Use in 2026?

Generally Safe

Score 100/100

Wicked Block Conditions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The wicked-block-conditions v1.2.5 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, unescaped output, file operations, external HTTP requests, or raw SQL queries indicates diligent coding practices. The plugin also demonstrates a complete lack of attack surface, with zero AJAX handlers, REST API routes, shortcodes, or cron events, and crucially, none of these entry points are unprotected. Taint analysis reveals no critical or high severity flows, further reinforcing confidence in the plugin's security. The vulnerability history is also clean, with zero recorded CVEs of any severity, suggesting a well-maintained and secure codebase over time.

While the static analysis and vulnerability history present an overwhelmingly positive picture, the complete absence of any nonces or capability checks across all potential entry points (which are currently zero) is a notable observation. Although there is no current attack surface to exploit, this lack of foundational security checks could become a concern if future versions introduce new entry points without adequate authorization or validation mechanisms. However, based solely on the current data, the plugin appears to be exceptionally secure.

Vulnerabilities
None known

Wicked Block Conditions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wicked Block Conditions Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Wicked Block Conditions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitclasses\class-wicked-block-conditions.php:38
actionenqueue_block_editor_assetsclasses\class-wicked-block-conditions.php:39
actionrest_api_initclasses\class-wicked-block-conditions.php:40
filterpre_render_blockclasses\class-wicked-block-conditions.php:42
filterrender_blockclasses\class-wicked-block-conditions.php:43
filterregister_block_type_argsclasses\class-wicked-block-conditions.php:44
Maintenance & Trust

Wicked Block Conditions Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMay 12, 2025
PHP min version7.4
Downloads10K

Community Trust

Rating100/100
Number of ratings5
Active installs700
Developer Profile

Wicked Block Conditions Developer Profile

wickedplugins

4 plugins · 21K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
353 days
View full developer profile
Detection Fingerprints

How We Detect Wicked Block Conditions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wicked-block-conditions/assets/css/admin.css/wp-content/plugins/wicked-block-conditions/dist/index.js
Script Paths
/wp-content/plugins/wicked-block-conditions/dist/index.js
Version Parameters
wicked-block-conditions/assets/css/admin.css?ver=wicked-block-conditions/dist/index.js?ver=

HTML / DOM Fingerprints

Data Attributes
wickedBlockConditions
JS Globals
wickedBlockConditions
REST Endpoints
/wp-json/wicked-block-conditions/v1/
FAQ

Frequently Asked Questions about Wicked Block Conditions