WP Block Referrer Spam Security & Risk Analysis

wordpress.org/plugins/wp-block-referrer-spam

Block 250+ spam sites, such as semalt.com and 4webmasters.org! Keep your website safe and your Google Analytics statistics clean and accurate.

70 active installs v1.4 PHP + WP 3.2+ Updated Jul 20, 2015
analyticsanalytics-blockanalytics-blockeranalytics-spamblock-analytics
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Block Referrer Spam Safe to Use in 2026?

Generally Safe

Score 85/100

WP Block Referrer Spam has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "wp-block-referrer-spam" plugin version 1.4 exhibits a strong security posture in several key areas. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, all SQL queries are properly prepared, and there are no recorded vulnerabilities, suggesting diligent development practices and a history of security awareness. The plugin also avoids external HTTP requests, which can often be a vector for remote code execution or data leakage.

However, the static analysis does reveal areas for concern. A significant portion (75%) of the 16 identified output operations are not properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly outputted without sanitization. The presence of file operations without clear context on their purpose also warrants attention, as insecure file handling can lead to unauthorized access or manipulation. The lack of nonce checks on any potential entry points, though currently zero, would be a critical oversight if the attack surface were to expand.

Overall, the plugin is built with a minimal attack surface and a good foundation in database security. The primary risk lies in the unescaped output, which represents a potential XSS vulnerability. While the vulnerability history is clean, the unescaped output presents a tangible risk that needs addressing to maintain a robust security profile.

Key Concerns

  • Unescaped output detected
  • File operations present
Vulnerabilities
None known

WP Block Referrer Spam Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Block Referrer Spam Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
5
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped16 total outputs
Attack Surface

WP Block Referrer Spam Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioncron_schedulescontrollers\wpbrs-controller-cron.php:82
actionadmin_noticeswp-block-referrer-spam.php:96
Maintenance & Trust

WP Block Referrer Spam Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJul 20, 2015
PHP min version
Downloads5K

Community Trust

Rating50/100
Number of ratings4
Active installs70
Developer Profile

WP Block Referrer Spam Developer Profile

Roger Rodrigo

2 plugins · 970 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Block Referrer Spam

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-block-referrer-spam/views/js/wp-block-referrer-spam-admin.js
Script Paths
/wp-content/plugins/wp-block-referrer-spam/views/js/wp-block-referrer-spam-admin.js
Version Parameters
wp-block-referrer-spam-admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-settings-name="wp_block_referrer_spam_settings"
FAQ

Frequently Asked Questions about WP Block Referrer Spam