WP-Flock Security & Risk Analysis

wordpress.org/plugins/wp-flock

A plugin that provides LiveJournal-like custom security groups for posts and pages.

10 active installs v0.1.1 PHP + WP 2.7.1+ Updated Unknown
adminpostpostsprivacyusers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Flock Safe to Use in 2026?

Generally Safe

Score 100/100

WP-Flock has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The wp-flock v0.1.1 plugin exhibits a mixed security posture. On one hand, it demonstrates good practices by having no known vulnerabilities (CVEs) and a seemingly small attack surface with zero exposed AJAX handlers, REST API routes, shortcodes, or cron events without authentication. The presence of capability checks on 3 occasions is also a positive sign. However, significant concerns arise from the static analysis. The complete lack of output escaping (0% properly escaped) is a critical vulnerability, opening the door to Cross-Site Scripting (XSS) attacks. Furthermore, the taint analysis reveals two high-severity flows with unsanitized paths, indicating potential for insecure file operations or data manipulation if these paths are exposed. The presence of SQL queries, while mostly prepared, still warrants attention due to the potential for improper handling in the un-prepared portion.

Key Concerns

  • Unescaped output
  • High severity taint flow with unsanitized path
  • High severity taint flow with unsanitized path
Vulnerabilities
None known

WP-Flock Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Flock Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
20 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

80% prepared25 total queries

Output Escaping

0% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
fl_user_groups (flconfig.php:219)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-Flock Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_menuwp-flock.php:55
actionshow_user_profilewp-flock.php:59
actionedit_user_profilewp-flock.php:60
actionprofile_updatewp-flock.php:61
filterstatus_save_prewp-flock.php:67
filteruser_has_capwp-flock.php:68
filterquerywp-flock.php:69
filterthe_content_rsswp-flock.php:71
filterthe_excerpt_rsswp-flock.php:72
actionsave_postwp-flock.php:76
Maintenance & Trust

WP-Flock Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-Flock Developer Profile

Alis

3 plugins · 120 total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Flock

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-flock/flconfig.php

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="fl_gname"id="fl_gname"name="fl_ljmask"id="fl_ljmask"
FAQ

Frequently Asked Questions about WP-Flock