WWI Blogcard Security & Risk Analysis

wordpress.org/plugins/wwi-blogcard

A WordPress block plugin that generates beautiful blog cards from URLs using OGP information.

0 active installs v1.0.11 PHP 7.4+ WP 6.0+ Updated Feb 23, 2026
blogcardcardembedlinkogp
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WWI Blogcard Safe to Use in 2026?

Generally Safe

Score 100/100

WWI Blogcard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'wwi-blogcard' plugin v1.0.11 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, the consistent use of prepared statements for all SQL queries, and the 100% proper output escaping are all excellent security practices. Furthermore, the presence of nonce and capability checks, along with no recorded vulnerabilities in its history, suggests a well-maintained and secure plugin. The limited attack surface with no identified unprotected entry points is also a positive indicator.

However, there are a few minor points to consider. The plugin makes one external HTTP request, which, while not inherently a vulnerability, could be a potential vector if not handled securely or if the external service is compromised. The lack of taint analysis results (zero flows analyzed) means that while no issues were found, there's no active confirmation of the sanitization of data flows.

In conclusion, 'wwi-blogcard' v1.0.11 appears to be a secure plugin with robust coding practices. The main areas for attention are the single external HTTP request and the absence of taint analysis results, which, while not critical flaws based on the data, represent potential areas for further scrutiny in a broader security audit. The plugin's history of zero vulnerabilities is a significant strength.

Key Concerns

  • External HTTP request made by the plugin
  • No taint analysis flows analyzed
Vulnerabilities
None known

WWI Blogcard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WWI Blogcard Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
13 prepared
Unescaped Output
0
16 escaped
Nonce Checks
2
Capability Checks
5
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared13 total queries

Output Escaping

100% escaped16 total outputs
Attack Surface

WWI Blogcard Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuincludes\class-wwi-blogcard-admin.php:26
actionadmin_initincludes\class-wwi-blogcard-admin.php:27
actionadmin_initincludes\class-wwi-blogcard-admin.php:28
actionadmin_noticesincludes\class-wwi-blogcard-admin.php:29
actionadmin_enqueue_scriptsincludes\class-wwi-blogcard-admin.php:30
actionrest_api_initincludes\class-wwi-blogcard-rest-api.php:33
actioninitwwi-blogcard.php:53
actioninitwwi-blogcard.php:70
Maintenance & Trust

WWI Blogcard Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 23, 2026
PHP min version7.4
Downloads165

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WWI Blogcard Developer Profile

whywaita

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WWI Blogcard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wwi-blogcard/build/wwi-blogcard.asset.php
Script Paths
/wp-content/plugins/wwi-blogcard/build/index.js
Version Parameters
wwi-blogcard/style.css?ver=wwi-blogcard/index.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-wwi-blogcard-url
JS Globals
window.wwiBlogcardSettings
REST Endpoints
/wp-json/wwi-blogcard/v1/fetch/wp-json/wwi-blogcard/v1/clear-cache
FAQ

Frequently Asked Questions about WWI Blogcard