Yabe Bricksbender Security & Risk Analysis

wordpress.org/plugins/yabe-bricksbender

The Bricks builder extension

10 active installs v2.0.1 PHP 7.4+ WP 6.5+ Updated Jun 7, 2024
bricks-buildertailwind-css
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Yabe Bricksbender Safe to Use in 2026?

Generally Safe

Score 92/100

Yabe Bricksbender has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The yabe-bricksbender plugin v2.0.1 exhibits a generally strong security posture based on the provided static analysis. The absence of detectable AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface, with all identified entry points appearing to be protected. The code also demonstrates good practices by exclusively using prepared statements for SQL queries and not performing file operations or external HTTP requests, which are common sources of vulnerabilities. Furthermore, the plugin's vulnerability history is completely clean, with no recorded CVEs, indicating a history of responsible development and maintenance.

However, a critical concern arises from the complete lack of output escaping. With 5 total outputs and 0% properly escaped, this indicates a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from user input or external sources is at risk of being injected with malicious scripts. Additionally, the absence of nonce checks and capability checks on the (hypothetically present) entry points, while currently moot due to the lack of entry points, points to a potential future risk if the plugin's functionality expands. While the current version is free of known vulnerabilities and has a minimal attack surface, the lack of output escaping is a severe deficiency that requires immediate attention.

Key Concerns

  • Output escaping is not implemented
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Yabe Bricksbender Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Yabe Bricksbender Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Yabe Bricksbender Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Yabe Bricksbender Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 7, 2024
PHP min version7.4
Downloads3K

Community Trust

Rating84/100
Number of ratings5
Active installs10
Developer Profile

Yabe Bricksbender Developer Profile

Rosua

4 plugins · 140 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Yabe Bricksbender

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/yabe-bricksbender/assets/bricks/main.js/wp-content/plugins/yabe-bricksbender/assets/elements/alpinejs/runtime.js
Script Paths
https://cdn.jsdelivr.net/npm/@tabler/icons-webfont@latest/dist/tabler-icons.min.csshttps://cdn.jsdelivr.net/npm/alpinejs@latest/dist/cdn.min.jshttps://cdn.jsdelivr.net/npm/@alpinejs/mask@latest/dist/cdn.min.jshttps://cdn.jsdelivr.net/npm/@alpinejs/intersect@latest/dist/cdn.min.jshttps://cdn.jsdelivr.net/npm/@alpinejs/persist@latest/dist/cdn.min.jshttps://cdn.jsdelivr.net/npm/@alpinejs/focus@latest/dist/cdn.min.js+4 more

HTML / DOM Fingerprints

CSS Classes
titi-brand-alpine-js
Data Attributes
data-ybr-alpinejs-runtime-options
JS Globals
bricksbender
REST Endpoints
/wp-json/yabe-bricksbender/v1
Shortcode Output
<div data-ybr-alpinejs-runtime-options=
FAQ

Frequently Asked Questions about Yabe Bricksbender