Advanced Rich Text Tools for Gutenberg Security & Risk Analysis

wordpress.org/plugins/advanced-rich-text-tools

Additional tools for rich text fields in Gutenberg.

4K active installs v1.2.0 PHP 5.3+ WP 5.1+ Updated Feb 27, 2019
advancededitorformattinggutenbergrich-text
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Advanced Rich Text Tools for Gutenberg Safe to Use in 2026?

Generally Safe

Score 85/100

Advanced Rich Text Tools for Gutenberg has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The advanced-rich-text-tools plugin version 1.2.0 exhibits a strong security posture based on the provided static analysis. There are no identified entry points for attack, such as AJAX handlers, REST API routes, shortcodes, or cron events. The code demonstrates adherence to secure coding practices with a complete absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and any identified taint flows. Furthermore, the plugin has no recorded vulnerability history, including CVEs, which suggests a well-maintained and secure codebase.

While the static analysis reveals an exceptionally clean codebase, the complete lack of capability checks and nonce checks on any potential (though currently absent) entry points is a notable omission. If new features are added that introduce these entry points, these security mechanisms will be crucial to implement. The absence of vulnerabilities in its history is a positive indicator, but it's important to recognize that this could also be due to the plugin's limited attack surface or simply a lack of past scrutiny. Overall, this version appears very secure, but future development should focus on incorporating standard security checks should the attack surface expand.

Key Concerns

  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Advanced Rich Text Tools for Gutenberg Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Advanced Rich Text Tools for Gutenberg Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Advanced Rich Text Tools for Gutenberg Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionenqueue_block_editor_assetsindex.php:11
Maintenance & Trust

Advanced Rich Text Tools for Gutenberg Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedFeb 27, 2019
PHP min version5.3
Downloads34K

Community Trust

Rating96/100
Number of ratings20
Active installs4K
Developer Profile

Advanced Rich Text Tools for Gutenberg Developer Profile

Ella Van Durpe

3 plugins · 4K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advanced Rich Text Tools for Gutenberg

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/advanced-rich-text-tools/index.css/wp-content/plugins/advanced-rich-text-tools/dist/index.js
Script Paths
/wp-content/plugins/advanced-rich-text-tools/dist/index.js
Version Parameters
advanced-rich-text-tools/index.css?ver=advanced-rich-text-tools/dist/index.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Advanced Rich Text Tools for Gutenberg