Always Edit In HTML Security & Risk Analysis

wordpress.org/plugins/always-edit-in-html

Always opens up a specific page or post in HTML mode to preserve HTML code (classic editor only).

1K active installs v2.4.6 PHP 7.4+ WP 5.2+ Updated Jul 4, 2024
always-edit-in-htmledit-post-in-htmlhtml-edithtml-modehtml-tab
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Always Edit In HTML Safe to Use in 2026?

Generally Safe

Score 92/100

Always Edit In HTML has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin 'always-edit-in-html' v2.4.6 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and a complete lack of critical or high-severity vulnerabilities in its history suggest a well-maintained and secure plugin. Furthermore, the static analysis reveals a remarkably small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without appropriate authentication or permission checks. The code also shows positive signs such as the complete absence of dangerous functions and all SQL queries utilizing prepared statements, indicating a good understanding of secure coding practices regarding database interactions.

However, the analysis does highlight a significant concern: a 100% rate of unescaped output across the three identified output points. This means that any data processed by the plugin and then displayed to users or in the admin interface is not being properly sanitized. This could lead to Cross-Site Scripting (XSS) vulnerabilities if the plugin handles or displays user-supplied data without sanitization. While the plugin has one nonce check and two capability checks, the lack of output escaping is a critical weakness that could be exploited. Despite the clean vulnerability history, this oversight presents a direct and exploitable risk that should be addressed.

Key Concerns

  • All output not properly escaped
Vulnerabilities
None known

Always Edit In HTML Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Always Edit In HTML Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Always Edit In HTML Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initalways-edit-in-html.php:24
actionadmin_headalways-edit-in-html.php:25
actionsave_postalways-edit-in-html.php:26
filterwp_default_editoralways-edit-in-html.php:55
Maintenance & Trust

Always Edit In HTML Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJul 4, 2024
PHP min version7.4
Downloads87K

Community Trust

Rating88/100
Number of ratings7
Active installs1K
Developer Profile

Always Edit In HTML Developer Profile

DeveloperWil

5 plugins · 3K total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Always Edit In HTML

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/always-edit-in-html/images/zeropointdevelopment-mark.png

HTML / DOM Fingerprints

CSS Classes
switch-tmce
Data Attributes
name="always_edit_in_html"id="always_edit_in_html"name="always_edit_in_html_noncename"
FAQ

Frequently Asked Questions about Always Edit In HTML