Apermo Tidy Gutenberg Security & Risk Analysis

wordpress.org/plugins/apermo-tidy-gutenberg

This plugin simply allows you to hide the color pickers on the Gutenberg editor.

0 active installs v1.0.1 PHP + WP 4.6.0+ Updated Aug 22, 2018
color-pickergutenbergtidied
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Apermo Tidy Gutenberg Safe to Use in 2026?

Generally Safe

Score 85/100

Apermo Tidy Gutenberg has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "apermo-tidy-gutenberg" v1.0.1 plugin exhibits an exceptionally small attack surface, with no identifiable AJAX handlers, REST API routes, shortcodes, or cron events. The code analysis further reveals a lack of dangerous functions and file operations, and importantly, all SQL queries are performed using prepared statements, indicating good database interaction practices. There are no external HTTP requests or bundled libraries, which simplifies the security landscape.

However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, this presents a clear risk of cross-site scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks on entry points, though these are currently zero, means that if any were to be introduced in future versions without proper security considerations, the plugin would be immediately vulnerable. The taint analysis shows no flows, which is positive, but this is likely a consequence of the zero entry points rather than robust sanitization throughout potentially complex code that doesn't exist here.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the current minimal attack surface and good SQL practices, paints a picture of a plugin that, at this version, has been developed with some security awareness. However, the critical lack of output escaping is a major oversight that exposes users to significant risk. The strengths lie in its limited scope and secure database handling, while the primary weakness is the unescaped output.

Key Concerns

  • 0% of outputs are properly escaped
  • No nonce checks on any entry points
  • No capability checks on any entry points
Vulnerabilities
None known

Apermo Tidy Gutenberg Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Apermo Tidy Gutenberg Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Apermo Tidy Gutenberg Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_noticesapermo-tidy-gutenberg.php:49
actionafter_setup_themeapermo-tidy-gutenberg.php:67
actionplugins_loadedapermo-tidy-gutenberg.php:81
Maintenance & Trust

Apermo Tidy Gutenberg Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedAug 22, 2018
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Apermo Tidy Gutenberg Developer Profile

Christoph Daum

4 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Apermo Tidy Gutenberg

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Apermo Tidy Gutenberg