
Gutenberg Block Editor Toolkit – EditorsKit Security & Risk Analysis
wordpress.org/plugins/block-optionsEditorsKit provides a set of page building tools to supercharge the WordPress Gutenberg block editor.
Is Gutenberg Block Editor Toolkit – EditorsKit Safe to Use in 2026?
Generally Safe
Score 90/100Gutenberg Block Editor Toolkit – EditorsKit has a strong security track record. Known vulnerabilities have been patched promptly.
The 'block-options' plugin v1.40.6 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices in handling SQL queries, exclusively using prepared statements, and generally performs well with output escaping, with 90% of outputs being properly escaped. Nonce and capability checks are present for a significant number of entry points, and the taint analysis shows no critical or high severity flows, suggesting a careful approach to handling user-supplied data within the analyzed flows.
However, concerns arise from the presence of an unprotected AJAX handler, which represents a direct entry point without authentication checks. This, combined with the plugin's history of three known high and medium severity vulnerabilities, including Cross-site Scripting, Unrestricted File Upload, and Code Injection, indicates a recurring pattern of security weaknesses. While there are currently no unpatched CVEs, the historical context suggests a potential for newly introduced vulnerabilities or regressions, especially given the identified unprotected entry point. The external HTTP requests also warrant attention, as they can sometimes be exploited if not properly validated or sanitized.
In conclusion, while the plugin has made strides in secure coding practices, particularly with SQL and general output sanitization, the unprotected AJAX handler and its past vulnerability trends present a tangible risk. Continued vigilance, thorough code reviews, and prompt patching of any future vulnerabilities will be crucial for mitigating these risks.
Key Concerns
- Unprotected AJAX handler found
- 3 known CVEs historically, 2 high severity
- Vulnerabilities include XSS, Unrestricted Upload, Code Injection
- 3 external HTTP requests observed
Gutenberg Block Editor Toolkit – EditorsKit Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Gutenberg Block Editor Toolkit – EditorsKit <= 1.40.4 - Authenticated (Contributor+) Stored Cross-Site Scripting
EditorsKit <= 1.40.3 - Authenticated (Administrator+) Arbitrary File Upload
EditorsKit <= 1.31.5 - Authenticated (Contributor+) Code Injection
Gutenberg Block Editor Toolkit – EditorsKit Code Analysis
Output Escaping
Data Flow Analysis
Gutenberg Block Editor Toolkit – EditorsKit Attack Surface
AJAX Handlers 1
REST API Routes 2
Shortcodes 1
WordPress Hooks 51
Maintenance & Trust
Gutenberg Block Editor Toolkit – EditorsKit Maintenance & Trust
Maintenance Signals
Community Trust
Gutenberg Block Editor Toolkit – EditorsKit Alternatives
Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor
gutentor
Advanced yet easy, Gutenberg editor page builder blocks. Create a masterpiece, pixel perfect website using modern WordPress Gutenberg blocks.
WPMozo Blocks and Addons
wpmozo-blocks-and-addons
WPMozo Blocks and Addons is a plugin that enhances the Gutenberg editor with a collection of powerful and customizable blocks.
Orbi Blocks – Gutenberg Blocks, Patterns & Templates
orbi-blocks
Create pixel-perfect, modern WordPress websites with ease using our advanced yet user-friendly Gutenberg editor page builder blocks.
Page Builder Gutenberg Blocks – CoBlocks
coblocks
CoBlocks is a suite of page builder WordPress blocks for Gutenberg, with 10+ new blocks and a true page builder experience with rows and columns.
Stackable – Page Builder Gutenberg Blocks
stackable-ultimate-gutenberg-blocks
Custom Blocks that transform your WordPress Block Editor into a page builder
Gutenberg Block Editor Toolkit – EditorsKit Developer Profile
8 plugins · 49K total installs
How We Detect Gutenberg Block Editor Toolkit – EditorsKit
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/block-options/build/css/style/wp-content/plugins/block-options/build/js/index/wp-content/plugins/block-options/src/js/editor/wp-content/plugins/block-options/build/js/index.min.js/wp-content/plugins/block-options/src/js/editor.js/wp-content/plugins/block-options/build/css/style.min.css?ver=/wp-content/plugins/block-options/build/js/index.min.js?ver=/wp-content/plugins/block-options/src/js/editor.js?ver=HTML / DOM Fingerprints
editorskit-frontendeditorskit-admin<!-- EditorsKit: Content Block Wrapper --><!-- EditorsKit: Style Manager Wrapper --><!-- EditorsKit: Editor Options -->data-editorskit-blockdata-editorskit-componenteditorskit_editor_configEditorsKit[editorskit_template[editorskit_form]