Classic Editor Security & Risk Analysis

wordpress.org/plugins/classic-editor

Enables the previous "classic" editor and the old-style Edit Post screen with TinyMCE, Meta Boxes, etc. Supports all plugins that extend this screen.

9.0M active installs v1.6.7 PHP 5.2.4+ WP 4.9+ Updated Dec 8, 2025
block-editorclassic-editoreditorgutenberg
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Classic Editor Safe to Use in 2026?

Generally Safe

Score 100/100

Classic Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The Classic Editor plugin, version 1.6.7, demonstrates a strong security posture based on the provided static analysis. The absence of any identified entry points (AJAX handlers, REST API routes, shortcodes, cron events) significantly limits the potential attack surface. Furthermore, the code signals indicate good development practices, with no dangerous functions, all SQL queries utilizing prepared statements, and a high percentage of output being properly escaped. The presence of nonce and capability checks also contributes to a more secure implementation, preventing unauthorized actions. The plugin's vulnerability history is clean, with zero recorded CVEs, suggesting a commitment to security and diligent maintenance over time.

While the static analysis reveals no immediate threats, the taint analysis reporting zero flows is noteworthy. In complex plugins, even a single flow with unsanitized input can lead to vulnerabilities. The low number of total flows analyzed (0) might indicate a relatively small code base or that the taint analysis tool may not have been able to analyze all potential data flow paths. However, based on the provided data, there are no specific security concerns stemming from the code analysis or historical vulnerabilities that warrant deduction. The plugin appears to be well-developed from a security perspective, with no evident weaknesses in its current version.

Vulnerabilities
None known

Classic Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Classic Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
6 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped7 total outputs
Attack Surface

Classic Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 30
actionwpmu_optionsclassic-editor.php:46
actionupdate_wpmu_optionsclassic-editor.php:47
filterplugin_action_linksclassic-editor.php:52
filternetwork_admin_plugin_action_linksclassic-editor.php:53
actionadmin_initclassic-editor.php:55
actionpersonal_options_updateclassic-editor.php:59
actionedit_user_profile_updateclassic-editor.php:60
actionprofile_personal_optionsclassic-editor.php:61
actionedit_user_profileclassic-editor.php:62
actionadmin_print_stylesclassic-editor.php:70
filterscript_loader_srcclassic-editor.php:76
filteruse_block_editor_for_postclassic-editor.php:85
filtergutenberg_can_edit_postclassic-editor.php:89
filterget_edit_post_linkclassic-editor.php:96
filterredirect_post_locationclassic-editor.php:97
actionedit_form_topclassic-editor.php:98
actionadmin_head-edit.phpclassic-editor.php:99
actionedit_form_topclassic-editor.php:101
filterblock_editor_settings_allclassic-editor.php:104
filterblock_editor_settingsclassic-editor.php:106
filterdisplay_post_statesclassic-editor.php:110
filterpage_row_actionsclassic-editor.php:112
filterpost_row_actionsclassic-editor.php:113
actionadd_meta_boxesclassic-editor.php:116
actionenqueue_block_editor_assetsclassic-editor.php:117
filteruse_block_editor_for_post_typeclassic-editor.php:122
filtergutenberg_can_edit_post_typeclassic-editor.php:126
actionadmin_initclassic-editor.php:137
actionedit_form_after_titleclassic-editor.php:943
actionplugins_loadedclassic-editor.php:1031
Maintenance & Trust

Classic Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 8, 2025
PHP min version5.2.4
Downloads85.6M

Community Trust

Rating98/100
Number of ratings1,223
Active installs9.0M
Developer Profile

Classic Editor Developer Profile

WordPress.org

34 plugins · 14.9M total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
1718 days
View full developer profile
Detection Fingerprints

How We Detect Classic Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/classic-editor/assets/css/classic-editor.css/wp-content/plugins/classic-editor/assets/js/classic-editor.js
Script Paths
/wp-content/plugins/classic-editor/assets/js/classic-editor.js
Version Parameters
classic-editor/assets/css/classic-editor.css?ver=classic-editor/assets/js/classic-editor.js?ver=

HTML / DOM Fingerprints

CSS Classes
classic-editor-plugin-settings
HTML Comments
<!-- Classic Editor: Settings UI --><!-- Classic Editor: Remember Editor Preference -->
Data Attributes
data-classic-editor-settings
JS Globals
classicEditorSettings
FAQ

Frequently Asked Questions about Classic Editor