Classic Editor + Security & Risk Analysis

wordpress.org/plugins/classic-editor-addon

The "Classic Editor +" plugin disables the block editor, removes enqueued scripts/styles and brings back classic Widgets.

50K active installs v4.4.1 PHP 5.6+ WP 4.9+ Updated Jan 12, 2026
classic-editorclassic-widgetsremove-frontend-scriptsremove-frontend-stylingremove-patterns
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 24, 2022
Download
Safety Verdict

Is Classic Editor + Safe to Use in 2026?

Generally Safe

Score 99/100

Classic Editor + has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 24, 2022Updated 2mo ago
Risk Assessment

The static analysis of classic-editor-addon v4.4.1 indicates a generally strong security posture with no identified dangerous functions, file operations, or external HTTP requests. Crucially, all SQL queries are properly prepared, and output is consistently escaped, suggesting good development practices in these areas. The absence of any critical or high-severity taint flows further reinforces this positive assessment, indicating that user-supplied data is unlikely to be mishandled in a way that leads to immediate exploitation.

However, the plugin's vulnerability history presents a significant concern. It has a known CVE, specifically a high-severity Cross-Site Request Forgery (CSRF) vulnerability that was last patched in January 2022. The fact that there are no currently unpatched vulnerabilities is positive, but the presence of a past high-severity CSRF issue highlights a potential weakness in how user actions are authenticated or validated. While the current static analysis shows no explicit CSRF entry points like AJAX handlers or shortcodes without authentication, it's important to remember that CSRF vulnerabilities can sometimes manifest through less obvious means or in older code that might not be fully captured by static analysis alone. The single capability check noted is a positive sign, but its effectiveness in mitigating past vulnerabilities like CSRF would need further investigation.

In conclusion, classic-editor-addon v4.4.1 demonstrates good coding hygiene in its handling of SQL and output. The lack of identified critical code vulnerabilities in the static analysis is reassuring. Nevertheless, the past high-severity CSRF vulnerability serves as a significant warning sign. Users should remain vigilant, ensuring the plugin is updated to the latest version to benefit from any patches addressing this historical issue, and acknowledge the potential for similar vulnerabilities to re-emerge if development practices around state-changing actions are not robust.

Key Concerns

  • Known high-severity vulnerability (CSRF)
  • Past vulnerability indicates potential weakness
Vulnerabilities
1

Classic Editor + Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

WF-e647d1ff-2d2c-43e4-b723-28ed410c4b3a-classic-editor-addonhigh · 8.8Cross-Site Request Forgery (CSRF)

Classic Editor Addon < 2.6.4 - Cross-Site Request Forgery

Jan 24, 2022 Patched in 2.6.4 (729d)
Code Analysis
Analyzed Mar 16, 2026

Classic Editor + Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Classic Editor + Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_initclassic-editor-addon.php:29
actionenqueue_block_assetsclassic-editor-addon.php:38
filteruse_block_editor_for_postclassic-editor-addon.php:70
filtergutenberg_use_widgets_block_editorclassic-editor-addon.php:79
filteruse_widgets_block_editorclassic-editor-addon.php:81
actionwp_enqueue_scriptsclassic-editor-addon.php:87
filterrest_dispatch_requestclassic-editor-addon.php:125
filtershould_load_remote_block_patternsclassic-editor-addon.php:129
actionadmin_initclassic-editor-addon.php:132
actionadmin_initclassic-editor-addon.php:138
Maintenance & Trust

Classic Editor + Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 12, 2026
PHP min version5.6
Downloads640K

Community Trust

Rating98/100
Number of ratings31
Active installs50K
Developer Profile

Classic Editor + Developer Profile

Pieter Bos

4 plugins · 53K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
403 days
View full developer profile
Detection Fingerprints

How We Detect Classic Editor +

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Classic Editor +