
Classic Editor + Security & Risk Analysis
wordpress.org/plugins/classic-editor-addonThe "Classic Editor +" plugin disables the block editor, removes enqueued scripts/styles and brings back classic Widgets.
Is Classic Editor + Safe to Use in 2026?
Generally Safe
Score 99/100Classic Editor + has a strong security track record. Known vulnerabilities have been patched promptly.
The static analysis of classic-editor-addon v4.4.1 indicates a generally strong security posture with no identified dangerous functions, file operations, or external HTTP requests. Crucially, all SQL queries are properly prepared, and output is consistently escaped, suggesting good development practices in these areas. The absence of any critical or high-severity taint flows further reinforces this positive assessment, indicating that user-supplied data is unlikely to be mishandled in a way that leads to immediate exploitation.
However, the plugin's vulnerability history presents a significant concern. It has a known CVE, specifically a high-severity Cross-Site Request Forgery (CSRF) vulnerability that was last patched in January 2022. The fact that there are no currently unpatched vulnerabilities is positive, but the presence of a past high-severity CSRF issue highlights a potential weakness in how user actions are authenticated or validated. While the current static analysis shows no explicit CSRF entry points like AJAX handlers or shortcodes without authentication, it's important to remember that CSRF vulnerabilities can sometimes manifest through less obvious means or in older code that might not be fully captured by static analysis alone. The single capability check noted is a positive sign, but its effectiveness in mitigating past vulnerabilities like CSRF would need further investigation.
In conclusion, classic-editor-addon v4.4.1 demonstrates good coding hygiene in its handling of SQL and output. The lack of identified critical code vulnerabilities in the static analysis is reassuring. Nevertheless, the past high-severity CSRF vulnerability serves as a significant warning sign. Users should remain vigilant, ensuring the plugin is updated to the latest version to benefit from any patches addressing this historical issue, and acknowledge the potential for similar vulnerabilities to re-emerge if development practices around state-changing actions are not robust.
Key Concerns
- Known high-severity vulnerability (CSRF)
- Past vulnerability indicates potential weakness
Classic Editor + Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Classic Editor Addon < 2.6.4 - Cross-Site Request Forgery
Classic Editor + Code Analysis
Classic Editor + Attack Surface
WordPress Hooks 10
Maintenance & Trust
Classic Editor + Maintenance & Trust
Maintenance Signals
Community Trust
Classic Editor + Alternatives
Classic Editor and Classic Widgets
classic-editor-and-classic-widgets
Disables Gutenberg editor totally everywhere and enables Classic Editor and Classic Widgets.
WPDevs Classic Editor & Widgets
wpdevs-classic-editor-widgets
WPDevs Classic Editor & Widgets enables the traditional WordPress classic editor, classic widgets, and the previous version of the Edit Post scree …
Classic Editor
classic-editor
Enables the previous "classic" editor and the old-style Edit Post screen with TinyMCE, Meta Boxes, etc. Supports all plugins that extend this screen.
Classic Widgets
classic-widgets
Enables the previous "classic" widgets settings screens in Appearance - Widgets and the Customizer. Disables the block editor from managing widgets.
Advanced Editor Tools
tinymce-advanced
Extends and enhances the block editor (Gutenberg) and the classic editor (TinyMCE).
Classic Editor + Developer Profile
4 plugins · 53K total installs
How We Detect Classic Editor +
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.