
Classic Editor and Classic Widgets Security & Risk Analysis
wordpress.org/plugins/classic-editor-and-classic-widgetsDisables Gutenberg editor totally everywhere and enables Classic Editor and Classic Widgets.
Is Classic Editor and Classic Widgets Safe to Use in 2026?
Generally Safe
Score 99/100Classic Editor and Classic Widgets has a strong security track record. Known vulnerabilities have been patched promptly.
The "classic-editor-and-classic-widgets" plugin exhibits a mixed security posture. The static analysis reveals a very small attack surface, with only one identified entry point, an AJAX handler. While most code signals are positive, including excellent output escaping and the use of prepared statements for all SQL queries, the absence of capability checks on the AJAX handler is a significant concern. This unprotected entry point could be exploited if it performs sensitive operations.
The plugin's vulnerability history is concerning, with two previously disclosed medium severity vulnerabilities, one being SQL Injection and the other CSRF. While these are currently patched, the recurrence of such issues suggests potential weaknesses in the plugin's security development lifecycle. The fact that these were medium severity and are now patched is a positive sign, but the historical pattern warrants caution.
Overall, the plugin has strengths in code hygiene and a limited attack surface. However, the unprotected AJAX handler represents a critical immediate risk. The historical vulnerability pattern, despite current patching, indicates a need for continued vigilance and thorough security testing. It's recommended to address the unprotected AJAX handler with an immediate capability check to mitigate the most pressing risk.
Key Concerns
- Unprotected AJAX handler
- Historical medium severity vulnerabilities (2)
Classic Editor and Classic Widgets Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Classic Editor and Classic Widgets <= 1.4.1 - Authenticated (Subscriber+) SQL Injection
Classic Editor and Classic Widgets <= 1.2.5 - Cross-Site Request Forgery via render_settings_page
Classic Editor and Classic Widgets Code Analysis
SQL Query Safety
Output Escaping
Classic Editor and Classic Widgets Attack Surface
AJAX Handlers 1
WordPress Hooks 19
Maintenance & Trust
Classic Editor and Classic Widgets Maintenance & Trust
Maintenance Signals
Community Trust
Classic Editor and Classic Widgets Alternatives
Enable Classic Editor & Widgets
enable-classic-editor
A simple & lightweight plugin to enable the classic editor on WordPress with advanced configuration options.
WP Disable Block Editor
wp-disable-block-editor
This plugin will WP Disable Block Editor & enable the Classic Editor and original Edit Post screen (TinyMCE, meta boxes, etc all).
WPDevs Classic Editor & Widgets
wpdevs-classic-editor-widgets
WPDevs Classic Editor & Widgets enables the traditional WordPress classic editor, classic widgets, and the previous version of the Edit Post scree …
Daisy Disable Blocks — Disable Gutenberg, Enable Classic Editor, Disable Block Editor
daisy-disable-blocks
Disable Gutenberg Blocks and restore the Classic Editor with a simple toggle.
Habibur Classic Editor Switch
habibur-classic-editor-switch
Disables the block editor (Gutenberg) in WordPress and enables the classic editor.
Classic Editor and Classic Widgets Developer Profile
3 plugins · 40K total installs
How We Detect Classic Editor and Classic Widgets
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/classic-editor-and-classic-widgets/assets/js/jquery-ui.min.jsclassic-editor-and-classic-widgets/assets/js/jquery-ui.min.js?ver=HTML / DOM Fingerprints
name="classic-editor"value=""