Classic Editor on off Security & Risk Analysis

wordpress.org/plugins/classic-editor-on-off

Description: Classic Editor on off is a plugin that gives the ability to turn off all or some of Gutenberg, reverting to classic editor - where needed …

80 active installs v1.2 PHP 5.2.4+ WP 3.8+ Updated Feb 2, 2023
block-editor-removalclassic-editorclassic-editor-widgetsgutenberg-disableremove-gutenberg-blocks
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Classic Editor on off Safe to Use in 2026?

Generally Safe

Score 85/100

Classic Editor on off has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'classic-editor-on-off' v1.2 plugin exhibits a generally good security posture, particularly in its handling of SQL queries and the absence of known vulnerabilities or CVEs. The static analysis reveals a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is commendable. The presence of capability checks indicates some consideration for authorization, which is a positive sign.

However, there are areas for improvement. The taint analysis identified one flow with an unsanitized path, which, while not classified as critical or high severity, warrants attention. This suggests a potential for unexpected behavior or data manipulation if an attacker can leverage this unsanitized path. Additionally, the output escaping mechanism is only partially implemented, with 33% of outputs being properly escaped. This leaves potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not adequately sanitized before being displayed.

Given the plugin's history of no recorded vulnerabilities and a limited attack surface, the overall risk is currently low. The strengths lie in its clean history and lack of common attack vectors. The weaknesses are primarily in the taint analysis result of an unsanitized path and the incomplete output escaping, which, while not immediately exploitable due to other security measures, represent potential risks that could be amplified in different contexts or with future code changes. Developers should prioritize addressing the unsanitized path and improving output escaping to further harden the plugin.

Key Concerns

  • Flow with unsanitized path identified
  • Only 33% of outputs properly escaped
Vulnerabilities
None known

Classic Editor on off Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Classic Editor on off Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
2 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped6 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
addub_remove_guttenberg_homepage (admin\admin.php:28)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Classic Editor on off Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionwp_enqueue_scriptsadmin\admin.php:14
actionadmin_menuadmin\admin.php:19
actionadmin_enqueue_scriptsadmin\admin.php:475
filtergutenberg_use_widgets_block_editorindex.php:37
filteruse_widgets_block_editorindex.php:40
filteruse_block_editor_for_postindex.php:56
filteruse_block_editor_for_postindex.php:70
filtergutenberg_use_widgets_block_editorindex.php:85
filteruse_widgets_block_editorindex.php:86
filteruse_block_editor_for_postindex.php:87
filteruse_block_editor_for_postindex.php:88
filterplugin_row_metaindex.php:127
actionplugins_loadedindex.php:128
Maintenance & Trust

Classic Editor on off Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedFeb 2, 2023
PHP min version5.2.4
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Classic Editor on off Developer Profile

Irish_Cathal

8 plugins · 640 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Classic Editor on off

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/classic-editor-on-off/css/style.css/wp-content/plugins/classic-editor-on-off/js/logic.js
Script Paths
/wp-content/plugins/classic-editor-on-off/js/logic.js

HTML / DOM Fingerprints

CSS Classes
intro_text_classtabbedElements_firstTab
HTML Comments
<!--First tab -->
Data Attributes
name="btn-to-update-users-selection-of-gutenberg"
FAQ

Frequently Asked Questions about Classic Editor on off