Classic Visual Editor Options Security & Risk Analysis

wordpress.org/plugins/classic-visual-editor-options

Restores the “Visual Editor Options” section in user profiles.

200 active installs v1.0.2 PHP 7.4+ WP 5.0+ Updated Dec 3, 2025
classic-editordisable-editorplain-textuser-profilevisual-editor
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Classic Visual Editor Options Safe to Use in 2026?

Generally Safe

Score 100/100

Classic Visual Editor Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The plugin 'classic-visual-editor-options' v1.0.2 exhibits a generally strong security posture due to several good practices observed in the static analysis. Notably, all SQL queries utilize prepared statements, and all output is properly escaped, which are crucial for preventing common web vulnerabilities like SQL injection and cross-site scripting (XSS). The absence of file operations and external HTTP requests further reduces the attack surface. The plugin also includes nonce checks and capability checks, indicating an awareness of WordPress security mechanisms.

However, a significant concern is the presence of one AJAX handler that lacks authentication checks. This creates an unprotected entry point into the plugin's functionality, which could potentially be exploited if the AJAX action performs sensitive operations. While the taint analysis did not reveal any unsanitized flows, the unprotected AJAX handler remains a critical area of risk that needs immediate attention. The lack of any recorded vulnerabilities in its history is a positive indicator, suggesting a commitment to secure development or simply a lack of discovered issues, but it should not be a reason to overlook the identified unprotected entry point.

In conclusion, the plugin demonstrates good coding practices in preventing common vulnerabilities like SQLi and XSS. Its primary weakness lies in an unprotected AJAX handler, which is a critical security flaw. Addressing this specific issue should be the immediate priority to improve the plugin's overall security. The lack of historical vulnerabilities is encouraging, but the identified unprotected entry point necessitates a cautious approach.

Key Concerns

  • Unprotected AJAX handler
Vulnerabilities
None known

Classic Visual Editor Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Classic Visual Editor Options Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
5 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped5 total outputs
Attack Surface
1 unprotected

Classic Visual Editor Options Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_cveo_dismiss_noticeclassic-visual-editor-options.php:103
WordPress Hooks 5
actionpersonal_optionsclassic-visual-editor-options.php:37
actionpersonal_options_updateclassic-visual-editor-options.php:56
actionedit_user_profile_updateclassic-visual-editor-options.php:57
actionadmin_noticesclassic-visual-editor-options.php:79
actionadmin_enqueue_scriptsclassic-visual-editor-options.php:114
Maintenance & Trust

Classic Visual Editor Options Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version7.4
Downloads1K

Community Trust

Rating100/100
Number of ratings4
Active installs200
Developer Profile

Classic Visual Editor Options Developer Profile

DVeb

1 plugin · 200 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Classic Visual Editor Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/classic-visual-editor-options/
Script Paths
classic-visual-editor-options/classic-visual-editor-options.php

HTML / DOM Fingerprints

CSS Classes
cveo-visual-editor-warningcveo-dismiss-button
Data Attributes
name="rich_editing"id="rich_editing"
JS Globals
ajaxurl
FAQ

Frequently Asked Questions about Classic Visual Editor Options