
Classic Visual Editor Options Security & Risk Analysis
wordpress.org/plugins/classic-visual-editor-optionsRestores the “Visual Editor Options” section in user profiles.
Is Classic Visual Editor Options Safe to Use in 2026?
Generally Safe
Score 100/100Classic Visual Editor Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'classic-visual-editor-options' v1.0.2 exhibits a generally strong security posture due to several good practices observed in the static analysis. Notably, all SQL queries utilize prepared statements, and all output is properly escaped, which are crucial for preventing common web vulnerabilities like SQL injection and cross-site scripting (XSS). The absence of file operations and external HTTP requests further reduces the attack surface. The plugin also includes nonce checks and capability checks, indicating an awareness of WordPress security mechanisms.
However, a significant concern is the presence of one AJAX handler that lacks authentication checks. This creates an unprotected entry point into the plugin's functionality, which could potentially be exploited if the AJAX action performs sensitive operations. While the taint analysis did not reveal any unsanitized flows, the unprotected AJAX handler remains a critical area of risk that needs immediate attention. The lack of any recorded vulnerabilities in its history is a positive indicator, suggesting a commitment to secure development or simply a lack of discovered issues, but it should not be a reason to overlook the identified unprotected entry point.
In conclusion, the plugin demonstrates good coding practices in preventing common vulnerabilities like SQLi and XSS. Its primary weakness lies in an unprotected AJAX handler, which is a critical security flaw. Addressing this specific issue should be the immediate priority to improve the plugin's overall security. The lack of historical vulnerabilities is encouraging, but the identified unprotected entry point necessitates a cautious approach.
Key Concerns
- Unprotected AJAX handler
Classic Visual Editor Options Security Vulnerabilities
Classic Visual Editor Options Code Analysis
Output Escaping
Classic Visual Editor Options Attack Surface
AJAX Handlers 1
WordPress Hooks 5
Maintenance & Trust
Classic Visual Editor Options Maintenance & Trust
Maintenance Signals
Community Trust
Classic Visual Editor Options Alternatives
Classic Editor
classic-editor
Enables the previous "classic" editor and the old-style Edit Post screen with TinyMCE, Meta Boxes, etc. Supports all plugins that extend this screen.
Advanced Editor Tools
tinymce-advanced
Extends and enhances the block editor (Gutenberg) and the classic editor (TinyMCE).
Disable Gutenberg
disable-gutenberg
Disable Gutenberg Block Editor and restore the Classic Editor and original Edit Post screen (TinyMCE, meta boxes, etc.).
Page Builder by SiteOrigin
siteorigin-panels
Build responsive page layouts using the widgets you know and love using this simple drag and drop page builder.
Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
ultimate-member
Membership & community plugin with user profiles, registration & login, member directories, content restriction, user roles and much more.
Classic Visual Editor Options Developer Profile
1 plugin · 200 total installs
How We Detect Classic Visual Editor Options
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/classic-visual-editor-options/classic-visual-editor-options/classic-visual-editor-options.phpHTML / DOM Fingerprints
cveo-visual-editor-warningcveo-dismiss-buttonname="rich_editing"id="rich_editing"ajaxurl