Cleanup HTML Security & Risk Analysis

wordpress.org/plugins/clean-html

Adds a button to your classic editor visual toolbar that when clicked strips all div, 'table', span tags from your post HTML code -- those a …

4K active installs v1.1 PHP + WP 3.0+ Updated Nov 30, 2020
clean-htmlhtmltinymcewysiwyg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cleanup HTML Safe to Use in 2026?

Generally Safe

Score 85/100

Cleanup HTML has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'clean-html' v1.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly reduces the attack surface. Furthermore, the code shows excellent practices regarding dangerous functions, SQL queries (all prepared), and output escaping, with 100% of all analyzed aspects being secure. The vulnerability history is also clean, with no recorded CVEs, indicating a well-maintained and secure plugin over time.

While the plugin appears very secure on the surface, the lack of any taint analysis flows makes it impossible to definitively rule out potential vulnerabilities that might arise from complex data interactions. The presence of two capability checks is a positive sign, but without knowing the context of these checks, it's difficult to assess their effectiveness fully. The bundling of TinyMCE, while common, could be a minor concern if the bundled version is outdated and has known vulnerabilities, though this is not explicitly stated in the analysis.

Overall, 'clean-html' v1.1 appears to be a robustly secured plugin with a minimal attack surface and no known vulnerabilities. The excellent adherence to secure coding practices is a significant strength. The only areas for potential, though unconfirmed, concern would be if the taint analysis revealed hidden issues or if the bundled TinyMCE library is outdated. However, based solely on the provided data, the plugin's security is very high.

Key Concerns

  • Bundled library with potential for known vulnerabilities
Vulnerabilities
None known

Cleanup HTML Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cleanup HTML Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE
Attack Surface

Cleanup HTML Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedcleanup-html.php:15
actioninitcleanup-html.php:21
filtermce_external_pluginscleanup-html.php:30
filtermce_buttonscleanup-html.php:31
actioninitcleanup-html.php:62
Maintenance & Trust

Cleanup HTML Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedNov 30, 2020
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings4
Active installs4K
Developer Profile

Cleanup HTML Developer Profile

closemarketing

10 plugins · 8K total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cleanup HTML

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/clean-html/tinymce/editor_plugin.js/wp-content/plugins/clean-html/cleanup-html.js
Script Paths
/wp-content/plugins/clean-html/tinymce/editor_plugin.js/wp-content/plugins/clean-html/cleanup-html.js

HTML / DOM Fingerprints

JS Globals
cleanuphtml
FAQ

Frequently Asked Questions about Cleanup HTML