Coexist with Gutenberg Security & Risk Analysis

wordpress.org/plugins/coexist-with-gutenberg

Add UI to coexist with Gutenberg happily.

0 active installs v1.0 PHP 5.6+ WP 4.9.8+ Updated Oct 24, 2018
editorgutenberg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Coexist with Gutenberg Safe to Use in 2026?

Generally Safe

Score 85/100

Coexist with Gutenberg has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The coexist-with-gutenberg plugin v1.0 presents an excellent security posture based on the provided static analysis. The complete absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and output escaping issues indicates a strong commitment to secure coding practices. Furthermore, the lack of file operations, external HTTP requests, and the secure handling of entry points like AJAX, REST API, and shortcodes, all protected by capability checks or absent entirely, further reinforce its secure design. The vulnerability history being clean also suggests a well-maintained and secure plugin over time.

However, the analysis does reveal some potential areas for improvement, or rather, areas where functionality might be limited due to the lack of certain security mechanisms. The complete absence of nonce checks and capability checks on any entry points, even though there are zero unprotected entry points, might be a concern if the plugin were to evolve and introduce new functionalities that could be exploited. While currently not an issue with the existing attack surface, it's a practice that could lead to vulnerabilities in future updates if not implemented.

In conclusion, based on the provided data, this plugin exhibits a very strong security profile. The current implementation appears to be robust and free from known vulnerabilities. The primary "concern" is more of a missed opportunity for proactive security implementation (like nonces and capability checks on entry points that currently don't exist) which could become relevant if the plugin's functionality expands.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Coexist with Gutenberg Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Coexist with Gutenberg Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Coexist with Gutenberg Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitcoexist-with-gutenberg.php:23
actioninitcoexist-with-gutenberg.php:24
actionadmin_menucoexist-with-gutenberg.php:25
filtersubmenu_filecoexist-with-gutenberg.php:26
actionadmin_bar_menucoexist-with-gutenberg.php:27
actionadmin_print_scripts-post.phpcoexist-with-gutenberg.php:83
Maintenance & Trust

Coexist with Gutenberg Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedOct 24, 2018
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Coexist with Gutenberg Developer Profile

PRESSMAN

20 plugins · 100 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Coexist with Gutenberg

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Coexist with Gutenberg