Compact MCE Security & Risk Analysis

wordpress.org/plugins/compact-mce

A simple plugin that re-organize your WordPress editor TinyMCE controls.

200 active installs v19.05 PHP + WP + Updated May 2, 2019
editormcetinymcevisual-editor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Compact MCE Safe to Use in 2026?

Generally Safe

Score 85/100

Compact MCE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The plugin "compact-mce" v19.05 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code analysis reveals no dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. File operations and external HTTP requests are also absent, indicating good security practices in these areas. The lack of any recorded vulnerabilities, including CVEs, suggests a history of stable and secure development.

While the static analysis shows no immediate threats, the complete absence of nonces and capability checks across all entry points (even though there are none in this version) represents a potential concern. If the plugin were to introduce any new entry points in the future without implementing these security measures, it could become vulnerable to various attacks, such as Cross-Site Request Forgery (CSRF) or unauthorized actions. The bundling of TinyMCE also means that any vulnerabilities in TinyMCE itself could potentially affect this plugin, although no specific issues were flagged in the provided data.

In conclusion, "compact-mce" v19.05 appears to be a secure plugin with a clean history and excellent coding practices regarding SQL and output sanitization. The primary area of caution lies in the non-existent but crucial security checks like nonces and capability checks, which, if not addressed during future development, could pose a risk. However, given the current lack of entry points and vulnerability history, the overall risk is currently very low.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
  • Bundled outdated library (TinyMCE)
Vulnerabilities
None known

Compact MCE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Compact MCE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE
Attack Surface

Compact MCE Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterplugin_row_metaindex.php:25
filtermce_external_pluginsindex.php:34
filtermce_buttonsindex.php:58
filtermce_buttons_2index.php:75
Maintenance & Trust

Compact MCE Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMay 2, 2019
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

Compact MCE Developer Profile

Linesh Jose

3 plugins · 510 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Compact MCE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/compact-mce/tinymce/codesample/plugin.min.js/wp-content/plugins/compact-mce/tinymce/contextmenu/plugin.min.js/wp-content/plugins/compact-mce/tinymce/searchreplace/plugin.min.js/wp-content/plugins/compact-mce/tinymce/table/plugin.min.js/wp-content/plugins/compact-mce/tinymce/visualblocks/plugin.min.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Compact MCE