CT Page Editors Security & Risk Analysis

wordpress.org/plugins/ct-page-editors

CT Page Editors allows you to add extra editable sections onto any custom page template.

10 active installs v0.0.1 PHP + WP 3.0.1+ Updated Apr 13, 2015
admincmsformattingpagepages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CT Page Editors Safe to Use in 2026?

Generally Safe

Score 85/100

CT Page Editors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "ct-page-editors" plugin v0.0.1 exhibits a generally positive security posture. The absence of any discovered CVEs and the fact that none are currently unpatched strongly suggest a history of good security practices or a lack of prior detailed security scrutiny. The code analysis reveals a commendable lack of direct SQL injection risks due to the exclusive use of prepared statements and a clean slate regarding file operations and external HTTP requests. Furthermore, the zero-risk taint analysis indicates no critical or high-severity vulnerabilities related to data flow within the analyzed code. However, a significant concern arises from the complete lack of any nonces, capability checks, or proper output escaping, leaving it susceptible to potential cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks, especially if any entry points were to be introduced in future versions. The attack surface, while currently zero, offers no inherent protection mechanisms.

While the current state shows no immediate critical threats, the absence of fundamental security checks like nonce and capability checks is a considerable weakness. The 33% proper output escaping also indicates potential for XSS vulnerabilities if the unescaped outputs are ever exposed to user-controlled data. This indicates that while the plugin may not have been targeted or exploited in the past, it lacks robust defenses that are standard for secure WordPress development. Future development must prioritize implementing appropriate nonce and capability checks for any new entry points and ensure all output is properly escaped to mitigate these identified risks.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Only 33% of outputs properly escaped
Vulnerabilities
None known

CT Page Editors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CT Page Editors Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<ct-page-editors> (ct-page-editors.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CT Page Editors Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initct-page-editors.php:13
actionsave_postct-page-editors.php:14
Maintenance & Trust

CT Page Editors Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedApr 13, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CT Page Editors Developer Profile

cntran

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CT Page Editors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
ctpe_content
FAQ

Frequently Asked Questions about CT Page Editors