Deactivate Visual Editor Security & Risk Analysis

wordpress.org/plugins/deactive-visual-editor

A simple plugin-in that deactivates the visual editor for a specific page or post by a custom field set by the author.

100 active installs v0.1 PHP + WP 2.0.2+ Updated Mar 10, 2009
adminpostsvisual-editor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Deactivate Visual Editor Safe to Use in 2026?

Generally Safe

Score 85/100

Deactivate Visual Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "deactive-visual-editor" plugin version 0.1 exhibits an exceptionally strong security posture. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, or critical taint flows is a testament to robust coding practices. Furthermore, the plugin's attack surface is zero, meaning there are no identifiable entry points like AJAX handlers, REST API routes, shortcodes, or cron events that could be exploited. The vulnerability history is also clean, with no recorded CVEs, suggesting a history of secure development or minimal public exposure.

While the lack of any negative findings is a significant strength, it's important to acknowledge that this assessment is based solely on the provided data. A comprehensive security audit would typically involve dynamic analysis and code review of the entire plugin codebase. However, based strictly on the information given, this plugin appears to be highly secure and poses minimal risk to a WordPress installation. The only potential area for minor concern, though not explicitly a deduction based on the data, would be the complete absence of capability checks and nonce checks. While the attack surface is zero, in the theoretical event that an entry point were to be introduced in a future update, these checks would become crucial for maintaining security.

Vulnerabilities
None known

Deactivate Visual Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Deactivate Visual Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Deactivate Visual Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionload-page.phpdeactivate_visual_editor.php:41
actionload-post.phpdeactivate_visual_editor.php:42
Maintenance & Trust

Deactivate Visual Editor Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedMar 10, 2009
PHP min version
Downloads11K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Deactivate Visual Editor Developer Profile

matt_79

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Deactivate Visual Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Deactivate Visual Editor