Disable Block Editor (Gutenberg) Security & Risk Analysis

wordpress.org/plugins/disable-editor-by-1-click

Disable Gutenberg editor by 1 click, disable block editor in all Post Type(including custom post type)

20 active installs v2.0.13 PHP 7.2.24+ WP 6.0+ Updated Jun 3, 2024
disable-block-editoreditorgutenberg-disablepost-type-editorwordpress-default-editor
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Disable Block Editor (Gutenberg) Safe to Use in 2026?

Generally Safe

Score 92/100

Disable Block Editor (Gutenberg) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "disable-editor-by-1-click" plugin v2.0.13 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of dangerous functions, reliance on prepared statements for all SQL queries, and 100% output escaping indicate diligent coding practices. Furthermore, the lack of any recorded vulnerabilities, including critical or high severity issues, and no known CVEs, suggests a well-maintained and secure plugin. The attack surface is also notably zero, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed. This clean slate, coupled with a lack of reported issues, paints a picture of a highly secure plugin.

However, it's crucial to acknowledge potential limitations of static analysis alone. The complete absence of capability checks and nonce checks, while not presenting an immediate risk given the zero attack surface, could be a concern if the plugin's functionality were to evolve or expand in the future. Without these fundamental WordPress security mechanisms, any newly introduced entry points could be immediately vulnerable. Despite this, the current state of the plugin is exceptionally secure, with no identifiable vulnerabilities or high-risk code patterns within the provided data.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

Disable Block Editor (Gutenberg) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable Block Editor (Gutenberg) Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable Block Editor (Gutenberg) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filteruse_block_editor_for_post_typedisable-editor-by-1-click.php:17
filtergutenberg_can_edit_post_typedisable-editor-by-1-click.php:20
Maintenance & Trust

Disable Block Editor (Gutenberg) Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 3, 2024
PHP min version7.2.24
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Disable Block Editor (Gutenberg) Developer Profile

mitparakada

1 plugin · 20 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Disable Block Editor (Gutenberg)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable Block Editor (Gutenberg)