Disable Visual Editor WYSIWYG Security & Risk Analysis

wordpress.org/plugins/disable-visual-editor-wysiwyg

This plugin will disable the visual editor for selected page/post..

2K active installs v1.7.2 PHP + WP 3.0.0+ Updated Feb 21, 2018
admindisableeditorvisualwysiwyg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable Visual Editor WYSIWYG Safe to Use in 2026?

Generally Safe

Score 85/100

Disable Visual Editor WYSIWYG has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'disable-visual-editor-wysiwyg' plugin, version 1.7.2, exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, raw SQL queries, file operations, or external HTTP requests is highly commendable. Furthermore, the plugin demonstrates good practices by implementing nonce checks, which are crucial for preventing cross-site request forgery (CSRF) attacks.

The static analysis reveals a very small attack surface with zero entry points, including AJAX handlers, REST API routes, shortcodes, and cron events. This significantly limits the potential vectors for exploitation. The taint analysis also reports no flows with unsanitized paths or vulnerabilities of any severity, indicating that user-supplied input is likely handled safely within the plugin's code.

The plugin's vulnerability history is clean, with no known CVEs recorded. This suggests a well-maintained and secure codebase over its lifecycle. While the output escaping is noted as 0% properly escaped, this is a minor concern given the limited attack surface and the lack of any actual exploitable vulnerabilities identified. Overall, this plugin appears to be a secure choice, with its strengths far outweighing its minor weaknesses.

Key Concerns

  • Output escaping is not properly implemented
Vulnerabilities
None known

Disable Visual Editor WYSIWYG Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable Visual Editor WYSIWYG Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Disable Visual Editor WYSIWYG Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterwp_default_editordisable-visual-editor-wysiwyg.php:30
filteradmin_footerdisable-visual-editor-wysiwyg.php:31
actionplugins_loadeddisable-visual-editor-wysiwyg.php:32
actionadmin_initdisable-visual-editor-wysiwyg.php:41
actionadd_meta_boxesdisable-visual-editor-wysiwyg.php:45
actionsave_postdisable-visual-editor-wysiwyg.php:46
Maintenance & Trust

Disable Visual Editor WYSIWYG Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 21, 2018
PHP min version
Downloads45K

Community Trust

Rating100/100
Number of ratings22
Active installs2K
Developer Profile

Disable Visual Editor WYSIWYG Developer Profile

stanxp

1 plugin · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Disable Visual Editor WYSIWYG

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable Visual Editor WYSIWYG