Disable Gutenberg Security & Risk Analysis

wordpress.org/plugins/easy-disable-wp-editor

This plugin disabled gutenberg editor on your website with any WordPress theme. No additional settings required.

0 active installs v1.0 PHP 5.2.4+ WP 3.0+ Updated Dec 13, 2018
disable-gutenbergdisable-wp-editorgutenberggutenberg-disable
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable Gutenberg Safe to Use in 2026?

Generally Safe

Score 85/100

Disable Gutenberg has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "easy-disable-wp-editor" v1.0 plugin exhibits an exceptionally strong security posture. The static analysis reveals no discernible attack surface, with zero AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals indicate a complete absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and, critically, any form of nonce or capability checks. This suggests that the plugin either has a very limited functionality that doesn't necessitate these security measures, or its implementation is incredibly robust in its simplicity. The vulnerability history is equally clean, with no recorded CVEs, indicating a lack of known exploits and a consistent history of secure development. While the absence of these common WordPress security entry points and the pristine vulnerability record are highly positive indicators, the complete lack of nonces and capability checks, while seemingly not exploitable due to the minimal attack surface, could be a point of concern if the plugin's functionality were to be expanded in the future without proper security implementations. Overall, this plugin appears to be highly secure in its current state.

Key Concerns

  • No Nonce Checks
  • No Capability Checks
Vulnerabilities
None known

Disable Gutenberg Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Disable Gutenberg Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable Gutenberg Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtergutenberg_can_edit_post_typedisable-wp-editor.php:15
filteruse_block_editor_for_post_typedisable-wp-editor.php:16
Maintenance & Trust

Disable Gutenberg Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedDec 13, 2018
PHP min version5.2.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Disable Gutenberg Developer Profile

osamabaqi123

2 plugins · 50 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Disable Gutenberg

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable Gutenberg