Edithor Security & Risk Analysis

wordpress.org/plugins/edithor

Tool extending the new Gutenberg block editor. Simply create and design custom pages by using beautiful templates, layouts & blocks.

10 active installs v1.0.2 PHP 5.3+ WP 5.0+ Updated Mar 24, 2024
blockseditorgutenbergpage-buildertemplates
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Edithor Safe to Use in 2026?

Generally Safe

Score 85/100

Edithor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The edithor v1.0.2 plugin exhibits an exceptionally clean static analysis profile. It reports zero AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal attack surface. Furthermore, the absence of dangerous functions, unsanitized taint flows, raw SQL queries, unescaped output, file operations, external HTTP requests, and even nonce or capability checks suggests that the plugin's codebase adheres strictly to secure coding practices. The lack of any recorded CVEs, either historical or currently unpatched, reinforces this positive security posture, indicating a consistent history of vulnerability-free development.

While the absence of any identified security issues is commendable, the complete lack of certain security mechanisms, such as nonce checks and capability checks, is noteworthy. Though the static analysis reports no unprotected entry points, the inherent reliance on WordPress's core security hooks for these checks means that any future exposure or misconfiguration of these mechanisms in WordPress itself could potentially lead to vulnerabilities that this plugin, in its current state, might not be inherently protected against. Overall, edithor v1.0.2 presents a very strong security profile based on the provided data, with no immediate exploitable weaknesses detected.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Edithor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Edithor Release Timeline

v1.0.2Current
v1.0.1
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

Edithor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Edithor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionenqueue_block_editor_assetsinc/init.php:55
actionupgrader_process_completeinc/init.php:66
Maintenance & Trust

Edithor Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMar 24, 2024
PHP min version5.3
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Edithor Developer Profile

Edithor

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Edithor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/edithor/dist/blocks.build.js/wp-content/plugins/edithor/dist/blocks.editor.build.css
Script Paths
/wp-content/plugins/edithor/dist/blocks.build.js
Version Parameters
edithor/dist/blocks.build.js?ver=edithor/dist/blocks.editor.build.css?ver=

HTML / DOM Fingerprints

JS Globals
window.edithor_paramsedithor_params
FAQ

Frequently Asked Questions about Edithor