Editor Appearance Access Security & Risk Analysis

wordpress.org/plugins/editor-appearance-access

A WordPress plugin that grants the Editor user role access to menus under the Appearance menu.

10 active installs v1.0.0 PHP + WP 3.5+ Updated Apr 11, 2020
appearance-menueditor-menu-accesseditor-role-optionsedtiormenus-access
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Editor Appearance Access Safe to Use in 2026?

Generally Safe

Score 85/100

Editor Appearance Access has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "editor-appearance-access" v1.0.0 plugin exhibits a generally strong security posture based on the static analysis. The absence of any detected entry points (AJAX handlers, REST API routes, shortcodes, cron events) significantly limits its attack surface. Furthermore, the code shows good practices by exclusively using prepared statements for its SQL queries and not performing any file operations or external HTTP requests. The lack of any known CVEs, either historical or currently unpatched, is also a positive indicator of its security track record.

However, there are significant concerns stemming from the output escaping and capability checks. With 100% of its outputs unescaped, this presents a considerable risk of cross-site scripting (XSS) vulnerabilities. Any data rendered by the plugin that originates from user input or external sources is not sanitized, making it susceptible to malicious script injection. The complete absence of capability checks for any potential actions or data handling is also a critical oversight, meaning that any user, regardless of their role or permissions, could potentially interact with or manipulate the plugin's functionality if an entry point were to be discovered or introduced in the future. The lack of taint analysis flows, while seemingly positive, could also indicate a very small or non-existent interaction with user-supplied data, which in itself may be a limitation or simply not a feature of the plugin.

In conclusion, while the plugin benefits from a small attack surface and secure data handling for SQL, the critical lack of output escaping and capability checks introduces significant security weaknesses. The primary risk lies in potential XSS vulnerabilities and authorization bypasses, which could have severe consequences if exploited. The plugin's history of zero vulnerabilities is a strength, but it does not negate the immediate and evident risks identified in the static analysis.

Key Concerns

  • Unescaped output (0% properly escaped)
  • Missing capability checks
Vulnerabilities
None known

Editor Appearance Access Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Editor Appearance Access Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Editor Appearance Access Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuadmin\class-editor-appearance-access-admin-display.php:178
actionadmin_initadmin\class-editor-appearance-access-admin-display.php:179
actionadmin_menuadmin\class-editor-appearance-access-admin-display.php:180
actionplugins_loadedincludes\class-editor-appearance-access.php:143
actionadmin_enqueue_scriptsincludes\class-editor-appearance-access.php:158
actionadmin_enqueue_scriptsincludes\class-editor-appearance-access.php:159
actionwp_enqueue_scriptsincludes\class-editor-appearance-access.php:174
actionwp_enqueue_scriptsincludes\class-editor-appearance-access.php:175
Maintenance & Trust

Editor Appearance Access Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 11, 2020
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Editor Appearance Access Developer Profile

byronj

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Editor Appearance Access

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/editor-appearance-access/admin/css/editor-appearance-access-admin.css/wp-content/plugins/editor-appearance-access/admin/js/editor-appearance-access-admin.js
Script Paths
/wp-content/plugins/editor-appearance-access/admin/js/editor-appearance-access-admin.js
Version Parameters
editor-appearance-access/admin/css/editor-appearance-access-admin.css?ver=editor-appearance-access/admin/js/editor-appearance-access-admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Editor Appearance Access