Editorial Guidelines Security & Risk Analysis

wordpress.org/plugins/editorial-guidelines

With editorial guidelines you can show a quick and small box next to the edit screens of both the page and post page.

10 active installs v1.2 PHP + WP 3+ Updated Unknown
editorialeditorial-guidelinesguidelines
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Editorial Guidelines Safe to Use in 2026?

Generally Safe

Score 100/100

Editorial Guidelines has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "editorial-guidelines" plugin v1.2 exhibits a generally positive security posture due to the absence of known vulnerabilities and a deliberate approach to handling SQL queries. The static analysis shows no dangerous functions, file operations, or external HTTP requests, which are common sources of security flaws. The presence of capability checks, even if limited, is also a positive sign. However, a significant concern arises from the complete lack of output escaping. This means that any dynamic content generated by the plugin could potentially be exploited to inject malicious code into the user's browser, leading to cross-site scripting (XSS) vulnerabilities.

Furthermore, the taint analysis revealed one flow with an unsanitized path, which, although not rated as critical or high severity, still indicates a potential area for exploitation if user-supplied data is not properly handled. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events in the attack surface is a strong positive, as it limits the plugin's exposure. However, the lack of nonce checks, even with a small attack surface, is a minor oversight that could be exploited in conjunction with other vulnerabilities. The plugin's history of zero CVEs is encouraging but should not be a reason for complacency, especially given the identified output escaping and taint flow issues.

In conclusion, while the "editorial-guidelines" plugin has a solid foundation with no known CVEs and secure SQL practices, the critical flaw in output escaping and the identified unsanitized taint flow represent significant security weaknesses. Addressing these issues is paramount to ensuring the plugin's safety. The absence of critical or high-severity taint flows and the limited attack surface are strengths, but they are overshadowed by the immediate risk of XSS due to unescaped output.

Key Concerns

  • 100% of outputs are not properly escaped
  • Taint flow with unsanitized path found
  • 0 nonce checks on entry points
Vulnerabilities
None known

Editorial Guidelines Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Editorial Guidelines Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<editorialguidelines_admin> (editorialguidelines_admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Editorial Guidelines Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menueditorial.php:30
actionadmin_menueditorial.php:32
actionadmin_initeditorial.php:60
Maintenance & Trust

Editorial Guidelines Maintenance & Trust

Maintenance Signals

WordPress version tested3
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Editorial Guidelines Developer Profile

erwinwolff

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Editorial Guidelines

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<br /><a href="">Edit this</a>
FAQ

Frequently Asked Questions about Editorial Guidelines