Gutenberg Blocks Library & Toolkit – Editor Plus Security & Risk Analysis

wordpress.org/plugins/editorplus

Editor Plus extends Gutenberg editor with blocks, advanced design controls, typography, icons, Shape Divider, animations and many more features.

7K active installs v2.10.0 PHP 7.2+ WP 5.0+ Updated Nov 9, 2023
blockblockseditorgutenberggutenberg-blocks
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gutenberg Blocks Library & Toolkit – Editor Plus Safe to Use in 2026?

Generally Safe

Score 85/100

Gutenberg Blocks Library & Toolkit – Editor Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The static analysis of editorplus v2.10.0 reveals a surprisingly clean codebase with no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events. This significantly reduces the potential attack surface. Furthermore, the absence of dangerous functions, file operations, external HTTP requests, and importantly, nonce or capability checks suggests a strong emphasis on secure development practices, at least in these specific areas. The taint analysis also shows no identified vulnerabilities.

However, the analysis does highlight some areas of concern. The presence of a single SQL query that does not utilize prepared statements is a direct risk of SQL injection. Similarly, the fact that 100% of the identified output operations are not properly escaped poses a significant risk of Cross-Site Scripting (XSS) vulnerabilities. The plugin also bundles Lodash, which, if outdated, could introduce further risks, although the data does not specify its version or whether it's outdated.

The plugin's vulnerability history is remarkably clean, with zero known CVEs. This indicates a good track record for security. However, the limited scope of the static analysis (0 taint flows) and the lack of comprehensive checks in areas like SQL and output escaping mean that the absence of past vulnerabilities might be more due to luck or a smaller attack surface than robust, universally applied security measures. Despite the lack of past issues, the identified code-level risks require attention.

Key Concerns

  • SQL queries not using prepared statements
  • Output not properly escaped
  • Bundled library (Lodash) potentially outdated
Vulnerabilities
None known

Gutenberg Blocks Library & Toolkit – Editor Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Gutenberg Blocks Library & Toolkit – Editor Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Lodash

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped2 total outputs
Attack Surface

Gutenberg Blocks Library & Toolkit – Editor Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 17
actioninitblocks\index.php:3
filterblock_categories_allblocks\index.php:20
filterblock_categoriesblocks\index.php:22
filtereditor_plus_plugin_cssextensions\icon-inserter\index.php:21
actionwp_headincludes\class-editorplus-styles-manager.php:37
actionwp_footerincludes\class-editorplus-styles-manager.php:45
actionbody_classincludes\class-editorplus-styles-manager.php:52
filtereditor_plus_css_codeincludes\class-editorplus-styles-manager.php:53
actioninitincludes\class-editorplus-styles-manager.php:54
filterrender_blockincludes\class-editorplus-styles-manager.php:55
actionadmin_enqueue_scriptsincludes\class-editorplus.php:221
actioninitincludes\class-editorplus.php:222
actioninitincludes\class-editorplus.php:223
actionadmin_menuincludes\class-editorplus.php:224
actionadmin_print_scripts-{settings_page_editor_plus}includes\class-editorplus.php:225
filterupload_mimesincludes\class-editorplus.php:226
actionplugins_loadedincludes\class-editorplus.php:248
Maintenance & Trust

Gutenberg Blocks Library & Toolkit – Editor Plus Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedNov 9, 2023
PHP min version7.2
Downloads235K

Community Trust

Rating96/100
Number of ratings38
Active installs7K
Developer Profile

Gutenberg Blocks Library & Toolkit – Editor Plus Developer Profile

Munir Kamal

8 plugins · 49K total installs

67
trust score
Avg Security Score
83/100
Avg Patch Time
313 days
View full developer profile
Detection Fingerprints

How We Detect Gutenberg Blocks Library & Toolkit – Editor Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/editorplus/dist/gutenberg-editor-style.css/wp-content/plugins/editorplus/dist/gutenberg-editor.js/wp-content/plugins/editorplus/assets/scripts/lodash-conflict.js/wp-content/plugins/editorplus/assets/scripts/lottie-player.js/wp-content/plugins/editorplus/dist/style-gutenberg-frontend-style.css/wp-content/plugins/editorplus/assets/scripts/frontend.js/wp-content/plugins/editorplus/dist/style-admin.css/wp-content/plugins/editorplus/dist/admin.js
Script Paths
/wp-content/plugins/editorplus/dist/gutenberg-editor.js/wp-content/plugins/editorplus/assets/scripts/lodash-conflict.js/wp-content/plugins/editorplus/assets/scripts/lottie-player.js/wp-content/plugins/editorplus/assets/scripts/frontend.js/wp-content/plugins/editorplus/dist/admin.js
Version Parameters
editorplus/style.css?ver=editorplus-plugin-style?ver=editor_plus-plugin-script?ver=editor_plus-lodash-conflict-script?ver=editor-plus-lottie-script?ver=editor_plus-plugin-frontend-style?ver=editor_plus-plugin-frontend-script?ver=editor-plus-admin-style?ver=editor-plus-admin-script?ver=

HTML / DOM Fingerprints

CSS Classes
editor-plus-root
JS Globals
editor_plus_extensioneplus_data
Shortcode Output
<div id="editor-plus-root"></div>
FAQ

Frequently Asked Questions about Gutenberg Blocks Library & Toolkit – Editor Plus