f(x) Editor Security & Risk Analysis

wordpress.org/plugins/fx-editor

Power-up Your WordPress Visual Editor with Boxes, Buttons, Columns, and more...

1K active installs v1.4.0 PHP + WP 4.5+ Updated Dec 9, 2016
boxeseditortinymcevisual-editorwp-editor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is f(x) Editor Safe to Use in 2026?

Generally Safe

Score 85/100

f(x) Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the fx-editor plugin version 1.4.0 presents a very strong security posture. The complete absence of identified attack surface vectors like AJAX handlers, REST API routes, shortcodes, and cron events, especially without authentication checks, is a significant strength. Furthermore, the code signals indicate excellent development practices, with no dangerous functions, all SQL queries utilizing prepared statements, and all output being properly escaped. The lack of file operations and external HTTP requests further reduces the potential for common attack vectors. The plugin also shows a clean vulnerability history, with no recorded CVEs, suggesting a history of secure development and maintenance.

While the absence of taint analysis findings is positive, it's important to note that static analysis can have limitations and may not always catch all potential vulnerabilities, especially in complex or dynamic code. The lack of any recorded vulnerabilities historically is a good indicator, but it's always wise to remain vigilant. The complete absence of nonce and capability checks is a potential area for improvement. While the attack surface is currently zero, if any new features are added that introduce entry points, the lack of these checks could become a significant risk. Overall, fx-editor v1.4.0 appears to be a highly secure plugin with robust development practices, with the only notable area for attention being the absence of nonce and capability checks which, while not an issue in the current version, represents a missed opportunity for proactive security.

Key Concerns

  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

f(x) Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

f(x) Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
21 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped21 total outputs
Attack Surface

f(x) Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
actionplugins_loadedfx-editor.php:25
filterfx_editor_wp_page_editor_idsincludes\filters.php:8
filterfx_editor_underline_editor_idsincludes\filters.php:9
filterfx_editor_backcolor_editor_idsincludes\filters.php:10
filterfx_editor_boxes_editor_idsincludes\filters.php:11
filterfx_editor_buttons_editor_idsincludes\filters.php:12
filterfx_editor_columns_editor_idsincludes\filters.php:13
filterfx_editor_coder_editor_idsincludes\filters.php:14
actioninitincludes\mce-editor.php:19
filtermce_external_pluginsincludes\mce-editor.php:29
filtermce_buttonsincludes\mce-editor.php:32
filtermce_buttonsincludes\mce-editor.php:33
filtermce_buttons_2includes\mce-editor.php:36
filtermce_buttons_2includes\mce-editor.php:37
filtermce_buttons_3includes\mce-editor.php:40
filtermce_buttons_4includes\mce-editor.php:43
filtermce_buttons_4includes\mce-editor.php:44
filtermce_buttons_4includes\mce-editor.php:45
filtermce_cssincludes\mce-editor.php:48
actionwp_enqueue_scriptsincludes\mce-editor.php:51
filtertiny_mce_before_initincludes\mce-editor.php:54
actionadmin_menuincludes\settings.php:46
actionadmin_initincludes\settings.php:49
Maintenance & Trust

f(x) Editor Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedDec 9, 2016
PHP min version
Downloads16K

Community Trust

Rating100/100
Number of ratings6
Active installs1K
Developer Profile

f(x) Editor Developer Profile

David Chandra Purnama

12 plugins · 2K total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect f(x) Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fx-editor/assets/css/fx-editor-frontend.css/wp-content/plugins/fx-editor/assets/css/fx-editor-admin.css/wp-content/plugins/fx-editor/assets/js/fx-editor-frontend.js/wp-content/plugins/fx-editor/assets/js/fx-editor-admin.js
Script Paths
/wp-content/plugins/fx-editor/assets/mce-plugins/mce-plugin-boxes.js/wp-content/plugins/fx-editor/assets/mce-plugins/mce-plugin-buttons.js/wp-content/plugins/fx-editor/assets/mce-plugins/mce-plugin-columns.js/wp-content/plugins/fx-editor/assets/mce-plugins/mce-plugin-coder.js/wp-content/plugins/fx-editor/assets/mce-plugins/mce-plugin-line-break.js
Version Parameters
fx-editor/style.css?ver=fx-editor/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
fx-editor-btn
Data Attributes
data-fx-editor-modal
JS Globals
fx_editor_i18n
FAQ

Frequently Asked Questions about f(x) Editor