Hide Edit With Elementor Security & Risk Analysis

wordpress.org/plugins/hide-edit-with-elementor

Hide the Edit With Elementor button and links for pages and posts that you do not want it used for eg. a front page with custom fields.

40 active installs v1.2.0 PHP 5.6+ WP 5.0+ Updated Feb 14, 2025
editorelementor
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hide Edit With Elementor Safe to Use in 2026?

Generally Safe

Score 92/100

Hide Edit With Elementor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of the "hide-edit-with-elementor" v1.2.0 plugin indicates a generally good security posture. The plugin has a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks. Furthermore, the code analysis shows no dangerous functions, file operations, or external HTTP requests. Output is consistently escaped, and nonce and capability checks are present.

However, a significant concern arises from the SQL queries. The analysis reveals two SQL queries that are not using prepared statements, meaning they are vulnerable to SQL injection if user input is directly incorporated into these queries without proper sanitization. The absence of taint analysis results could mean that either no taint flows were identified or the analysis was incomplete. The vulnerability history is a strong positive, with no known CVEs associated with this plugin, suggesting good security practices in past development or limited exposure to sophisticated attacks.

In conclusion, while the plugin demonstrates excellent control over its attack surface and implementation of basic security checks, the unescaped SQL queries represent a clear and present risk. The lack of historical vulnerabilities is encouraging, but the identified SQL injection vulnerability requires immediate attention. Addressing the SQL query issue would significantly improve the plugin's overall security.

Key Concerns

  • SQL queries not using prepared statements
Vulnerabilities
None known

Hide Edit With Elementor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hide Edit With Elementor Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

100% escaped1 total outputs
Attack Surface

Hide Edit With Elementor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_noticeshide-edit-with-elementor.php:39
actionadmin_inithide-edit-with-elementor.php:47
actionadd_meta_boxesincludes\plugin.php:7
actionsave_postincludes\plugin.php:51
actionadmin_enqueue_scriptsincludes\plugin.php:123
actionwp_enqueue_scriptsincludes\plugin.php:125
actionadmin_headincludes\plugin.php:127
Maintenance & Trust

Hide Edit With Elementor Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 14, 2025
PHP min version5.6
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Hide Edit With Elementor Developer Profile

EngageWeb

2 plugins · 140 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hide Edit With Elementor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hide-edit-with-elementor/assets/js/script.js
Script Paths
/wp-content/plugins/hide-edit-with-elementor/assets/js/script.js
Version Parameters
hide-edit-with-elementor/assets/js/script.js?ver=

HTML / DOM Fingerprints

Data Attributes
name="hewe_switch"id="hewe_switch"
JS Globals
hewevar
FAQ

Frequently Asked Questions about Hide Edit With Elementor