
HTML Mode Locker Security & Risk Analysis
wordpress.org/plugins/html-mode-lockerAdds and option to lock post editor in HTML Mode on selected post types on per-item basis.
Is HTML Mode Locker Safe to Use in 2026?
Generally Safe
Score 85/100HTML Mode Locker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "html-mode-locker" plugin v0.5 presents a generally good security posture with several strong practices in place. The absence of known CVEs and a lack of critical or high-severity taint flows are significant positives, suggesting the plugin has a clean history and the code may be robust against common attack vectors. The plugin also demonstrates good internal security by utilizing prepared statements for all SQL queries and implementing nonce and capability checks for its entry points, ensuring proper authorization and preventing common Cross-Site Request Forgery (CSRF) issues. The attack surface is also minimal, with only one AJAX handler and no exposed REST API routes, shortcodes, or cron events.
However, a notable concern arises from the static analysis indicating that 0% of output is properly escaped. This means that any data being displayed back to the user, especially if it originates from user input or external sources, is not being sanitized, creating a high risk for Cross-Site Scripting (XSS) vulnerabilities. While there are no direct evidence of exploitable taint flows in the provided data, the lack of output escaping creates a fertile ground for XSS attacks to be chained with other potential weaknesses that might not be immediately apparent. The vulnerability history is clean, but this does not negate the immediate risk posed by unescaped output.
In conclusion, the plugin has a strong foundation in terms of authorization, SQL handling, and a small attack surface. Nevertheless, the complete lack of output escaping is a critical security oversight that significantly elevates the risk profile. While the plugin's history is reassuring, this one weakness is substantial and requires immediate attention to prevent potential XSS attacks.
Key Concerns
- Unescaped output (0% escaped)
HTML Mode Locker Security Vulnerabilities
HTML Mode Locker Code Analysis
Output Escaping
HTML Mode Locker Attack Surface
AJAX Handlers 1
WordPress Hooks 7
Maintenance & Trust
HTML Mode Locker Maintenance & Trust
Maintenance Signals
Community Trust
HTML Mode Locker Alternatives
Preserved HTML Editor Markup Plus
preserved-html-editor-markup-plus
Preserves HTML and developer edits in HTML AND WYSIWYG tab. Supports inline scripts/css, JavaScript code blocks and HTML5 content editing
Always Edit In HTML
always-edit-in-html
Always opens up a specific page or post in HTML mode to preserve HTML code (classic editor only).
Contact Form 7 Syntax Highlighting
cf7-ace-syntax-highlighting
Adds syntax higlighting to the Contact Form 7 admin screens. Requires the Contact Form 7 plugin.
HTML Editor for Contact Form 7
cf7-coder
Add HTML editor to Contact Form 7 with code highlighter and extended form options.
Protect schema.org markup in HTML editor
protect-schemaorg-markup-in-html-editor
Easy tool to stop HTML editor from removing schema.org/microdata tags from post or page content.
HTML Mode Locker Developer Profile
2 plugins · 300 total installs
How We Detect HTML Mode Locker
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/html-mode-locker/css/pointer.css/wp-content/plugins/html-mode-locker/js/pointers.js/wp-content/plugins/html-mode-locker/js/pointers.jshtml-mode-locker/css/pointer.css?ver=html-mode-locker/js/pointers.js?ver=HTML / DOM Fingerprints
html-mode-locker-settings<!-- HTML Mode Locker metabox will appear on selected post types editor screen. --><!-- About This Tour --><!-- Plugin Updates -->post_typeid="html-mode-lock"name="html_mode_lock"id="html-mode-locker-settings"data-pointerwindow.html_mode_lock_pointers