
Just TinyMCE Custom Styles Security & Risk Analysis
wordpress.org/plugins/just-tinymce-stylesAdds dropdown options for custom css classes and attributes for tags in WordPress TinyMCE Editor.
Is Just TinyMCE Custom Styles Safe to Use in 2026?
Use With Caution
Score 63/100Just TinyMCE Custom Styles has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The "just-tinymce-styles" plugin exhibits a concerning security posture, primarily due to its unprotected AJAX handler and a history of vulnerabilities, including a currently unpatched medium severity CVE.
The static analysis reveals a small attack surface, but the presence of a single unprotected AJAX handler is a significant weakness. While the plugin utilizes prepared statements for its SQL queries, its output escaping is notably poor, with only 31% of outputs being properly escaped, indicating a potential for cross-site scripting (XSS) vulnerabilities. The use of the `unserialize` function is also a red flag, especially when combined with potentially untrusted data, which could lead to remote code execution.
The plugin's vulnerability history is problematic. The fact that it has a known CVE that remains unpatched is a direct indication of ongoing risk. The mention of Cross-Site Request Forgery (CSRF) as a common vulnerability type in the past, coupled with the unprotected AJAX handler, suggests a potential for attackers to trick users into performing unwanted actions. While the taint analysis did not reveal any explicit unsanitized paths, the other indicators are sufficient to warrant caution. Overall, the plugin demonstrates some good practices like using prepared statements but is severely undermined by unpatched vulnerabilities, unprotected entry points, and insecure coding practices like `unserialize` and poor output escaping.
Key Concerns
- Unprotected AJAX handler
- Unpatched medium severity CVE
- Dangerous function unserialize
- Low output escaping percentage
- Missing nonce checks
- Missing capability checks
Just TinyMCE Custom Styles Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Just TinyMCE Custom Styles <= 1.2.1 - Cross-Site Request Forgery
Just TinyMCE Custom Styles Code Analysis
Dangerous Functions Found
Bundled Libraries
Output Escaping
Just TinyMCE Custom Styles Attack Surface
AJAX Handlers 1
WordPress Hooks 10
Maintenance & Trust
Just TinyMCE Custom Styles Maintenance & Trust
Maintenance Signals
Community Trust
Just TinyMCE Custom Styles Alternatives
Block Responsive – Make Editor Blocks Responsive Easily
block-responsive
Transform any WordPress block into a fully responsive element with device-specific controls for mobile, tablet, and desktop optimization.
Crazy Pills
crazy-pills
Build buttons, boxes, beautiful lists, and highlight text right from your editor, with live preview.
Super Blocks CSS – Custom CSS for Gutenberg Blocks
super-custom-css
Add custom CSS to your Gutenberg blocks directly from the block editor.
Block Style Modifiers
block-style-modifiers
Add multiple block styles to Gutenberg blocks with ease.
Child Theme Configurator
child-theme-configurator
When using the Customizer is not enough - Create a child theme from your installed themes and customize styles, templates, functions and more.
Just TinyMCE Custom Styles Developer Profile
5 plugins · 3K total installs
How We Detect Just TinyMCE Custom Styles
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/just-tinymce-styles/assets/js/jcforms-multifield.js/wp-content/plugins/just-tinymce-styles/assets/css/jcforms-multifield.css/wp-content/plugins/just-tinymce-styles/assets/js/jcforms-multifield.jsHTML / DOM Fingerprints
jc-multifield-addjc-multifield-removejc-multifield-wrapperjc-multifield-itemjc-multifield-fielddata-jtmce-field-idjtmce