JuZ Rich Text Extender Security & Risk Analysis

wordpress.org/plugins/juz-rich-text-extender

Extends the Gutenberg block editor toolbar with custom inline format buttons, with smart nesting validation based on HTML spec rules.

0 active installs v1.0.0 PHP 7.0+ WP 6.1+ Updated Mar 19, 2026
gutenberginline-formatsrich-texttoolbar
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JuZ Rich Text Extender Safe to Use in 2026?

Generally Safe

Score 100/100

JuZ Rich Text Extender has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the juz-rich-text-extender plugin version 1.0.0 exhibits a very strong security posture. The static analysis reveals a complete absence of any identified attack surface points, such as AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals indicate a clean codebase with no dangerous functions, no raw SQL queries (all use prepared statements), and all output is properly escaped. There are also no file operations, external HTTP requests, or instances of missing nonce or capability checks. The taint analysis also shows no identified flows with unsanitized paths across any severity levels.

The vulnerability history further reinforces this positive assessment, with zero known CVEs, currently unpatched vulnerabilities, or any recorded historical vulnerability types. This pattern suggests a well-maintained and secure plugin, with a likely focus on secure coding practices from its developers. The lack of any reported vulnerabilities over time is a significant strength.

In conclusion, the plugin demonstrates excellent security practices. The complete absence of any identified security weaknesses in the static analysis and the lack of historical vulnerabilities strongly suggest a low-risk plugin. There are no specific risks identified in the provided data that would warrant deductions.

Vulnerabilities
None known

JuZ Rich Text Extender Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

JuZ Rich Text Extender Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

JuZ Rich Text Extender Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

JuZ Rich Text Extender Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionenqueue_block_editor_assetsjuz-rich-text-extender.php:47
Maintenance & Trust

JuZ Rich Text Extender Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 19, 2026
PHP min version7.0
Downloads83

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

JuZ Rich Text Extender Developer Profile

Ju'Z[ed]

3 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JuZ Rich Text Extender

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/juz-rich-text-extender/build/index.js
Version Parameters
juz-rich-text-extender/build/index.js?ver=

HTML / DOM Fingerprints

JS Globals
juzRichTextExtender
FAQ

Frequently Asked Questions about JuZ Rich Text Extender