Moods Addon for Ultimate TinyMCE Security & Risk Analysis

wordpress.org/plugins/moods-addon-for-ultimate-tinymce

Add over 50 animated smilies to your visual tinymce editor.

90 active installs v1.2 PHP + WP 3.2.1+ Updated Feb 9, 2012
buttonbuttonseditorsmileytinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Moods Addon for Ultimate TinyMCE Safe to Use in 2026?

Generally Safe

Score 85/100

Moods Addon for Ultimate TinyMCE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The static analysis of "moods-addon-for-ultimate-tinymce" v1.2 reveals an exceptionally clean codebase from a security perspective. There are no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code demonstrates strong security practices by not utilizing dangerous functions, performing all SQL queries with prepared statements, and ensuring all output is properly escaped. The absence of file operations, external HTTP requests, nonce checks, and capability checks also contributes to a reduced attack surface.

Taint analysis found no flows with unsanitized paths, indicating no immediate risks of data injection or manipulation through the analyzed code paths. The plugin's vulnerability history is also clear, with no known CVEs recorded. This lack of historical vulnerabilities suggests either a well-maintained codebase or a lack of past security scrutiny. While the absence of any identified vulnerabilities or exploitable code paths is a significant strength, the complete lack of any demonstrable entry points or security checks (like nonces or capability checks) might suggest a limited functionality or that the plugin's interaction with WordPress is minimal and managed entirely by the parent plugin (Ultimate TinyMCE).

In conclusion, based on the provided static analysis and vulnerability history, "moods-addon-for-ultimate-tinymce" v1.2 presents a very low immediate security risk. The code adheres to best practices in its observed components. However, the minimal attack surface and lack of specific security checks might also indicate a simple plugin or that its security is implicitly handled by the host plugin. Without understanding the plugin's actual functionality and how it integrates, it's difficult to definitively assess its overall security posture beyond the code provided.

Vulnerabilities
None known

Moods Addon for Ultimate TinyMCE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Moods Addon for Ultimate TinyMCE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Moods Addon for Ultimate TinyMCE Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtermce_buttons_2main.php:41
filtermce_external_pluginsmain.php:50
Maintenance & Trust

Moods Addon for Ultimate TinyMCE Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedFeb 9, 2012
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings1
Active installs90
Developer Profile

Moods Addon for Ultimate TinyMCE Developer Profile

Josh

5 plugins · 41K total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Moods Addon for Ultimate TinyMCE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/moods-addon-for-ultimate-tinymce/moods/editor_plugin.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Moods Addon for Ultimate TinyMCE