No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor Security & Risk Analysis

wordpress.org/plugins/no-gutenberg

Complete elimination of Gutenberg Block Editor, FSE Global Styles, Block Widgets, Patterns, and WooCommerce blocks. Back to Classic Editor.

9K active installs v2.1.1 PHP 7.4+ WP 4.9+ Updated Dec 24, 2025
blocksclassic-editorfsegutenbergwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor Safe to Use in 2026?

Generally Safe

Score 100/100

No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "no-gutenberg" plugin v2.1.1 demonstrates a generally strong security posture based on the static analysis. The absence of SQL queries not using prepared statements, no file operations, and no external HTTP requests are positive indicators. The presence of a nonce check on the single AJAX handler, while lacking a capability check, suggests an attempt at basic security for its entry point. The total lack of recorded vulnerabilities and CVEs further contributes to a favorable assessment.

However, there are areas for improvement. The most significant concern is the low percentage of properly escaped output (33%). This indicates that a substantial portion of dynamically generated content might be vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is not adequately sanitized before being displayed. While the attack surface is small and the single AJAX handler has a nonce check, the absence of a capability check leaves this entry point potentially exploitable by authenticated users with lower privileges who shouldn't have access.

Overall, the plugin has a solid foundation with its secure handling of data and absence of past vulnerabilities. The primary weakness lies in output escaping, which is a common attack vector. Addressing the unescaped output and implementing capability checks on the AJAX handler would significantly enhance its security.

Key Concerns

  • Low percentage of properly escaped output
  • AJAX handler lacks capability check
Vulnerabilities
None known

No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
5 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped15 total outputs
Attack Surface

No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_ayudawp_dismiss_fse_warningno-gutenberg.php:409
WordPress Hooks 30
actionplugins_loadedno-gutenberg.php:49
actioninitno-gutenberg.php:52
actionwp_enqueue_scriptsno-gutenberg.php:55
actionadmin_enqueue_scriptsno-gutenberg.php:56
actionafter_setup_themeno-gutenberg.php:59
actioninitno-gutenberg.php:62
actioninitno-gutenberg.php:65
actionwp_dashboard_setupno-gutenberg.php:68
actionadmin_menuno-gutenberg.php:71
actioncurrent_screenno-gutenberg.php:74
actioninitno-gutenberg.php:77
actionafter_setup_themeno-gutenberg.php:80
filteruse_block_editor_for_post_typeno-gutenberg.php:83
filteruse_block_editor_for_post_typeno-gutenberg.php:99
filtergutenberg_can_edit_post_typeno-gutenberg.php:103
filterblock_editor_settings_allno-gutenberg.php:171
filteruse_widgets_block_editorno-gutenberg.php:187
actionwidgets_initno-gutenberg.php:190
filtershould_load_remote_block_patternsno-gutenberg.php:212
actioninitno-gutenberg.php:218
actionwp_enqueue_scriptsno-gutenberg.php:270
filterwoocommerce_enable_gutenberg_product_editorno-gutenberg.php:273
filterwoocommerce_admin_featuresno-gutenberg.php:274
filterwoocommerce_feature_product_block_editor_enabledno-gutenberg.php:277
filterwp_theme_json_data_defaultno-gutenberg.php:312
filterwp_theme_json_data_themeno-gutenberg.php:313
filterwp_theme_json_data_userno-gutenberg.php:314
actionadmin_noticesno-gutenberg.php:352
actionafter_switch_themeno-gutenberg.php:438
actionadmin_noticesno-gutenberg.php:449
Maintenance & Trust

No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 24, 2025
PHP min version7.4
Downloads157K

Community Trust

Rating100/100
Number of ratings15
Active installs9K
Developer Profile

No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor Developer Profile

Fernando Tellado

21 plugins · 24K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/no-gutenberg/assets/css/admin-style.css/wp-content/plugins/no-gutenberg/assets/js/admin-script.js
Script Paths
/wp-content/plugins/no-gutenberg/assets/js/admin-script.js
Version Parameters
no-gutenberg/assets/css/admin-style.css?ver=no-gutenberg/assets/js/admin-script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about No Gutenberg – Disable Blocks Editor and Global Styles – Back to Classic Editor