Pagely MultiEdit Security & Risk Analysis

wordpress.org/plugins/pagely-multiedit

MultiEdit adds tinyMCE editable "blocks" to WordPress custom page templates.

300 active installs v0.9.8.6 PHP + WP 2.9+ Updated May 10, 2016
admincmsformattingpagepages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pagely MultiEdit Safe to Use in 2026?

Generally Safe

Score 85/100

Pagely MultiEdit has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The pagely-multiedit plugin v0.9.8.6 exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, file operations, external HTTP requests, and a concerning attack surface (AJAX handlers, REST API routes, shortcodes, cron events) are all positive indicators. The presence of a capability check further adds to its security, suggesting some level of access control is considered.

However, a significant concern arises from the output escaping. With 100% of outputs not being properly escaped, this plugin presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content displayed to users, if not properly sanitized before rendering, could be exploited by attackers to inject malicious scripts. The lack of taint analysis results also means that potential vulnerabilities in this area might have been missed, or the analysis did not cover critical paths.

Given the plugin's vulnerability history is clear of any recorded CVEs, it suggests a proactive approach to security or a lack of past exploitations. Nevertheless, the unescaped output is a critical flaw that needs immediate attention. The overall security is weakened by this oversight, despite the plugin's clean slate regarding known vulnerabilities and its well-controlled attack surface.

Key Concerns

  • All outputs unescaped, potential XSS
Vulnerabilities
None known

Pagely MultiEdit Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Pagely MultiEdit Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Pagely MultiEdit Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menumultiedit.php:45
actioninitmultiedit.php:108
actionadmin_footermultiedit.php:112
actionedit_page_formmultiedit.php:207
actionedit_form_advancedmultiedit.php:208
Maintenance & Trust

Pagely MultiEdit Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMay 10, 2016
PHP min version
Downloads34K

Community Trust

Rating84/100
Number of ratings5
Active installs300
Developer Profile

Pagely MultiEdit Developer Profile

joshua strebel

2 plugins · 310 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pagely MultiEdit

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pagely-multiedit/pagely_300x250_scales.png/wp-content/plugins/pagely-multiedit/multiedit.css/wp-content/plugins/pagely-multiedit/multiedit.js/wp-content/plugins/pagely-multiedit/pagely-logo.png
Script Paths
/wp-content/plugins/pagely-multiedit/multiedit.js
Version Parameters
multiedit.css?v=multiedit.js?v=

HTML / DOM Fingerprints

CSS Classes
pme_leftmultieditbuttonselectednotactivemultiEditControlmultiEditHiddenmultiEditFreezer
Data Attributes
id="pme_split"id="default"id="hs_id="multiEditControl"id="pagelylogo"id="multiEditHidden"+1 more
JS Globals
PLUGINASSETS
Shortcode Output
[multiedit_region][/multiedit_region]
FAQ

Frequently Asked Questions about Pagely MultiEdit