
POEditor Security & Risk Analysis
wordpress.org/plugins/poeditorThis plugin will let you manage your POEditor translations directly from Wordpress via the POEditor API.
Is POEditor Safe to Use in 2026?
Generally Safe
Score 95/100POEditor has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The 'poeditor' plugin version 0.9.12 presents a mixed security posture. While it demonstrates good practices in using prepared statements for SQL queries and a significant percentage of properly escaped outputs, there are notable concerns. The presence of two unprotected AJAX handlers is a significant risk, creating a direct attack surface that could be exploited. The use of the `unserialize` function, a known dangerous function, without further context on its usage and sanitization, raises red flags. The vulnerability history is also a concern, with a total of four known CVEs, including one high and three medium severity vulnerabilities. The common vulnerability types, Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS), are often linked to insufficient input validation and improper handling of user-supplied data, which aligns with the observed issues in the static analysis. The most recent vulnerability being in 2025 suggests that vulnerabilities have been discovered and patched, but the pattern of past issues cannot be ignored.
Key Concerns
- Unprotected AJAX handlers
- Dangerous function unserialize used
- One high severity CVE
- Three medium severity CVEs
- Flows with unsanitized paths
POEditor Security Vulnerabilities
CVEs by Year
Severity Breakdown
4 total CVEs
POEditor <= 0.9.10 - Cross-Site Request Forgery
POEditor <= 0.9.8 - Authenticated (Administrator+) Stored Cross-Site Scripting
POEditor <= 0.9.4 - Cross-Site Request Forgery
POEditor <= 0.9.7 - Cross-Site Request Forgery
POEditor Release Timeline
POEditor Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
POEditor Attack Surface
AJAX Handlers 2
WordPress Hooks 6
Maintenance & Trust
POEditor Maintenance & Trust
Maintenance Signals
Community Trust
POEditor Alternatives
Polylang
polylang
Go multilingual in a simple and efficient way. Keep writing posts and taxonomy terms as usual while defining their languages all at once.
Ray Enterprise Translation
lingotek-translation
Convenient cloud-based localization and translation for WordPress.
WP Multilang – Translation and Multilingual Plugin
wp-multilang
Multilingual plugin for WordPress. Go Multilingual in minutes with full WordPress support. Translate your site easily with this localization plugin.
WPGlobus
wpglobus
Multilingual/Globalization: URL-based multilanguage with an easy translation interface.
wpLingua – Automatic translation – Translate and make website multilingual
wplingua
Make your websites multilingual and translate them automatically: no word limits, editable translations, SEO-friendly, no coding knowledge needed
POEditor Developer Profile
1 plugin · 600 total installs
How We Detect POEditor
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/poeditor/css/poeditor.css/wp-content/plugins/poeditor/css/jquery.jgrowl.min.css/wp-content/plugins/poeditor/js/poeditor.js/wp-content/plugins/poeditor/js/jquery.jgrowl.min.js/wp-content/plugins/poeditor/js/poeditor.js/wp-content/plugins/poeditor/js/jquery.jgrowl.min.jspoeditor/style.css?ver=poeditor/script.js?ver=HTML / DOM Fingerprints
poeditor-wrapperpoeditor-change-api-keypoeditor-projectspoeditor-languagespoeditor-filespoeditor-assignmentspoeditor-add-languagepoeditor-add-project<!-- POEDITOR: DO NOT MODIFY THIS FILE DIRECTLY -->data-poeditor-project-iddata-poeditor-language-iddata-poeditor-file-idwindow.poeditor_ajax_urlwindow.poeditor_vars/wp-json/poeditor/v1/scan/wp-json/poeditor/v1/projects/wp-json/poeditor/v1/languages