Post Editor Buttons Security & Risk Analysis

wordpress.org/plugins/post-editor-buttons

This plugin allows you add your own buttons to the post editor's toolbar.

90 active installs v1.7 PHP + WP 2.7+ Updated Feb 23, 2011
add-buttonsbuttonspost-editortoolbartoolbar-buttons
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Editor Buttons Safe to Use in 2026?

Generally Safe

Score 85/100

Post Editor Buttons has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "post-editor-buttons" v1.7 plugin exhibits a generally strong security posture based on the provided static analysis. A significant strength is the complete absence of known CVEs and the fact that all SQL queries utilize prepared statements, demonstrating good database interaction practices. Furthermore, the plugin has no external HTTP requests or file operations, minimizing potential attack vectors. The zero entry points without authentication checks also suggest a thoughtful approach to protecting its functionality.

However, a critical concern arises from the complete lack of output escaping. With 12 total outputs analyzed and 0% properly escaped, this represents a significant vulnerability to Cross-Site Scripting (XSS) attacks. Attackers could potentially inject malicious scripts through the plugin's output, impacting users who interact with these elements. Additionally, the absence of nonce checks and capability checks on any potential entry points, though the static analysis reports zero entry points, is a missed opportunity for robust security even in limited scenarios. The vulnerability history being completely clean is positive, but it doesn't mitigate the identified output escaping issue.

In conclusion, while the plugin avoids common pitfalls like unpatched vulnerabilities and insecure SQL practices, the critical deficiency in output escaping leaves it exposed to XSS. Addressing this oversight is paramount for improving the plugin's overall security. The lack of any recorded vulnerabilities in its history is commendable, but the static analysis clearly highlights a significant and addressable risk.

Key Concerns

  • All outputs are unescaped
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Post Editor Buttons Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Editor Buttons Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Attack Surface

Post Editor Buttons Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitindex.php:28
actionadmin_menuindex.php:31
actionadmin_headindex.php:32
filterplugin_action_linksindex.php:33
Maintenance & Trust

Post Editor Buttons Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedFeb 23, 2011
PHP min version
Downloads19K

Community Trust

Rating0/100
Number of ratings0
Active installs90
Developer Profile

Post Editor Buttons Developer Profile

Oren Yomtov

4 plugins · 190 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Editor Buttons

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/post-editor-buttons/js.php

HTML / DOM Fingerprints

CSS Classes
wrapform-tablebutton-primary
Data Attributes
name="peb_caption[]"name="peb_before[]"name="peb_after[]"id="row
FAQ

Frequently Asked Questions about Post Editor Buttons