Post Editor Buttons Fork Security & Risk Analysis

wordpress.org/plugins/post-editor-buttons-fork

This plugin allows you add your own buttons to the post editor's TEXT mode toolbar.

800 active installs v2.4 PHP + WP 3.3+ Updated Oct 1, 2016
add-buttonsbuttonspost-editortoolbartoolbar-buttons
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Editor Buttons Fork Safe to Use in 2026?

Generally Safe

Score 85/100

Post Editor Buttons Fork has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'post-editor-buttons-fork' plugin v2.4 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code shows good practices regarding SQL queries, utilizing prepared statements exclusively, and the absence of file operations or external HTTP requests reduces potential vectors for compromise. The plugin also has no recorded vulnerabilities, indicating a history of stable and secure development.

However, there are areas for improvement. The static analysis reveals that only 50% of output is properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully before being displayed. Additionally, the complete lack of nonce and capability checks, despite the absence of entry points like AJAX or REST APIs, is a notable oversight. While there are no immediate threats indicated by the current data, these checks are fundamental security measures that should be implemented to protect against potential future introduction of entry points or unforeseen vulnerabilities.

In conclusion, 'post-editor-buttons-fork' v2.4 is a relatively secure plugin with a limited attack surface and a clean vulnerability history. The primary concern lies with the unescaped output, which warrants attention. The absence of nonce and capability checks, while not currently exploitable due to the limited entry points, represents a gap in best practices that could be a future risk if the plugin's functionality expands.

Key Concerns

  • Only 50% of output is properly escaped
  • No nonce checks present
  • No capability checks present
Vulnerabilities
None known

Post Editor Buttons Fork Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Editor Buttons Fork Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped14 total outputs
Attack Surface

Post Editor Buttons Fork Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitpost-editor-buttons.php:29
filterplugin_action_linkspost-editor-buttons.php:37
filteradmin_initpost-editor-buttons.php:39
actionadmin_menupost-editor-buttons.php:40
actionadmin_enqueue_scriptspost-editor-buttons.php:42
Maintenance & Trust

Post Editor Buttons Fork Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedOct 1, 2016
PHP min version
Downloads14K

Community Trust

Rating98/100
Number of ratings11
Active installs800
Developer Profile

Post Editor Buttons Fork Developer Profile

Kailey (trepmal)

12 plugins · 2K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Editor Buttons Fork

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-editor-buttons-fork/mng_rows.js

HTML / DOM Fingerprints

JS Globals
QTagsedButtonspeb_remove_buttonsPEB
FAQ

Frequently Asked Questions about Post Editor Buttons Fork