Preserved HTML Editor Markup Security & Risk Analysis

wordpress.org/plugins/preserved-html-editor-markup

Preserves white space and developer edits in HTML AND WYSIWYG tab. Supports inline scripts/css, JavaScript code blocks and HTML5 content editing

700 active installs v1.5 PHP + WP 3.2.1+ Updated Nov 28, 2017
editorhtmlmarkupwhite-spacewpautop
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Preserved HTML Editor Markup Safe to Use in 2026?

Generally Safe

Score 85/100

Preserved HTML Editor Markup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "preserved-html-editor-markup" plugin version 1.5 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The plugin demonstrates good practices by not including dangerous functions, performing all SQL queries using prepared statements, and avoiding file operations and external HTTP requests. The presence of a nonce check on its single AJAX handler is also a positive indicator. The absence of any historical CVEs or recorded vulnerabilities further contributes to this positive outlook, suggesting a history of secure development and maintenance.

However, there are some areas that could be improved. The limited output escaping (only 13% properly escaped) presents a potential risk for cross-site scripting (XSS) vulnerabilities. While the taint analysis showed no unsanitized paths, a more comprehensive output escaping strategy would further harden the plugin against such attacks. Additionally, the lack of capability checks on the AJAX handler, while not an issue in this specific case due to no unprotected entry points, leaves a potential for privilege escalation if new entry points were to be introduced without proper authorization checks.

In conclusion, this plugin is currently in a good security state with no critical or high-risk issues identified. Its commitment to prepared SQL statements and lack of historical vulnerabilities are commendable strengths. The primary area for improvement lies in enhancing output escaping to proactively mitigate XSS risks. The current lack of capability checks on the AJAX handler is a minor concern given the current entry point landscape but should be a consideration for future development.

Key Concerns

  • Low percentage of properly escaped output
  • No capability checks on AJAX handler
Vulnerabilities
None known

Preserved HTML Editor Markup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Preserved HTML Editor Markup Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Preserved HTML Editor Markup Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
7
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

13% escaped8 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
fix_database_content (sb_preserved_markup.php:229)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Preserved HTML Editor Markup Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_emc2pm_fix_postssb_preserved_markup.php:34
WordPress Hooks 8
actionplugins_loadedsb_preserved_markup.php:29
filterthe_contentsb_preserved_markup.php:48
filtertiny_mce_before_initsb_preserved_markup.php:297
filterthe_editorsb_preserved_markup.php:317
filterthe_editor_contentsb_preserved_markup.php:322
filterwp_insert_post_datasb_preserved_markup.php:327
actioninitsb_preserved_markup.php:336
actionadmin_initsb_preserved_markup.php:341
Maintenance & Trust

Preserved HTML Editor Markup Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 28, 2017
PHP min version
Downloads40K

Community Trust

Rating100/100
Number of ratings42
Active installs700
Developer Profile

Preserved HTML Editor Markup Developer Profile

MarcusPope

5 plugins · 7K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Preserved HTML Editor Markup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/preserved-html-editor-markup/preserved-html-editor-markup.css/wp-content/plugins/preserved-html-editor-markup/preserved-html-editor-markup.js
Script Paths
/wp-content/plugins/preserved-html-editor-markup/preserved-html-editor-markup.js
Version Parameters
preserved-html-editor-markup/style.css?ver=preserved-html-editor-markup/preserved-html-editor-markup.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- The plugin will not replace the content of pre/code blocks -->
Data Attributes
data-editor-preservedata-editor-preserve-nldata-editor-preserve-tabdata-editor-preserve-space
JS Globals
emc2_tinymce_init
FAQ

Frequently Asked Questions about Preserved HTML Editor Markup