
Redactor Security & Risk Analysis
wordpress.org/plugins/redactorVersatile Censor Tool
Is Redactor Safe to Use in 2026?
Generally Safe
Score 85/100Redactor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The Redactor plugin version 3.1.48f presents a mixed security posture. On the positive side, the plugin has no recorded CVEs and its SQL queries are properly secured with prepared statements. The attack surface is also minimal, with no apparent AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, none of these are exposed without authentication checks. This suggests a cautious approach to external input handling.
However, significant concerns arise from the static code analysis. The presence of the `unserialize` function is a critical warning sign, as it is a common vector for remote code execution when processing untrusted input. Coupled with this, the analysis reveals that 0% of output is properly escaped, indicating a high risk of cross-site scripting (XSS) vulnerabilities. The taint analysis, while showing no critical or high severity flows, did find 3 flows with unsanitized paths, which, when combined with the unescaped output and the `unserialize` function, creates a potentially dangerous combination.
Given the complete lack of vulnerability history, it's difficult to draw definitive conclusions about its long-term security. This could indicate diligent security practices or simply a lack of widespread use and therefore less scrutiny. The absence of nonce checks and capability checks on any potential entry points (though none were found) is a weakness, as is the bundling of the TinyMCE library, which could be outdated or have its own vulnerabilities. Overall, while the plugin appears to have a small attack surface and secure SQL, the risks associated with `unserialize` and unescaped output are substantial and require immediate attention.
Key Concerns
- Presence of 'unserialize' function
- 0% output escaping
- Flows with unsanitized paths found
- Bundled library (TinyMCE)
- No Nonce checks
- No Capability checks
Redactor Security Vulnerabilities
Redactor Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Redactor Attack Surface
WordPress Hooks 2
Maintenance & Trust
Redactor Maintenance & Trust
Maintenance Signals
Community Trust
Redactor Alternatives
Secret Posts
secret-posts
Mark WordPress posts as private after a specified number of page views or time.
WPKeyMe
wpkeyme
This plugin allows you to require a secret key that is passed via the URL: http://example.com/post-title/?key=[string]
Yoast Duplicate Post
duplicate-post
The go-to tool for cloning posts and pages, including the powerful Rewrite & Republish feature.
Duplicate Page
duplicate-page
Duplicate Posts, Pages and Custom Posts easily using single click
Custom Post Type UI
custom-post-type-ui
Admin UI for creating custom content types like post types and taxonomies
Redactor Developer Profile
4 plugins · 40 total installs
How We Detect Redactor
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/redactor/library/base/public/css/images.css/wp-content/plugins/redactor/library/base/public/css/admin.css/wp-content/plugins/redactor/library/base/public/css/front.css/wp-content/plugins/redactor/library/base/public/css/common.css/wp-content/plugins/redactor/library/base/public/js/script.js/wp-content/plugins/redactor/library/base/public/js/script.js/wp-content/plugins/redactor/library/base/public/css/images.css?ver=/wp-content/plugins/redactor/library/base/public/css/admin.css?ver=/wp-content/plugins/redactor/library/base/public/css/front.css?ver=/wp-content/plugins/redactor/library/base/public/css/common.css?ver=/wp-content/plugins/redactor/library/base/public/js/script.js?ver=HTML / DOM Fingerprints
v48fv_16x16_infodata-dodebugv48fv_data