Restore Classic Widgets and Classic Post Editor Security & Risk Analysis

wordpress.org/plugins/restore-classic-widgets-and-classic-post-editor

Restore the previous WordPress classic widgets and post editor settings screens and disables the Gutenberg block editor from managing widgets or post …

10 active installs v0.1.0 PHP 7.4+ WP 4.5+ Updated Aug 12, 2021
editorwidgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Restore Classic Widgets and Classic Post Editor Safe to Use in 2026?

Generally Safe

Score 85/100

Restore Classic Widgets and Classic Post Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "restore-classic-widgets-and-classic-post-editor" version 0.1.0 exhibits a generally strong security posture based on the provided static analysis. Notably, there are no identified dangerous functions, all SQL queries use prepared statements, and there are no file operations or external HTTP requests. This indicates a careful approach to handling sensitive operations and external interactions.

However, a significant concern arises from the complete lack of output escaping. With one output identified and 0% properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed by the plugin is potentially vulnerable to manipulation, allowing attackers to inject malicious scripts. Furthermore, the absence of any nonce or capability checks across the entire plugin, including the zero AJAX handlers and REST API routes, presents a broad attack surface. While the current attack surface is small, the lack of protective measures means that any future additions or undiscovered entry points would be inherently insecure.

The plugin also has no recorded vulnerability history, which is a positive indicator. This suggests either a lack of past issues or effective patching by developers. Despite the promising absence of past CVEs, the current static analysis reveals critical weaknesses in output escaping and authentication mechanisms that must be addressed.

Key Concerns

  • 0% output escaping for identified outputs
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Restore Classic Widgets and Classic Post Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Restore Classic Widgets and Classic Post Editor Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Restore Classic Widgets and Classic Post Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Restore Classic Widgets and Classic Post Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionactivated_pluginincludes\arje_classic_widgets_and_post_editor_init.php:12
actiondeactivated_pluginincludes\arje_classic_widgets_and_post_editor_init.php:13
actionadmin_menuincludes\arje_classic_widgets_and_post_editor_init.php:14
actionadmin_initincludes\arje_classic_widgets_and_post_editor_init.php:15
filtergutenberg_can_edit_postincludes\arje_classic_widgets_and_post_editor_init.php:20
filteruse_block_editor_for_postincludes\arje_classic_widgets_and_post_editor_init.php:21
filtergutenberg_use_widgets_block_editorincludes\arje_classic_widgets_and_post_editor_init.php:25
filteruse_widgets_block_editorincludes\arje_classic_widgets_and_post_editor_init.php:26
actioninitrestore_classic_widgets_and_classic_post_editor.php:19
Maintenance & Trust

Restore Classic Widgets and Classic Post Editor Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedAug 12, 2021
PHP min version7.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Restore Classic Widgets and Classic Post Editor Developer Profile

Heming Nelson

3 plugins · 30 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Restore Classic Widgets and Classic Post Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/restore-classic-widgets-and-classic-post-editor/assets/css/classic-widgets.css/wp-content/plugins/restore-classic-widgets-and-classic-post-editor/assets/js/classic-widgets.js
Script Paths
/wp-content/plugins/restore-classic-widgets-and-classic-post-editor/assets/js/classic-widgets.js
Version Parameters
restore-classic-widgets-and-classic-post-editor/assets/css/classic-widgets.css?ver=restore-classic-widgets-and-classic-post-editor/assets/js/classic-widgets.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Restore Classic Widgets and Classic Post Editor