RichText Extension Security & Risk Analysis

wordpress.org/plugins/richtext-extension

Adds useful decoration features to the Gutenberg RichText editor toolbar.

900 active installs v3.0.0 PHP 8.0+ WP 6.9+ Updated Mar 3, 2026
formattinggutenberghighlighterrich-text
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is RichText Extension Safe to Use in 2026?

Generally Safe

Score 100/100

RichText Extension has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "richtext-extension" plugin v3.0.0 exhibits a remarkably clean static analysis report, with no identified attack surface through AJAX, REST API, shortcodes, or cron events. The absence of dangerous functions, file operations, external HTTP requests, and a complete reliance on prepared statements for SQL queries are strong indicators of good development practices regarding these common vulnerability vectors. Furthermore, the lack of any recorded vulnerability history suggests a stable and well-maintained codebase. However, a significant concern arises from the output escaping, where only 55% of outputs are properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities, as unsanitized output can be injected by malicious actors. The absence of nonce and capability checks, while not directly exploitable due to the zero attack surface, highlights a general lack of robust authorization and input validation mechanisms, which could become a risk if the attack surface were to expand in future versions.

Key Concerns

  • Insufficient output escaping
  • Lack of nonce checks
  • Lack of capability checks
Vulnerabilities
None known

RichText Extension Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

RichText Extension Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
22 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

55% escaped40 total outputs
Attack Surface

RichText Extension Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionwp_enqueue_scriptsinc\class-enqueue.php:17
actionenqueue_block_editor_assetsinc\class-enqueue.php:20
actionadmin_enqueue_scriptsinc\class-enqueue.php:23
filterblock_editor_settings_allinc\class-enqueue.php:26
actionadmin_menuinc\class-options.php:24
actionadmin_initinc\class-options.php:27
Maintenance & Trust

RichText Extension Maintenance & Trust

Maintenance Signals

WordPress version tested7.0
Last updatedMar 3, 2026
PHP min version8.0
Downloads17K

Community Trust

Rating100/100
Number of ratings4
Active installs900
Developer Profile

RichText Extension Developer Profile

Aki Hamano

6 plugins · 52K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RichText Extension

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/richtext-extension/build/index.js/wp-content/plugins/richtext-extension/build/style-index.css
Script Paths
/wp-content/plugins/richtext-extension/build/index.asset.php
Version Parameters
richtext-extension/build/style-index.css?ver=

HTML / DOM Fingerprints

CSS Classes
rtex-highlighter-0rtex-highlighter-1rtex-highlighter-2rtex-highlighter-3rtex-highlighter-preview-0rtex-highlighter-preview-1rtex-highlighter-preview-2rtex-highlighter-preview-3+9 more
Data Attributes
data-rtex-highlighterdata-rtex-font-size
JS Globals
rtexConf
FAQ

Frequently Asked Questions about RichText Extension