
Rich Text Editor Security & Risk Analysis
wordpress.org/plugins/richtexteditorThis plugin integrates your Wordpress with RichTextEditor - the most powerful online wysiwyg content editor.
Is Rich Text Editor Safe to Use in 2026?
High Risk
Score 43/100Rich Text Editor carries significant security risk with 2 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.
The "richtexteditor" v1.0.1 plugin presents a mixed security posture. While it exhibits strengths in handling SQL queries with prepared statements and makes no external HTTP requests, significant concerns arise from its static analysis and vulnerability history. The presence of dangerous functions like `create_function` and `shell_exec` is a major red flag, indicating potential for code execution vulnerabilities if not handled with extreme care. Furthermore, the lack of proper output escaping on a majority of outputs and the absence of nonce and capability checks on any entry points leave the plugin vulnerable to various attacks.
The taint analysis revealing unsanitized paths is particularly worrisome, suggesting that user-supplied data might be processed in a way that could lead to path traversal or other file system manipulation issues. The vulnerability history, with two currently unpatched medium-severity CVEs related to missing authorization and CSRF, strongly suggests a recurring pattern of security weaknesses in the plugin's development. These historical vulnerabilities, coupled with the static analysis findings, indicate a plugin that has historically struggled with robust security implementations.
In conclusion, while the plugin has some positive aspects like secure SQL handling, the presence of dangerous functions, insufficient output escaping, lack of authorization checks, and a history of unpatched vulnerabilities create a significant risk. Users should exercise extreme caution and consider the potential for exploitation, especially given the unpatched CVEs and the identified code quality issues.
Key Concerns
- 2 Unpatched Medium CVEs
- Dangerous functions present (create_function, shell_exec)
- Low output escaping percentage
- No nonce checks
- No capability checks
- Unsanitized paths in taint flows
Rich Text Editor Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Rich Text Editor <= 1.0.1 - Missing Authorization
Rich Text Editor <= 1.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Rich Text Editor Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Rich Text Editor Attack Surface
WordPress Hooks 9
Maintenance & Trust
Rich Text Editor Maintenance & Trust
Maintenance Signals
Community Trust
Rich Text Editor Alternatives
Code Manager
code-manager
Write, test and deploy PHP, JavaScript, CSS and HTML code blocks from the WordPress dashboard.
Easy Wysiwyg Style
easy-wysiwyg-style
The Easy Wysiwyg Style WordPress plugin makes it even easier to format your content and customize your site. Enhances your Wysiwyg and includes the in …
widget text class ats
class-widget-ats-text
Простой текстовый виджет позволит вам запускать PHP и шорткод (shortcode) сразу после активации плагина widget text class ats (WordPress виджет по умо …
Save Me
save-me
Saves JavaScript and other inline code from distortion by the WordPress rich text editor. Add code in the editor's VISUAL mode, bracketing it wit …
Add TinyMCE to the Additional Description field
tinymce-for-wp-e-commerce-additional-description
Add TinyMCE to the Additional Description field of WP E-Commerce. Possibility insert additional product photos, even without buying GoldenCart!
Rich Text Editor Developer Profile
1 plugin · 60 total installs
How We Detect Rich Text Editor
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/richtexteditor/richtexteditor_wordpress_class.php/wp-content/plugins/richtexteditor/richtexteditor.js/wp-content/plugins/richtexteditor/richtexteditor.css/wp-content/plugins/richtexteditor/richtexteditor.jsrichtexteditor.css?ver=richtexteditor.js?ver=HTML / DOM Fingerprints
metabox-holderpostboxpostbox_contentid="Control_RTE_OverView"id="Control_RTE_Setting"id="rte_settings_form"RTEEDITOR_PLUGIN_URL