Rich Text Editor Security & Risk Analysis

wordpress.org/plugins/richtexteditor

This plugin integrates your Wordpress with RichTextEditor - the most powerful online wysiwyg content editor.

60 active installs v1.0.1 PHP + WP 4.0+ Updated Dec 31, 2016
php-editorphp-html-editorrich-text-editorrichtexteditorwysiwyg-editor
43
D · High Risk
CVEs total2
Unpatched2
Last CVEApr 2, 2025
Safety Verdict

Is Rich Text Editor Safe to Use in 2026?

High Risk

Score 43/100

Rich Text Editor carries significant security risk with 2 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.

2 known CVEs 2 unpatched Last CVE: Apr 2, 2025Updated 9yr ago
Risk Assessment

The "richtexteditor" v1.0.1 plugin presents a mixed security posture. While it exhibits strengths in handling SQL queries with prepared statements and makes no external HTTP requests, significant concerns arise from its static analysis and vulnerability history. The presence of dangerous functions like `create_function` and `shell_exec` is a major red flag, indicating potential for code execution vulnerabilities if not handled with extreme care. Furthermore, the lack of proper output escaping on a majority of outputs and the absence of nonce and capability checks on any entry points leave the plugin vulnerable to various attacks.

The taint analysis revealing unsanitized paths is particularly worrisome, suggesting that user-supplied data might be processed in a way that could lead to path traversal or other file system manipulation issues. The vulnerability history, with two currently unpatched medium-severity CVEs related to missing authorization and CSRF, strongly suggests a recurring pattern of security weaknesses in the plugin's development. These historical vulnerabilities, coupled with the static analysis findings, indicate a plugin that has historically struggled with robust security implementations.

In conclusion, while the plugin has some positive aspects like secure SQL handling, the presence of dangerous functions, insufficient output escaping, lack of authorization checks, and a history of unpatched vulnerabilities create a significant risk. Users should exercise extreme caution and consider the potential for exploitation, especially given the unpatched CVEs and the identified code quality issues.

Key Concerns

  • 2 Unpatched Medium CVEs
  • Dangerous functions present (create_function, shell_exec)
  • Low output escaping percentage
  • No nonce checks
  • No capability checks
  • Unsanitized paths in taint flows
Vulnerabilities
2

Rich Text Editor Security Vulnerabilities

CVEs by Year

2 CVEs in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-31736medium · 5.3Missing Authorization

Rich Text Editor <= 1.0.1 - Missing Authorization

Apr 2, 2025Unpatched
CVE-2025-31623medium · 6.1Cross-Site Request Forgery (CSRF)

Rich Text Editor <= 1.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Mar 31, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Rich Text Editor Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
1 prepared
Unescaped Output
41
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
39
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionreturn preg_replace_callback("/X/",create_function("",'return substr("0123456789ABCDEF",rand(0,15),1richtexteditor\include_cs2.php:21
create_functionreturn preg_replace_callback("/X/",create_function("",'return substr("0123456789ABCDEF",rand(0,15),1richtexteditor\server_php\phpuploader\include_phpuploader.php:298
shell_execif( $aspellret = shell_exec( $cmd )) {richtexteditor\server_php\server-scripts\spellchecker.php:104

SQL Query Safety

100% prepared1 total queries

Output Escaping

5% escaped43 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
LoadFile (richtexteditor\include_rte.php:1824)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Rich Text Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actioninitrichtexteditor_wordpress.php:15
actioninitrichtexteditor_wordpress.php:23
actionadmin_menurichtexteditor_wordpress.php:28
actionadmin_print_scriptsrichtexteditor_wordpress.php:31
actionwp_print_scriptsrichtexteditor_wordpress.php:35
actionadmin_print_footer_scriptsrichtexteditor_wordpress.php:38
actionadmin_headrichtexteditor_wordpress.php:42
actionoption_posts_per_pagerichtexteditor_wordpress.php:45
actioninitrichtexteditor_wordpress_class.php:40
Maintenance & Trust

Rich Text Editor Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedDec 31, 2016
PHP min version
Downloads74K

Community Trust

Rating64/100
Number of ratings22
Active installs60
Developer Profile

Rich Text Editor Developer Profile

richtexteditor

1 plugin · 60 total installs

54
trust score
Avg Security Score
43/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Rich Text Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/richtexteditor/richtexteditor_wordpress_class.php/wp-content/plugins/richtexteditor/richtexteditor.js/wp-content/plugins/richtexteditor/richtexteditor.css
Script Paths
/wp-content/plugins/richtexteditor/richtexteditor.js
Version Parameters
richtexteditor.css?ver=richtexteditor.js?ver=

HTML / DOM Fingerprints

CSS Classes
metabox-holderpostboxpostbox_content
Data Attributes
id="Control_RTE_OverView"id="Control_RTE_Setting"id="rte_settings_form"
JS Globals
RTEEDITOR_PLUGIN_URL
FAQ

Frequently Asked Questions about Rich Text Editor