Sane Visual Editor Security & Risk Analysis

wordpress.org/plugins/sane-visual-editor

Locks down the TinyMCE visual editor with a sane set of buttons that will help your authors to not insert disruptive styles.

10 active installs v1.0 PHP + WP 3.2+ Updated Nov 2, 2011
admineditortinymcevisual-editor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Sane Visual Editor Safe to Use in 2026?

Generally Safe

Score 85/100

Sane Visual Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "sane-visual-editor" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, dangerous functions, direct SQL queries, file operations, or external HTTP requests is highly commendable. Furthermore, the complete lack of taint analysis findings suggests that data flows within the plugin are likely well-managed and sanitized, if they exist at all. The vulnerability history being completely clear also indicates a history of responsible development and maintenance.

However, the complete absence of any code signals related to nonce checks and capability checks across all zero entry points is a significant concern. While there are no entry points to check currently, this indicates a potential lack of built-in security mechanisms that would be essential if new features or integrations were added that exposed any entry points. The plugin's current security is derived from its minimalism, which is a strength, but it lacks fundamental security controls that should ideally be present even in such a limited plugin. In conclusion, while the plugin is currently very secure due to its lack of exposed functionality, it has not demonstrated the implementation of standard WordPress security best practices that would make it resilient to future expansion or unforeseen attack vectors.

Key Concerns

  • Missing nonce checks across all entry points
  • Missing capability checks across all entry points
Vulnerabilities
None known

Sane Visual Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Sane Visual Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Sane Visual Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filtermce_buttonssane-visual-editor.php:58
filtermce_buttons_2sane-visual-editor.php:59
filtertiny_mce_before_initsane-visual-editor.php:60
actionadmin_initsane-visual-editor.php:85
Maintenance & Trust

Sane Visual Editor Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedNov 2, 2011
PHP min version
Downloads4K

Community Trust

Rating40/100
Number of ratings1
Active installs10
Developer Profile

Sane Visual Editor Developer Profile

Matt Wiebe

4 plugins · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sane Visual Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Overrides TinyMCE Advanced to provide sane defaults --><!-- AKA don't let your client blow up the site with bad HTML --><!-- Keep it simple, keep it safe. -->
FAQ

Frequently Asked Questions about Sane Visual Editor