Sukellos Enable Classic Editor Security & Risk Analysis

wordpress.org/plugins/sukellos-enable-classic-editor

Use Sukellos Enable Classic Editor to switch back to classic editor in post types and widgets.

10 active installs v1.1.8 PHP 7.2+ WP 5.2+ Updated Oct 4, 2024
adminadmin-buildercustom-admin-pagescustom-admin-paneloption
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sukellos Enable Classic Editor Safe to Use in 2026?

Generally Safe

Score 92/100

Sukellos Enable Classic Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "sukellos-enable-classic-editor" plugin, version 1.1.8, exhibits a remarkably clean static analysis profile. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and importantly, any entry points with potential for unauthorized access (AJAX handlers, REST API routes, shortcodes, cron events) suggests a well-developed and secure codebase. The fact that all SQL queries, if any existed, would use prepared statements further reinforces this positive observation.

The vulnerability history is also exceptionally clean, with no recorded CVEs. This, combined with the static analysis findings, indicates that the plugin has historically been free from significant security flaws. The use of Select2 as a bundled library is noted, and while it's generally well-maintained, it's worth a minor consideration for potential outdated versions, though no direct evidence of this is presented.

Overall, the plugin presents a strong security posture. The developers appear to adhere to secure coding practices, minimizing the attack surface and employing robust data handling. The lack of any concerning findings in the static analysis and the pristine vulnerability history are significant strengths. While the absence of capability checks on entry points is technically a potential area for concern, the complete lack of entry points negates any practical risk from this.

Vulnerabilities
None known

Sukellos Enable Classic Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Sukellos Enable Classic Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2
Attack Surface

Sukellos Enable Classic Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionsukellos_fw/admin/create_tools_fieldsadmin\class-wp-sukellos-enable-classic-editor-admin.php:39
filteruse_block_editor_for_post_typeincludes\managers\class-gutenberg-manager.php:51
filteruse_block_editor_for_postincludes\managers\class-gutenberg-manager.php:54
filteruse_widgets_block_editorincludes\managers\class-gutenberg-manager.php:55
filtergutenberg_can_edit_post_typeincludes\managers\class-gutenberg-manager.php:60
actionadmin_initincludes\managers\class-gutenberg-manager.php:117
actionedit_form_after_titleincludes\managers\class-gutenberg-manager.php:146
Maintenance & Trust

Sukellos Enable Classic Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 4, 2024
PHP min version7.2
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Sukellos Enable Classic Editor Developer Profile

Ludovic Maillet

5 plugins · 20 total installs

90
trust score
Avg Security Score
94/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sukellos Enable Classic Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Sukellos Enable Classic Editor