
Text Control Security & Risk Analysis
wordpress.org/plugins/text-control-2Text Control will allow you to choose from a variety of formatting syntaxes and encoding options. You can choose between Markdown, Textile 1, Textile …
Is Text Control Safe to Use in 2026?
Generally Safe
Score 85/100Text Control has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "text-control-2" v2.3.1 plugin presents a mixed security picture. On one hand, the absence of known vulnerabilities in its history and a robust approach to SQL queries (100% prepared statements) are positive indicators. The plugin also has a very small attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks.
However, the static analysis reveals several significant concerns. The presence of dangerous functions like `preg_replace(/e)` and `create_function` warrants careful scrutiny, as these are common sources of remote code execution vulnerabilities if not handled with extreme care. While no critical or high severity taint flows were detected, one flow with an unsanitized path indicates a potential weakness where user-supplied data might not be adequately validated before being used in a sensitive operation. Furthermore, the output escaping is only 55% proper, meaning a significant portion of output could be vulnerable to cross-site scripting (XSS) attacks.
The plugin's lack of vulnerability history could be interpreted positively as a sign of good security practices, or it could simply mean that the plugin has not been thoroughly scrutinized or targeted. Despite the strengths in SQL handling and attack surface, the identified dangerous functions and the unsanitized taint flow, coupled with insufficient output escaping, suggest a moderate to high risk. Further investigation into the specific implementations of these dangerous functions and the unsanitized taint flow is strongly recommended to determine the actual exploitability.
Key Concerns
- Dangerous functions present (preg_replace(/e), create_function)
- Unsanitized taint flow detected
- Insufficient output escaping (55% proper)
- No nonce checks on entry points
Text Control Security Vulnerabilities
Text Control Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Text Control Attack Surface
WordPress Hooks 10
Maintenance & Trust
Text Control Maintenance & Trust
Maintenance Signals
Community Trust
Text Control Alternatives
Markdown for WordPress and bbPress
markdown-for-wordpress-and-bbpress
A text-to-HTML conversion tool for web writers
Advanced Excerpt
advanced-excerpt
Control the appearance of WordPress post excerpts
Raw HTML
raw-html
Lets you use raw HTML or any other code in your posts. You can also disable smart quotes and other automatic formatting on a per-post basis.
Toggle wpautop
toggle-wpautop
Easily disable the default wpautop filter on a post by post basis.
WP Typograph Lite
wp-russian-typograph
Russian typography for Wordpress. Lite version.
Text Control Developer Profile
5 plugins · 101K total installs
How We Detect Text Control
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/text-control-2/text-control/textile1.php/wp-content/plugins/text-control-2/text-control/textile2.php/wp-content/plugins/text-control-2/text-control/markdown.php/wp-content/plugins/text-control-2/text-control/smartypants.phpHTML / DOM Fingerprints
name="tc_post_format"name="tc_post_encoding"name="tc_comment_format"name="tc_comment_encoding"