TextBuilder Security & Risk Analysis

wordpress.org/plugins/textbuilder

With the TextBuilder.ai WordPress Plugin, you can quickly create content and post it directly to your blog without any manual effort.

5K active installs v1.2.0 PHP 7.4+ WP 6.0+ Updated Oct 1, 2025
aiai-contentai-writercontentgpt
98
A · Safe
CVEs total1
Unpatched0
Last CVEOct 2, 2025
Safety Verdict

Is TextBuilder Safe to Use in 2026?

Generally Safe

Score 98/100

TextBuilder has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 2, 2025Updated 6mo ago
Risk Assessment

The 'textbuilder' plugin v1.2.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and has a relatively low number of entry points. The presence of numerous nonce and capability checks suggests an awareness of common WordPress security vulnerabilities. However, a significant concern arises from the static analysis revealing one AJAX handler that lacks authentication checks. This creates a direct attack vector that could be exploited if not properly secured. While taint analysis did not reveal any immediate issues, the lack of analysis for actual flows limits its effectiveness in identifying certain vulnerabilities.

The vulnerability history indicates a past high-severity issue, specifically a Cross-Site Request Forgery (CSRF). Although this vulnerability is marked as patched, it highlights a past weakness in the plugin's security implementation. The recurrence of CSRF as a common vulnerability type in its history warrants continued vigilance and thorough code reviews to prevent future occurrences. The plugin's strengths lie in its adherence to secure SQL practices and extensive use of WordPress security features, but the unprotected AJAX endpoint and historical CSRF vulnerabilities present clear areas for improvement and potential risk.

In conclusion, while 'textbuilder' v1.2.0 has some strong security foundations, the presence of an unprotected AJAX endpoint and a history of high-severity CSRF vulnerabilities prevent it from achieving a high security score. The lack of taint flow analysis also means potential vulnerabilities might remain undetected. Addressing the unprotected AJAX handler and maintaining rigorous security practices are crucial for mitigating the identified risks.

Key Concerns

  • Unprotected AJAX handler detected
  • Past high severity vulnerability history
  • Taint analysis flow data not available
Vulnerabilities
1

TextBuilder Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2025-9213high · 8.8Cross-Site Request Forgery (CSRF)

TextBuilder 1.0.0 - 1.1.1 - Cross-Site Request Forgery to Privilege Escalation via Account Takeover

Oct 2, 2025 Patched in 1.2.0 (1d)
Code Analysis
Analyzed Mar 16, 2026

TextBuilder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
3
16 escaped
Nonce Checks
5
Capability Checks
13
File Operations
1
External Requests
2
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

84% escaped19 total outputs
Attack Surface
1 unprotected

TextBuilder Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_tb-admin-ajaxIncludes\AjaxController.php:18
WordPress Hooks 22
actionadmin_enqueue_scriptsIncludes\Admin\SettingsPanel.php:19
actionadmin_enqueue_scriptsIncludes\Admin\SettingsPanel.php:20
actionadmin_menuIncludes\Admin\SettingsPanel.php:22
actionadmin_initIncludes\Admin\SettingsPanel.php:23
actionplugin_action_links_textbuilder/textBuilder.phpIncludes\Admin\SettingsPanel.php:24
actionactivated_pluginIncludes\Admin\SettingsPanel.php:25
actiontb-unset-user-dataIncludes\Admin\SettingsPanel.php:27
actionadmin_initIncludes\Api\AuthorizationController.php:19
filtertb-ajax-api-authorize-token-adminNonceIncludes\Api\AuthorizationController.php:20
filtertb-ajax-api-revoke-token-adminNonceIncludes\Api\AuthorizationController.php:21
filtertb-ajax-api-revoke-all-tokens-adminNonceIncludes\Api\AuthorizationController.php:22
actionrest_api_initIncludes\Api\CategoriesController.php:20
actionrest_api_initIncludes\Api\MediaController.php:19
actionrest_api_initIncludes\Api\PostsController.php:20
filterdetermine_current_userIncludes\Api\RestAuthenticationController.php:43
filterrest_authentication_errorsIncludes\Api\RestAuthenticationController.php:44
filterrest_authentication_errorsIncludes\Api\RestAuthenticationController.php:45
filterrest_post_dispatchIncludes\Api\RestAuthenticationController.php:46
filterrest_pre_dispatchIncludes\Api\RestAuthenticationController.php:47
actionrest_api_initIncludes\Api\TagsController.php:20
actionwp_enqueue_scriptsIncludes\FrontPage.php:15
actionplugins_loadedIncludes\TextBuilder.php:25
Maintenance & Trust

TextBuilder Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 1, 2025
PHP min version7.4
Downloads23K

Community Trust

Rating100/100
Number of ratings1
Active installs5K
Developer Profile

TextBuilder Developer Profile

TextBuilder.ai

1 plugin · 5K total installs

99
trust score
Avg Security Score
98/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect TextBuilder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/textbuilder/public/dist/adminMain.bundle.js/wp-content/plugins/textbuilder/public/dist/adminMain.bundle.css
Script Paths
/wp-content/plugins/textbuilder/public/dist/adminMain.bundle.js
Version Parameters
textbuilder?ver=textbuilder/public/dist/adminMain.bundle.js?ver=textbuilder/public/dist/adminMain.bundle.css?ver=

HTML / DOM Fingerprints

CSS Classes
textbuilder-settingstb-authorize-wrappertb-content-wrappertb-authorize-button
JS Globals
TEXTBUILDER_VERSIONTEXTBUILDER_ROOT_DIRNAMETEXTBUILDER_PLUGIN_URLTEXTBUILDER_API_URL
FAQ

Frequently Asked Questions about TextBuilder