TinyMCE Table Security & Risk Analysis

wordpress.org/plugins/tinymce-table

Ajoute la création et l'édition des tables à TinyMCE

700 active installs v1.0 PHP + WP 3.9+ Updated Jul 17, 2014
buttoneditortabletablestinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TinyMCE Table Safe to Use in 2026?

Generally Safe

Score 85/100

TinyMCE Table has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "tinymce-table" v1.0 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and a clean taint analysis suggest a well-written and securely coded plugin. Furthermore, the lack of any recorded vulnerabilities, including critical or high-severity ones, reinforces this positive assessment. The plugin demonstrates good practices by not exposing a significant attack surface and by adhering to secure coding principles where data handling is concerned.

However, there are a few areas that warrant consideration. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events, while contributing to a zero attack surface, might also indicate limited functionality or a plugin that is not actively interacting with WordPress in dynamic ways. More importantly, the complete lack of nonce checks and capability checks across all potential entry points is a significant concern. While the static analysis shows no entry points, if any were to be introduced or if the analysis is incomplete, the absence of these fundamental WordPress security mechanisms leaves the plugin vulnerable to unauthorized actions or cross-site request forgery. The bundling of TinyMCE v1.0, while not a critical issue, could also present a minor risk if this specific version has known, though unexploited, vulnerabilities.

Key Concerns

  • Missing nonce checks on potential entry points
  • Missing capability checks on potential entry points
  • Bundled outdated library (TinyMCE v1.0)
Vulnerabilities
None known

TinyMCE Table Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

TinyMCE Table Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE1.0
Attack Surface

TinyMCE Table Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtermce_external_pluginsTinyMCE_Table.php:10
filtermce_buttonsTinyMCE_Table.php:17
Maintenance & Trust

TinyMCE Table Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJul 17, 2014
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs700
Developer Profile

TinyMCE Table Developer Profile

Gary PEGEOT

1 plugin · 700 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TinyMCE Table

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tinymce-table/plugin.min.js
Script Paths
/wp-content/plugins/tinymce-table/plugin.min.js
Version Parameters
tinymce-table/plugin.min.js?ver=

HTML / DOM Fingerprints

JS Globals
tinymce.plugins.table
FAQ

Frequently Asked Questions about TinyMCE Table