Typewriter Security & Risk Analysis

wordpress.org/plugins/typewriter

Typewriter replaces the Visual Editor with a simple Markdown editor for your posts and pages.

10 active installs v1.0 PHP + WP 3.5+ Updated Sep 26, 2013
editormarkdownpagespoststypewriter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Typewriter Safe to Use in 2026?

Generally Safe

Score 85/100

Typewriter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'typewriter' plugin v1.0 exhibits a concerning security posture despite an apparent lack of known vulnerabilities or a large attack surface. The static analysis reveals significant weaknesses, most notably the use of the deprecated and dangerous `create_function` function. Furthermore, the plugin performs SQL queries without utilizing prepared statements, a major risk for SQL injection vulnerabilities. The absence of any output escaping and file operation checks without proper sanitization or authentication also presents serious security concerns. The complete lack of nonce and capability checks on any potential entry points, though currently zero, means that if any were introduced in future versions or through a misconfiguration, they would be entirely unprotected. While the plugin has no recorded vulnerability history, this can be misleading; the identified code signals suggest a high likelihood of undiscovered vulnerabilities. The plugin's strengths lie in its currently minimal attack surface, but this is overshadowed by the fundamental insecure coding practices identified. Developers should immediately refactor the code to remove `create_function`, implement prepared statements for all SQL queries, and ensure proper output escaping and secure file handling.

Key Concerns

  • Use of dangerous function: create_function
  • SQL queries without prepared statements
  • Output escaping not used
  • No nonce checks
  • No capability checks
  • File operations without clear security checks
Vulnerabilities
None known

Typewriter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Typewriter Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 16, 2026

Typewriter Code Analysis

Dangerous Functions
1
Raw SQL Queries
1
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$this->utf8_strlen = create_function('$text', 'return preg_match_all(includes\markdown\Michelf\Markdown.php:1495

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Typewriter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionplugins_loadedtypewriter.php:23
actionprofile_updatetypewriter.php:24
actionuser_registertypewriter.php:25
actionwp_logintypewriter.php:26
filterquicktags_settingstypewriter.php:27
actionadmin_print_footer_scriptstypewriter.php:28
actionadmin_print_scriptstypewriter.php:29
actionuser_edit_form_tagtypewriter.php:30
filterthe_contenttypewriter.php:36
filterthe_excerpttypewriter.php:37
Maintenance & Trust

Typewriter Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 26, 2013
PHP min version
Downloads4K

Community Trust

Rating90/100
Number of ratings8
Active installs10
Developer Profile

Typewriter Developer Profile

FolioVision

19 plugins · 48K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
1098 days
View full developer profile
Detection Fingerprints

How We Detect Typewriter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/typewriter/includes/markdown/Michelf/MarkdownExtra.php

HTML / DOM Fingerprints

JS Globals
QTags
FAQ

Frequently Asked Questions about Typewriter