Vendi TinyMCE Anchor Security & Risk Analysis

wordpress.org/plugins/vendi-tinymce-anchor

Adds TinyMCE's core anchor plugin back into WordPress.

100 active installs v1.0.1 PHP + WP 3.0+ Updated May 6, 2022
tinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Vendi TinyMCE Anchor Safe to Use in 2026?

Generally Safe

Score 85/100

Vendi TinyMCE Anchor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "vendi-tinymce-anchor" plugin version 1.0.1 exhibits a very strong security posture based on the provided static analysis and vulnerability history. The plugin demonstrates excellent security practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and ensuring all output is properly escaped. Furthermore, there are no observed file operations, external HTTP requests, or instances of missing nonce or capability checks, which are common sources of vulnerabilities in WordPress plugins.

The absence of any taint flows with unsanitized paths, combined with a clean vulnerability history with zero known CVEs, further reinforces its secure design. The plugin also has a minimal attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that could be exploited. The only minor point of attention is the bundling of TinyMCE v1.0.1, which, while not inherently a critical issue in isolation, represents an opportunity for improvement if a newer, more secure version is available.

In conclusion, "vendi-tinymce-anchor" v1.0.1 appears to be a highly secure plugin with no identified vulnerabilities or significant security risks. Its adherence to secure coding practices is commendable. The primary recommendation would be to ensure all bundled libraries, such as TinyMCE, are kept up-to-date to mitigate any potential risks associated with older versions.

Key Concerns

  • Bundled outdated library (TinyMCE v1.0.1)
Vulnerabilities
None known

Vendi TinyMCE Anchor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Vendi TinyMCE Anchor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE1.0.1
Attack Surface

Vendi TinyMCE Anchor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtermce_buttons_2vendi-tinymce-anchor.php:13
filtermce_external_pluginsvendi-tinymce-anchor.php:23
Maintenance & Trust

Vendi TinyMCE Anchor Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMay 6, 2022
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Vendi TinyMCE Anchor Developer Profile

cjhaas

3 plugins · 1K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Vendi TinyMCE Anchor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/vendi-tinymce-anchor/tinymce/js/plugins/anchor/plugin.min.js
Script Paths
/wp-content/plugins/vendi-tinymce-anchor/tinymce/js/plugins/anchor/plugin.min.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Vendi TinyMCE Anchor