WP Disable Block Editor Security & Risk Analysis

wordpress.org/plugins/wp-disable-block-editor

This plugin will WP Disable Block Editor & enable the Classic Editor and original Edit Post screen (TinyMCE, meta boxes, etc all).

100 active installs v1.0.1 PHP + WP 5.0+ Updated May 26, 2023
block-editorclassic-editordisable-gutenbergeditorgutenberg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Disable Block Editor Safe to Use in 2026?

Generally Safe

Score 85/100

WP Disable Block Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "wp-disable-block-editor" plugin v1.0.1 exhibits a very strong security posture based on the provided static analysis and vulnerability history. The plugin demonstrates excellent security practices by having zero AJAX handlers, REST API routes, shortcodes, or cron events, thus presenting no apparent attack surface. The code signals are also positive, with no dangerous functions, all SQL queries using prepared statements, and a single nonce check present. While the output escaping is not perfect (50% properly escaped), this is a relatively minor concern given the absence of other attack vectors.

The taint analysis reveals no critical or high-severity flows with unsanitized paths, indicating that user-supplied data is handled securely and does not lead to exploitable conditions. The vulnerability history is completely clear, with no recorded CVEs, suggesting a consistently secure development and maintenance process for this plugin.

In conclusion, the "wp-disable-block-editor" plugin v1.0.1 is exceptionally secure. Its minimal attack surface, robust code signaling, and clean vulnerability history collectively point to a plugin that has been developed with security as a high priority. The only area for minor improvement would be to ensure all output is properly escaped to mitigate any potential XSS vulnerabilities, though the risk is currently very low.

Key Concerns

  • Half of outputs not properly escaped
Vulnerabilities
None known

WP Disable Block Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Disable Block Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
WP_Disable_Gutenberg_options_page (inc\plugin_setting.php:33)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Disable Block Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_initinc\plugin_setting.php:7
actionadmin_menuinc\plugin_setting.php:12
filtergutenberg_can_edit_postinc\plugin_setting.php:22
filtergutenberg_can_edit_post_typeinc\plugin_setting.php:25
filteruse_block_editor_for_postinc\plugin_setting.php:28
filteruse_block_editor_for_post_typeinc\plugin_setting.php:31
Maintenance & Trust

WP Disable Block Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedMay 26, 2023
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

WP Disable Block Editor Developer Profile

Milankumar Sanandia

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Disable Block Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-disable-block-editor/inc/plugin_setting.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Disable Block Editor