WP Editor Comments Plus Security & Risk Analysis

wordpress.org/plugins/wp-editor-comments-plus

Enhance your site's comments with the built in WordPress TinyMCE editor, inline comment editing and asynchronous comment posting.

200 active installs v1.1.4 PHP + WP 3.5.1+ Updated May 6, 2021
ajaxcommentcommentseditortinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Editor Comments Plus Safe to Use in 2026?

Generally Safe

Score 85/100

WP Editor Comments Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, wp-editor-comments-plus v1.1.4 exhibits a strong security posture. The absence of any recorded CVEs and the plugin's codebase demonstrate a commitment to secure development practices, with no apparent critical or high-severity vulnerabilities detected. The analysis highlights the developer's diligent use of prepared statements for SQL queries, robust nonce and capability checks, and effective output escaping, which significantly mitigates common web application risks.

The static analysis reveals a minimal attack surface with zero entry points identified as unprotected. Taint analysis also yielded no critical or high-severity flows with unsanitized paths, further reinforcing the plugin's security. The lack of dangerous functions, file operations, and external HTTP requests further contributes to a secure profile. However, while the majority of output is properly escaped, a small percentage remains unescaped, which could potentially lead to low-severity cross-site scripting (XSS) vulnerabilities if malicious data is somehow introduced and not handled upstream.

Overall, wp-editor-comments-plus v1.1.4 appears to be a well-secured plugin. The vulnerability history is clean, and the code analysis shows a strong adherence to security best practices. The primary area for potential, albeit minor, improvement lies in ensuring 100% output escaping. This plugin presents a low risk to WordPress installations.

Key Concerns

  • Minor output escaping concern
Vulnerabilities
None known

WP Editor Comments Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Editor Comments Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
49 escaped
Nonce Checks
7
Capability Checks
13
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

84% escaped58 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
action_ajax_request (WPEditorCommentsPlus.php:555)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Editor Comments Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_menuWPEditorCommentsPlus.php:195
actionadmin_enqueue_scriptsWPEditorCommentsPlus.php:198
actionadmin_enqueue_scriptsWPEditorCommentsPlus.php:199
actioninitWPEditorCommentsPlus.php:202
actioninitWPEditorCommentsPlus.php:204
actionwp_enqueue_scriptsWPEditorCommentsPlus.php:328
actionwp_enqueue_scriptsWPEditorCommentsPlus.php:329
filtertiny_mce_before_initWPEditorCommentsPlus.php:332
filtermce_buttonsWPEditorCommentsPlus.php:333
filtermce_buttons_2WPEditorCommentsPlus.php:334
filterpreprocess_commentWPEditorCommentsPlus.php:335
filtercomment_form_defaultsWPEditorCommentsPlus.php:336
filtercomment_form_field_commentWPEditorCommentsPlus.php:337
filtercomment_reply_linkWPEditorCommentsPlus.php:338
filtercomment_reply_link_argsWPEditorCommentsPlus.php:339
filtercomment_textWPEditorCommentsPlus.php:340
Maintenance & Trust

WP Editor Comments Plus Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMay 6, 2021
PHP min version
Downloads9K

Community Trust

Rating92/100
Number of ratings5
Active installs200
Developer Profile

WP Editor Comments Plus Developer Profile

Neosnc

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Editor Comments Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-editor-comments-plus/css/wpecp-admin.css/wp-content/plugins/wp-editor-comments-plus/css/wpecp-frontend.css/wp-content/plugins/wp-editor-comments-plus/js/wpecp-admin.js/wp-content/plugins/wp-editor-comments-plus/js/wpecp-frontend.js/wp-content/plugins/wp-editor-comments-plus/js/wpecp-tinymce.js
Script Paths
/wp-content/plugins/wp-editor-comments-plus/js/wpecp-frontend.js/wp-content/plugins/wp-editor-comments-plus/js/wpecp-tinymce.js
Version Parameters
/wp-content/plugins/wp-editor-comments-plus/css/wpecp-admin.css?ver=/wp-content/plugins/wp-editor-comments-plus/css/wpecp-frontend.css?ver=/wp-content/plugins/wp-editor-comments-plus/js/wpecp-admin.js?ver=/wp-content/plugins/wp-editor-comments-plus/js/wpecp-frontend.js?ver=/wp-content/plugins/wp-editor-comments-plus/js/wpecp-tinymce.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpecp-buttonwpecp-edit-containerwpecp-edit-commentwpecp-reply-commentwpecp-submit-commentwpecp-submit-editwpecp-cancel-editwpecp-comment-content+2 more
Data Attributes
data-wpecp-post-iddata-wpecp-comment-iddata-wpecp-nonce
JS Globals
wpecpGlobals
FAQ

Frequently Asked Questions about WP Editor Comments Plus