WP Tidy TinyMCE Security & Risk Analysis

wordpress.org/plugins/wp-tidy-tinymce

Simple options to tidy up the uncommonly used buttons and controls from WordPress TinyMCE editor. Updated to work with both the new 3.9 editor and 3.

200 active installs v2.0 PHP + WP 3.4+ Updated May 15, 2014
tinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Tidy TinyMCE Safe to Use in 2026?

Generally Safe

Score 85/100

WP Tidy TinyMCE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The wp-tidy-tinymce plugin v2.0 exhibits a seemingly strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events that could serve as direct entry points for attacks. Furthermore, the code shows no signs of dangerous functions, raw SQL queries, file operations, or external HTTP requests. This lack of explicit attack surface and reliance on prepared statements for SQL are positive indicators of secure coding practices. The absence of known vulnerabilities in its history further contributes to this perception of a secure plugin.

However, a significant concern arises from the output escaping analysis, which shows that 0% of the four identified outputs are properly escaped. This is a critical weakness, as it creates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by the plugin without proper sanitization can be exploited by attackers to inject malicious scripts. Additionally, the complete absence of nonce checks and capability checks on any potential (though currently undiscovered) entry points is a notable oversight, as these are fundamental security mechanisms in WordPress. The bundling of TinyMCE v2.0, which is an older version, could also present risks if it contains known, albeit unpatched, vulnerabilities that are not reflected in the plugin's specific CVE history. The lack of taint analysis results is also somewhat ambiguous, potentially indicating either a lack of complex data flows or an incomplete analysis.

Key Concerns

  • Output escaping is 0% proper
  • Bundled library TinyMCE v2.0 is outdated
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

WP Tidy TinyMCE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Tidy TinyMCE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE2.0

Output Escaping

0% escaped4 total outputs
Attack Surface

WP Tidy TinyMCE Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filtertiny_mce_before_initwp-lt-39.php:66
actionadmin_menuwp-tidy-tinymce-options.php:29
actionadmin_initwp-tidy-tinymce-options.php:30
filtermce_buttonswp-tidy-tinymce.php:94
filtermce_buttons_2wp-tidy-tinymce.php:95
filtertiny_mce_before_initwp-tidy-tinymce.php:117
Maintenance & Trust

WP Tidy TinyMCE Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedMay 15, 2014
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

WP Tidy TinyMCE Developer Profile

Storm Consultancy

4 plugins · 810 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Tidy TinyMCE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Tidy TinyMCE