Click to Edit Security & Risk Analysis

wordpress.org/plugins/wpcontenteditable

Requires at least: 3.0 Tested up to: 3.5 Once installed, titles and body copy can be easily tweaked by authors right on the live page instead …

10 active installs v1.3 PHP + WP + Updated Jan 17, 2013
adminediteditor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Click to Edit Safe to Use in 2026?

Generally Safe

Score 85/100

Click to Edit has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The wpcontenteditable plugin v1.3 presents a significant security risk due to its unprotected AJAX endpoints. The static analysis reveals three AJAX handlers, all of which lack authentication checks, creating a direct attack vector. Furthermore, the analysis indicates a concerning lack of output escaping, with zero percent of outputs properly escaped. This, combined with two flows with unsanitized paths, suggests a high likelihood of cross-site scripting (XSS) vulnerabilities being exploitable through these unauthenticated AJAX calls.

The plugin's vulnerability history is clean, with no recorded CVEs. While this is a positive sign, it does not negate the immediate threats identified in the code analysis. The absence of past vulnerabilities could be attributed to low adoption, lack of scrutiny, or simply good fortune. The presence of a dangerous function like `preg_replace(/e)` also warrants attention, though its specific usage and potential impact are not detailed in the provided data. The plugin's strengths lie in its exclusive use of prepared statements for SQL queries and the absence of file operations or external HTTP requests. However, these strengths are overshadowed by the critical flaws in its handling of AJAX requests and output sanitization, making it a high-risk plugin in its current state.

Key Concerns

  • AJAX handlers without auth checks
  • Output not properly escaped
  • Flows with unsanitized paths
  • Dangerous function: preg_replace(/e)
Vulnerabilities
None known

Click to Edit Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Click to Edit Release Timeline

v1.3Current
v1.2
Code Analysis
Analyzed Mar 17, 2026

Click to Edit Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace('|\s*</eclick-to-edit.php:180

Output Escaping

0% escaped3 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
upstatement_ce_setting_input (content-editable-admin.php:79)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

Click to Edit Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_ce_update_customcontent-editable-ajax.php:2
authwp_ajax_ce_update_titlecontent-editable-ajax.php:3
authwp_ajax_ce_update_contentcontent-editable-ajax.php:4
WordPress Hooks 6
actioninitclick-to-edit.php:26
filterthe_contentclick-to-edit.php:147
filterthe_titleclick-to-edit.php:148
actionadmin_menucontent-editable-admin.php:6
actionadmin_initcontent-editable-admin.php:23
actionadmin_bar_menucontent-editable-admin.php:118
Maintenance & Trust

Click to Edit Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJan 17, 2013
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Click to Edit Developer Profile

jarednova

6 plugins · 21K total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect Click to Edit

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpcontenteditable/content-editable-style.css/wp-content/plugins/wpcontenteditable/content-editable.js
Script Paths
/wp-content/plugins/wpcontenteditable/content-editable.js

HTML / DOM Fingerprints

CSS Classes
contenteditablesavertrigger-ce-editce-edit-button
Data Attributes
data-piddata-key
JS Globals
ContentEditableSettings
FAQ

Frequently Asked Questions about Click to Edit