WPDevs Classic Editor & Widgets Security & Risk Analysis

wordpress.org/plugins/wpdevs-classic-editor-widgets

WPDevs Classic Editor & Widgets enables the traditional WordPress classic editor, classic widgets, and the previous version of the Edit Post scree …

10 active installs v1.0 PHP 5.2.4+ WP 4.9+ Updated May 24, 2023
classic-editorclassic-widgetsdisable-gutenbergtraditional-editortraditional-widgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPDevs Classic Editor & Widgets Safe to Use in 2026?

Generally Safe

Score 85/100

WPDevs Classic Editor & Widgets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The static analysis of wpdevs-classic-editor-widgets v1.0 reveals an exceptionally clean code base with no identified dangerous functions, SQL injection vulnerabilities, file operations, or external HTTP requests. The plugin also demonstrates excellent security practices by using prepared statements for all its SQL queries and properly escaping all outputs. Crucially, there are no identified taint flows, indicating that user-supplied data is not being processed in a way that could lead to vulnerabilities.

However, the complete absence of any security checks, including capability checks and nonce checks, across all potential entry points is a significant concern. While the current version has a zero attack surface in terms of AJAX handlers, REST API routes, and shortcodes, this could change with future updates. The lack of these fundamental security mechanisms means that if any entry points were to be introduced in the future, they would be entirely unprotected.

The plugin's vulnerability history is also spotless, with no known CVEs. This, combined with the clean code analysis, suggests a plugin that has been developed with care. However, the lack of any security checks remains a critical weakness that could be exploited if the plugin's functionality evolves to include user-interactive elements or administrative features.

Key Concerns

  • Missing capability checks on all entry points
  • Missing nonce checks on all entry points
Vulnerabilities
None known

WPDevs Classic Editor & Widgets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPDevs Classic Editor & Widgets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WPDevs Classic Editor & Widgets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedwpdevs-classic-editor-widgets.php:16
filteruse_block_editor_for_postwpdevs-classic-editor-widgets.php:32
actionafter_setup_themewpdevs-classic-editor-widgets.php:36
actionadmin_initwpdevs-classic-editor-widgets.php:46
actionadmin_initwpdevs-classic-editor-widgets.php:84
Maintenance & Trust

WPDevs Classic Editor & Widgets Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedMay 24, 2023
PHP min version5.2.4
Downloads948

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WPDevs Classic Editor & Widgets Developer Profile

Md. Aminul Islam

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPDevs Classic Editor & Widgets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="wpdevs_classic_editor_settings[disable_gutenberg]"name="wpdevs_classic_editor_settings[disable_gutenberg_widgets]"
FAQ

Frequently Asked Questions about WPDevs Classic Editor & Widgets