Auto Meta Header Security & Risk Analysis

wordpress.org/plugins/auto-meta-header

Auto Meta Header plugin automatically add meta keywords, description to your WordPress blog, Also Friendly Search Engine Robot Meta Tag.

20 active installs v1.0 PHP + WP 2.5.0+ Updated Aug 4, 2011
auto-descriptionauto-keywordauto-metaauto-meta-headerauto-meta-keyword
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Auto Meta Header Safe to Use in 2026?

Generally Safe

Score 85/100

Auto Meta Header has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "auto-meta-header" plugin version 1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of identified dangerous functions, raw SQL queries, file operations, external HTTP requests, and taint analysis findings are positive indicators. The plugin also correctly uses prepared statements for its SQL queries. However, the analysis reveals a critical weakness: 100% of its 19 output operations are not properly escaped. This presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the WordPress frontend, potentially leading to session hijacking, defacement, or further compromise. Furthermore, the complete lack of nonce checks across all entry points, combined with a single capability check, suggests a potential for privilege escalation or unauthorized actions if any of the entry points were to be exploited.

The plugin's vulnerability history is clean, with no recorded CVEs. This is a positive sign, but it cannot entirely mitigate the risks identified in the code analysis. The lack of historical vulnerabilities might be due to the plugin's limited complexity, recent release, or simply good fortune. The primary concern remains the unescaped output, which is a fundamental security best practice that has been overlooked. The plugin's strengths lie in its secure handling of SQL and the absence of common attack vectors like raw SQL and external requests. Its weakness is directly tied to its insufficient output sanitization, making it vulnerable to XSS attacks.

Key Concerns

  • 100% of output not properly escaped
  • No nonce checks on any entry points
Vulnerabilities
None known

Auto Meta Header Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Auto Meta Header Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped19 total outputs
Attack Surface

Auto Meta Header Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuauto-meta-header.php:12
actionadmin_initauto-meta-header.php:13
Maintenance & Trust

Auto Meta Header Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedAug 4, 2011
PHP min version
Downloads14K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Auto Meta Header Developer Profile

Indra agustian

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Meta Header

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<meta name="description" content="<meta name="keywords" content="<meta name="robots" content="
FAQ

Frequently Asked Questions about Auto Meta Header