Basic SEO Pack Security & Risk Analysis

wordpress.org/plugins/basic-seo-pack

Simple but complete SEO Pack to make your site SEO Friendly. Quick way to add meta tags to your post and pages using WP custom fields.

800 active installs v1.1.4 PHP + WP 2.5+ Updated Nov 28, 2017
keywordsmeta-tagsmetadataseoseo-pack
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Basic SEO Pack Safe to Use in 2026?

Generally Safe

Score 85/100

Basic SEO Pack has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "basic-seo-pack" v1.1.4 plugin exhibits a generally strong security posture in terms of its attack surface and vulnerability history. The static analysis reveals no entry points (AJAX, REST API, shortcodes, cron), and no dangerous functions or external HTTP requests were detected. Furthermore, the plugin's vulnerability history is clean, with no recorded CVEs, suggesting a history of secure development. The use of prepared statements for all SQL queries is a significant strength.

However, a major concern arises from the output escaping. With 61 total outputs and 0% properly escaped, this plugin is highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is reflected in the output without proper sanitization or escaping can be exploited by attackers to inject malicious scripts, leading to session hijacking, credential theft, or defacement. While the plugin has nonce and capability checks, the lack of output escaping creates a critical weakness that overshadows the otherwise positive aspects of its code and history.

In conclusion, while "basic-seo-pack" v1.1.4 demonstrates good practices in limiting its attack surface and maintaining a clean vulnerability history, the pervasive lack of output escaping presents a significant and exploitable risk. Immediate attention should be paid to addressing this XSS vulnerability to secure the plugin.

Key Concerns

  • No proper output escaping detected
Vulnerabilities
None known

Basic SEO Pack Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Basic SEO Pack Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
61
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped61 total outputs
Attack Surface

Basic SEO Pack Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_menubasic-seo-pack.php:63
actionadd_meta_boxesbasic-seo-pack.php:93
actionsave_postbasic-seo-pack.php:94
actionwp_headbasic-seo-pack.php:97
actionwp_headbasic-seo-pack.php:98
actionwp_headbasic-seo-pack.php:99
actionwp_headbasic-seo-pack.php:100
actionwp_headbasic-seo-pack.php:101
actionwp_headbasic-seo-pack.php:102
actionwp_headbasic-seo-pack.php:105
actionplugins_loadedbasic-seo-pack.php:605
Maintenance & Trust

Basic SEO Pack Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedNov 28, 2017
PHP min version
Downloads45K

Community Trust

Rating100/100
Number of ratings3
Active installs800
Developer Profile

Basic SEO Pack Developer Profile

auastyle

1 plugin · 800 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Basic SEO Pack

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/basic-seo-pack/images/5-stars.png/wp-content/plugins/basic-seo-pack/images/amazon.jpg/wp-content/plugins/basic-seo-pack/images/as-234x60.png/wp-content/plugins/basic-seo-pack/images/donate.jpg/wp-content/plugins/basic-seo-pack/images/twitter.jpg

HTML / DOM Fingerprints

Data Attributes
id="bseop_primary-meta-box"
FAQ

Frequently Asked Questions about Basic SEO Pack