Canon AEDE Security & Risk Analysis

wordpress.org/plugins/canon-aede

This Plugin replaces the URL base of the communication media who are members of CEDRO and AEDE, two spanish media associations

20 active installs v0.2.1 PHP + WP 3.0.1+ Updated Sep 10, 2014
aedeblockbloqueocanoncedro
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Canon AEDE Safe to Use in 2026?

Generally Safe

Score 85/100

Canon AEDE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'canon-aede' plugin version 0.2.1 exhibits a remarkably strong security posture. The absence of any identified attack vectors such as AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's surface area for potential exploits. Furthermore, the code signals indicate diligent security practices, with no dangerous functions, all SQL queries using prepared statements, and all output properly escaped. There are also no observed file operations, external HTTP requests, or indications of missing nonce or capability checks in the analyzed code.

The vulnerability history further reinforces this positive assessment, with zero recorded CVEs across all severity levels. This suggests a lack of publicly known security flaws, which is a good indicator for a plugin of this nature. The absence of any taint analysis findings further supports the conclusion that the code is well-sanitized and resists common injection-style attacks.

In conclusion, the 'canon-aede' plugin v0.2.1 appears to be a secure plugin based on this data. Its minimal attack surface, clean code signals, and lack of historical vulnerabilities are all positive signs. There are no specific security concerns directly identified in the provided data that would warrant deductions. The plugin demonstrates good development practices with respect to security.

Vulnerabilities
None known

Canon AEDE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Canon AEDE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Canon AEDE Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_contentcanon-AEDE.php:462
filterthe_titlecanon-AEDE.php:463
Maintenance & Trust

Canon AEDE Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 10, 2014
PHP min version
Downloads20K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Canon AEDE Developer Profile

Jesús Amieiro

2 plugins · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Canon AEDE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/canon-aede/style.css
Version Parameters
canon-aede/style.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Canon AEDE