Canonical Pages Security & Risk Analysis

wordpress.org/plugins/canonical-pages

Quickly add the canonical meta tag and customize the url.

80 active installs v1.0.1 PHP 7.4+ WP 6.0+ Updated Dec 16, 2025
canonicalcanonical-urlcanonicalizationseourls
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Canonical Pages Safe to Use in 2026?

Generally Safe

Score 100/100

Canonical Pages has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "canonical-pages" plugin v1.0.1 exhibits a strong security posture based on the provided static analysis. There are no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. The code adheres to secure development practices by utilizing prepared statements for all SQL queries and properly escaping all output. The absence of dangerous functions, file operations, and external HTTP requests further strengthens its security profile. The plugin also demonstrates a good understanding of WordPress security by including capability checks, although it's noted that there are no nonce checks. The vulnerability history is completely clean, with no recorded CVEs, which is a significant positive indicator of the plugin's long-term security maintenance. This suggests that the plugin authors have a strong commitment to security and have likely addressed any potential issues proactively. The plugin's greatest weakness lies in its zero-value attack surface, which while seemingly positive, might also indicate a lack of functionality that exposes it to potential attack vectors or a very narrow scope of operation. The absence of nonce checks, while not explicitly leading to a critical issue in this specific analysis, represents a missed opportunity for enhancing security on any potential future AJAX or similar interactions, however unlikely given the current attack surface.

Key Concerns

  • No nonce checks present
Vulnerabilities
None known

Canonical Pages Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Canonical Pages Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

Canonical Pages Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionenqueue_block_editor_assetsadmin\canonical-pages-admin.class.php:33
actionwp_headcanonical-pages.class.php:29
filterget_canonical_urlcanonical-pages.class.php:38
filterwpseo_canonicalcanonical-pages.class.php:42
filterrank_math/frontend/canonicalcanonical-pages.class.php:47
filteraioseo_canonical_urlcanonical-pages.class.php:52
filterslim_seo_canonical_urlcanonical-pages.class.php:57
actioninitcanonical-pages.php:37
Maintenance & Trust

Canonical Pages Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 16, 2025
PHP min version7.4
Downloads684

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

Canonical Pages Developer Profile

Painless Analytics

2 plugins · 80 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Canonical Pages

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/canonical-pages/canonical-pages.class.php/wp-content/plugins/canonical-pages/admin/canonical-pages-admin.class.php
Script Paths
/wp-content/plugins/canonical-pages/admin/edit.min.js
Version Parameters
canonical-pages/style.css?ver=canonical-pages/admin/edit.min.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-canonical-pages
JS Globals
canonicalPages
REST Endpoints
/wp-json/canonical-pages/v1/settings
FAQ

Frequently Asked Questions about Canonical Pages