Custom Fields as Meta Tags Security & Risk Analysis

wordpress.org/plugins/custom-fields-as-meta-tags

Add custom fields of post as meta tag in head section.

10 active installs v0.1 PHP + WP 3.0.1+ Updated Nov 2, 2014
customcustom-fieldfieldmetatag
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Fields as Meta Tags Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Fields as Meta Tags has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "custom-fields-as-meta-tags" plugin version 0.1 presents a mixed security posture. On the positive side, there are no identified AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal attack surface. Furthermore, all SQL queries utilize prepared statements, and there are no recorded vulnerabilities or CVEs, suggesting a generally safe and well-maintained history. The absence of dangerous functions, file operations, and external HTTP requests also contributes to its perceived security.

However, a significant concern arises from the complete lack of output escaping. With one output identified and 0% properly escaped, this leaves the plugin highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Any data output by this plugin that originates from user input or external sources could be exploited by attackers to inject malicious scripts into the browser of other users, leading to session hijacking, defacement, or credential theft.

Additionally, the absence of nonce checks and capability checks, coupled with zero-authentication checks on entry points (though the attack surface is currently zero), means that if any entry points were to be added in future versions without proper security considerations, they would be inherently insecure. The vulnerability history is clean, which is good, but this does not negate the present risk of unescaped output. The plugin's strengths lie in its limited attack surface and secure database interactions, but the critical flaw of unescaped output demands immediate attention.

Key Concerns

  • Unescaped output detected
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Custom Fields as Meta Tags Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Custom Fields as Meta Tags Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Custom Fields as Meta Tags Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headcustom_fields_as_meta_plugin.php:20
Maintenance & Trust

Custom Fields as Meta Tags Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedNov 2, 2014
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

Custom Fields as Meta Tags Developer Profile

Muhammad Jawaid Shamshad

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Fields as Meta Tags

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
namecontent
Shortcode Output
<meta name="" content="
FAQ

Frequently Asked Questions about Custom Fields as Meta Tags