EEAT WP Security & Risk Analysis

wordpress.org/plugins/eeat-wp

Boost SEO by demonstrating trustworthiness. The best plugin for Google's EEAT Quality Rater Guideline.

100 active installs v1.0.1 PHP 7.0+ WP 5.2+ Updated Aug 17, 2024
author-boxbylinecitationseeatseo
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EEAT WP Safe to Use in 2026?

Generally Safe

Score 92/100

EEAT WP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'eeat-wp' plugin v1.0.1 exhibits a generally good security posture with a few notable concerns. The static analysis indicates strong adherence to secure coding practices, with 100% of SQL queries using prepared statements and an impressive 97% of outputs properly escaped. The absence of known CVEs in its vulnerability history is a positive indicator, suggesting a history of responsible development and maintenance. However, the presence of 3 AJAX handlers without authentication checks presents a significant attack vector. While no critical taint flows were detected, these unprotected entry points could potentially lead to unauthorized actions if exploited, especially if they interact with sensitive data or functionality.

The plugin benefits from robust internal security mechanisms like nonce and capability checks, which are present for some of its operations. The inclusion of the Select2 library is noted, but its potential for outdated versions is a minor consideration. The limited attack surface, with only 7 total entry points, is a positive factor. Overall, 'eeat-wp' demonstrates a commitment to security through prepared statements and output escaping, but the unprotected AJAX handlers require immediate attention to mitigate potential risks and solidify its security.

Key Concerns

  • AJAX handlers without auth checks
Vulnerabilities
None known

EEAT WP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

EEAT WP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
5 prepared
Unescaped Output
19
649 escaped
Nonce Checks
6
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

100% prepared5 total queries

Output Escaping

97% escaped668 total outputs
Attack Surface
3 unprotected

EEAT WP Attack Surface

Entry Points7
Unprotected3

AJAX Handlers 3

authwp_ajax_eeatwpcp_get_expertiseincludes\class-eeat-wp.php:184
authwp_ajax_eeatwpcp_get_authorincludes\class-eeat-wp.php:187
authwp_ajax_eeatwpcp_check_citations_limitincludes\class-eeat-wp.php:190

Shortcodes 4

[eeatwp_citations] public\class-eeat-wp-public.php:58
[eeatwp_author_bylines] public\class-eeat-wp-public.php:61
[eeatwp_author_boxes] public\class-eeat-wp-public.php:64
[eeatwp_author_details] public\class-eeat-wp-public.php:67
WordPress Hooks 16
actionadmin_noticesadmin\class-eeat-wp-admin.php:76
actionplugins_loadedincludes\class-eeat-wp.php:144
actionadmin_enqueue_scriptsincludes\class-eeat-wp.php:160
actionadmin_enqueue_scriptsincludes\class-eeat-wp.php:161
actionadmin_menuincludes\class-eeat-wp.php:164
actionadd_meta_boxesincludes\class-eeat-wp.php:167
actionsave_postincludes\class-eeat-wp.php:170
actionedit_user_profileincludes\class-eeat-wp.php:173
actionshow_user_profileincludes\class-eeat-wp.php:174
actionedit_user_profile_updateincludes\class-eeat-wp.php:177
actionpersonal_options_updateincludes\class-eeat-wp.php:178
actionwp_enqueue_scriptsincludes\class-eeat-wp.php:205
actionwp_enqueue_scriptsincludes\class-eeat-wp.php:206
filterthe_contentincludes\class-eeat-wp.php:208
actionwp_headincludes\class-eeat-wp.php:211
actionwp_headincludes\class-eeat-wp.php:214
Maintenance & Trust

EEAT WP Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedAug 17, 2024
PHP min version7.0
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

EEAT WP Developer Profile

eeatwp

1 plugin · 100 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EEAT WP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/eeat-wp/css/eeat-wp-admin.css/wp-content/plugins/eeat-wp/js/eeat-wp-admin.js
Script Paths
/wp-content/plugins/eeat-wp/js/eeat-wp-admin.js
Version Parameters
eeat-wp-admin.css?ver=eeat-wp-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
eeatwpcp-admin-css
Data Attributes
eeatwpcp_js_noncegenerate_citation_metabox_nonce
JS Globals
eeatwpcp_ajax
FAQ

Frequently Asked Questions about EEAT WP