GlorySEO Security & Risk Analysis

wordpress.org/plugins/gloryseo

A professional SEO plugin for WordPress: meta tags, schema, Open Graph, redirects, and WooCommerce SEO support.

0 active installs v1.2 PHP 7.4+ WP 5.5+ Updated Aug 9, 2025
open-graphredirectsschemaseowoocommerce-seo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is GlorySEO Safe to Use in 2026?

Generally Safe

Score 100/100

GlorySEO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The "gloryseo" v1.2 plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of any registered attack surface points, such as AJAX handlers, REST API routes, shortcodes, or cron events, is a significant positive. This indicates that the plugin does not expose common entry points that attackers typically target. Furthermore, the code signals are largely reassuring: no dangerous functions were found, all SQL queries utilize prepared statements, and external HTTP requests are absent. The high percentage of properly escaped output (93%) also suggests a good effort to prevent cross-site scripting vulnerabilities.

Despite these strengths, there are minor areas for improvement. The presence of only 4 nonce checks and 1 capability check, while not necessarily indicative of immediate vulnerabilities given the lack of an exposed attack surface, could suggest that the plugin might be vulnerable if new entry points are introduced or if existing ones are inadvertently exposed. The taint analysis, though limited in scope (2 flows analyzed), reported no unsanitized paths, which is positive. The plugin's vulnerability history is also entirely clear, with zero recorded CVEs, suggesting a history of secure development or a lack of past significant issues.

In conclusion, "gloryseo" v1.2 appears to be a well-secured plugin, primarily due to its extremely limited attack surface and sound coding practices regarding SQL and output handling. The absence of historical vulnerabilities further bolsters this assessment. However, a cautious approach would recommend reviewing the implementation of its limited authorization checks to ensure they are robust and comprehensive in case of future feature additions or unexpected exposure of entry points.

Key Concerns

  • Limited nonce checks for potential entry points
  • Limited capability checks for potential entry points
Vulnerabilities
None known

GlorySEO Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

GlorySEO Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
55 escaped
Nonce Checks
4
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

93% escaped59 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
gloryseo_bulk_editor_page (includes\bulk-editor.php:2)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GlorySEO Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actioninitgloryseo.php:29
actionadmin_menugloryseo.php:42
actionenqueue_block_editor_assetsgloryseo.php:53
actionadmin_menugloryseo.php:64
actionadmin_initincludes\admin-settings.php:27
actionadd_meta_boxesincludes\meta-box.php:12
actionsave_postincludes\meta-box.php:71
actionwp_headincludes\schema.php:50
actionwp_headincludes\social.php:34
actionadd_meta_boxesincludes\woocommerce.php:9
actionsave_post_productincludes\woocommerce.php:39
actionwoocommerce_product_options_general_product_dataincludes\woocommerce.php:57
actionsave_post_productincludes\woocommerce.php:62
Maintenance & Trust

GlorySEO Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 9, 2025
PHP min version7.4
Downloads667

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

GlorySEO Developer Profile

aumsrini

5 plugins · 50 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GlorySEO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gloryseo/assets/js/sidebar.js
Script Paths
/wp-content/plugins/gloryseo/assets/js/sidebar.js

HTML / DOM Fingerprints

Data Attributes
name="_gloryseo_focus_keyword"name="_gloryseo_meta_title"name="_gloryseo_meta_description"name="_gloryseo_seo_score"name="gloryseo_options[meta_title]"name="gloryseo_options[meta_description]"+3 more
REST Endpoints
/wp-json/wp/v2/posts?meta=_gloryseo_focus_keyword/wp-json/wp/v2/posts?meta=_gloryseo_meta_title/wp-json/wp/v2/posts?meta=_gloryseo_meta_description/wp-json/wp/v2/posts?meta=_gloryseo_seo_score
FAQ

Frequently Asked Questions about GlorySEO