HeadMeta Security & Risk Analysis

wordpress.org/plugins/headmeta

Automatically add <link>, <meta> description and <meta> keywords to your HTML on a per-post (or page) basis.

60 active installs v1.5 PHP + WP 1.2+ Updated Aug 26, 2015
keywordsmetapostssearchseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is HeadMeta Safe to Use in 2026?

Generally Safe

Score 85/100

HeadMeta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'headmeta' plugin, version 1.5, exhibits a generally strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the analysis shows no dangerous functions, file operations, external HTTP requests, or bundled libraries, which are all positive indicators. The plugin also demonstrates excellent SQL hygiene, with all queries utilizing prepared statements.

However, a significant concern arises from the output escaping. With 4 total outputs and 0% properly escaped, there is a high risk of cross-site scripting (XSS) vulnerabilities. Any user-provided data that is displayed by the plugin without proper escaping could be exploited by attackers. The lack of nonce and capability checks on all entry points (though there are zero entry points detected) is a theoretical weakness, but less concerning in this specific instance due to the absence of detectable entry points. The plugin's vulnerability history is clean, with no recorded CVEs, which suggests a history of secure development. Despite the lack of a history of vulnerabilities, the unescaped output presents a tangible and serious risk that requires immediate attention.

In conclusion, while 'headmeta' v1.5 has a very limited attack surface and good practices regarding SQL and other code signals, the complete failure to escape output is a critical oversight. This single weakness introduces a substantial risk of XSS attacks, overshadowing the otherwise positive security attributes. Addressing the output escaping is paramount to improving the plugin's overall security.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

HeadMeta Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

HeadMeta Release Timeline

v1.5Current
v1.4
v1.3
Code Analysis
Analyzed Mar 16, 2026

HeadMeta Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

HeadMeta Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headheadmeta.php:129
Maintenance & Trust

HeadMeta Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 26, 2015
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings1
Active installs60
Developer Profile

HeadMeta Developer Profile

Dougal Campbell

5 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect HeadMeta

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<meta name='keywords' content='<meta name='description' content='
FAQ

Frequently Asked Questions about HeadMeta