IGen SEO API Security & Risk Analysis

wordpress.org/plugins/igen-seo-api

Register Yoast SEO meta fields to make them accessible through REST API for reading and writing.

100 active installs v1.0.0 PHP 7.4+ WP 5.0+ Updated Oct 8, 2025
meta-fieldsrest-apiseoyoast
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is IGen SEO API Safe to Use in 2026?

Generally Safe

Score 100/100

IGen SEO API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The igen-seo-api v1.0.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, file operations, or external HTTP requests is a significant positive indicator. Furthermore, the plugin exclusively uses prepared statements for SQL queries and ensures all output is properly escaped, which are crucial best practices for preventing common web vulnerabilities like SQL injection and Cross-Site Scripting (XSS). The vulnerability history is also clean, with no recorded CVEs, suggesting a generally secure development approach.

While the attack surface appears to be zero based on the provided metrics (no AJAX handlers, REST API routes, shortcodes, or cron events), this could also indicate limited functionality. The presence of one capability check is positive, but the lack of nonce checks is a potential concern, especially if any hidden entry points were to emerge or if the plugin's functionality expands in future versions. The taint analysis yielding zero flows is excellent, confirming no immediate risks of data being improperly handled or leading to vulnerabilities.

In conclusion, the plugin demonstrates a robust foundation of secure coding practices. The lack of known vulnerabilities and the clean static analysis are commendable. The primary area for attention, though not explicitly flagged as a vulnerability in this analysis, is the absence of nonce checks, which could become a point of weakness if the plugin's attack surface grows. Overall, the plugin appears to be a low-risk option based on this snapshot.

Key Concerns

  • No nonce checks on entry points
Vulnerabilities
None known

IGen SEO API Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

IGen SEO API Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

IGen SEO API Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitigen-seo-api.php:68
actionadmin_noticesigen-seo-api.php:101
actioninitigen-seo-api.php:116
Maintenance & Trust

IGen SEO API Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 8, 2025
PHP min version7.4
Downloads355

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

IGen SEO API Developer Profile

i-Gen.ai

1 plugin · 100 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect IGen SEO API

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
noticenotice-warningis-dismissible
REST Endpoints
/wp-json/igen-seo-api
FAQ

Frequently Asked Questions about IGen SEO API