
Noindex by Path Security & Risk Analysis
wordpress.org/plugins/noindex-by-pathAsk search engines not to index individual pages by a relative path - which means you can set every url no matter it is a page, category listing or an …
Is Noindex by Path Safe to Use in 2026?
Use With Caution
Score 63/100Noindex by Path has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The "noindex-by-path" plugin version 1.0 presents a mixed security posture. On the positive side, the static analysis indicates a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are generally good security practices. The taint analysis also shows no identified vulnerabilities in this area.
However, a significant concern arises from the lack of output escaping in the plugin. With 100% of identified outputs not being properly escaped, this creates a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. While the attack surface is small, this unescaped output can be exploited through various vectors if user-controlled input is displayed without proper sanitization. The vulnerability history also highlights a significant issue: one unpatched medium-severity CVE. The fact that the last vulnerability was in December 2025, and it is still unpatched, suggests a lack of ongoing maintenance or a delayed response to security issues. This, coupled with the absence of nonce and capability checks, indicates potential weaknesses in how the plugin handles its functionality and prevents unauthorized access or actions.
In conclusion, while the "noindex-by-path" plugin has a limited attack surface and uses prepared statements for its database interactions, the critical lack of output escaping and the presence of an unpatched vulnerability are significant security weaknesses. The absence of nonce and capability checks further exacerbates these risks, making the plugin susceptible to XSS and potentially other forms of exploitation if user input is processed and displayed without adequate safeguards. Active patching of known vulnerabilities and addressing the output escaping issues are crucial for improving the plugin's security.
Key Concerns
- Unpatched medium CVE
- Output escaping: 0% properly escaped
- No nonce checks
- No capability checks
Noindex by Path Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Noindex by Path <= 1.0 - Cross-Site Request Forgery
Noindex by Path Code Analysis
SQL Query Safety
Output Escaping
Noindex by Path Attack Surface
WordPress Hooks 4
Maintenance & Trust
Noindex by Path Maintenance & Trust
Maintenance Signals
Community Trust
Noindex by Path Alternatives
Noindex Pages
noindex-pages
Ask search engines not to index individual pages by checking an option in the publish post box.
noindex SEO
noindex-seo
Control search engine indexing with robots directives using HTML meta tags or HTTP headers.
Noindex Attachment Pages
noindex-attachment-pages
Add META ROBOTS NOINDEX to Attachment Pages in WordPress for better SEO
AI-Only Pages
ai-only-pages
Mark any page as AI-only. Hidden from search engines, optimized for AI crawlers, listed in /llms-index.txt. Includes Token Diet and global settings.
LiteSpeed Cache
litespeed-cache
All-in-one unbeatable acceleration & PageSpeed improvement: caching, image/CSS/JS optimization...
Noindex by Path Developer Profile
1 plugin · 50 total installs
How We Detect Noindex by Path
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/noindex-by-path/app/css/style.css/wp-content/plugins/noindex-by-path/app/js/script.jsnoindex-by-path/app/css/style.css?ver=noindex-by-path/app/js/script.js?ver=HTML / DOM Fingerprints
window.mkijakNoindexByPath