Quick META Keywords Security & Risk Analysis

wordpress.org/plugins/quick-meta-keywords

Automatically adds a META keywords tags with keywords within the html HEAD tags. The categories are used as keywords.

100 active installs v1.1 PHP 5.4+ WP 4.0+ Updated Apr 10, 2020
blogcategorieskeywordsmetatags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Quick META Keywords Safe to Use in 2026?

Generally Safe

Score 85/100

Quick META Keywords has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The quick-meta-keywords v1.1 plugin exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface, which is a significant positive. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is commendable. The use of prepared statements for all SQL queries indicates good database interaction practices. However, a critical weakness lies in the output escaping. With one total output and 0% properly escaped, this presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-generated or dynamically generated content that is not properly escaped before being displayed to users could be exploited by an attacker.

The vulnerability history is clean, with no known CVEs or recorded common vulnerability types. This, combined with the absence of critical taint flows and unsanitized paths, suggests that the plugin has historically been developed with security in mind or has not yet been targeted by sophisticated attacks. However, the lack of vulnerability history doesn't negate the identified XSS risk. The absence of nonce and capability checks across the board, while currently not exploitable due to the lack of entry points, leaves the plugin vulnerable if new entry points are introduced in future versions without corresponding security checks.

In conclusion, the quick-meta-keywords plugin has strengths in its minimal attack surface and secure database practices. Nevertheless, the severe lack of output escaping is a major concern that could lead to critical XSS vulnerabilities. The absence of historical vulnerabilities is positive but should not breed complacency, especially given the identified output escaping issue and the lack of broader security checks like nonces and capability checks, which could be exploited if the plugin's architecture were to change.

Key Concerns

  • Unescaped output detected
  • No nonce checks on potential outputs
  • No capability checks on potential outputs
Vulnerabilities
None known

Quick META Keywords Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Quick META Keywords Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Quick META Keywords Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headmetakeywords.php:25
Maintenance & Trust

Quick META Keywords Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 10, 2020
PHP min version5.4
Downloads26K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Quick META Keywords Developer Profile

P. Chandra

2 plugins · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Quick META Keywords

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/quick-meta-keywords/metakeywords.php

HTML / DOM Fingerprints

Data Attributes
name="keywords"
FAQ

Frequently Asked Questions about Quick META Keywords