
Robots.txt rewrite Security & Risk Analysis
wordpress.org/plugins/robotstxt-rewriteProvide the easy managment of your robots.txt from admin side. It propose you the advanced then standard robots.txt content too.
Is Robots.txt rewrite Safe to Use in 2026?
Use With Caution
Score 63/100Robots.txt rewrite has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The robotstxt-rewrite plugin v1.6.1 presents a mixed security profile. On the positive side, the static analysis reveals a promising lack of direct entry points like AJAX handlers, REST API routes, shortcodes, and cron events that are not properly secured. The plugin also demonstrates good practices by exclusively using prepared statements for its SQL queries, indicating an awareness of SQL injection vulnerabilities. Furthermore, the presence of a nonce check is a positive sign for preventing certain types of attacks.
However, several concerns warrant attention. The most significant issue is the single known medium severity vulnerability that is currently unpatched. This historical vulnerability, a Cross-Site Request Forgery (CSRF), suggests that in the past, there have been weaknesses that could be exploited by tricking authenticated users into performing unintended actions. Additionally, while the total output escaping is high, the fact that 33% of outputs are not properly escaped presents a potential risk for cross-site scripting (XSS) vulnerabilities, depending on the nature of the unescaped data and how it is rendered.
In conclusion, while the plugin's limited attack surface and secure SQL practices are commendable, the unpatched medium severity CVE and the percentage of unescaped outputs are notable weaknesses. Users should prioritize addressing the known vulnerability and be aware of potential XSS risks associated with the unescaped output. The plugin's security posture could be significantly improved by patching the existing vulnerability and further refining its output escaping mechanisms.
Key Concerns
- Unpatched CVE (Medium Severity)
- Significant portion of outputs not escaped
Robots.txt rewrite Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Robots.txt rewrite <= 1.6.1 - Cross-Site Request Forgery
Robots.txt rewrite Code Analysis
Bundled Libraries
Output Escaping
Data Flow Analysis
Robots.txt rewrite Attack Surface
WordPress Hooks 4
Maintenance & Trust
Robots.txt rewrite Maintenance & Trust
Maintenance Signals
Community Trust
Robots.txt rewrite Alternatives
Better Robots.txt – AI-Ready Crawl Control & Bot Governance
better-robots-txt
Replace the default WordPress robots.txt workflow with a smarter, structured version you can preview before publishing, with Free, Pro, and Premium ed …
Block AI Crawlers
block-ai-crawlers
Tell AI (Artificial Intelligence) companies not to scrape your site for their AI products.
AI Content Signals
ai-content-signals
Add Content Signals to your robots.txt to control how AI crawlers can use your content.
MetaRobots by SEO-Sign
meta-robots-by-seo-sign
The easiest way to manage meta robots tag.
Robots Meta Whiz
robotswhiz
Easy way to discourage search engines from indexing only specific pages / posts with custom meta tags.
Robots.txt rewrite Developer Profile
3 plugins · 1K total installs
How We Detect Robots.txt rewrite
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/robotstxt-rewrite/assets/fields.css/wp-content/plugins/robotstxt-rewrite/assets/fields.js/wp-content/plugins/robotstxt-rewrite/assets/chosen.jquery.min.js/wp-content/plugins/robotstxt-rewrite/assets/fields.jsrobotstxt-rewrite/assets/fields.css?prefix=robotstxt-rewrite/assets/fields.js?prefix=HTML / DOM Fingerprints
atf-fieldsatf-options-groupdata-field-typedata-field-name-templateatf_html_helper