SC Simple SEO Security & Risk Analysis

wordpress.org/plugins/sc-simple-seo

A very simple SEO plugin

10 active installs v2.1 PHP + WP 3.2+ Updated Jul 12, 2017
analyticsgooglesearchsearch-engine-optimizationseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SC Simple SEO Safe to Use in 2026?

Generally Safe

Score 85/100

SC Simple SEO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'sc-simple-seo' plugin version 2.1 presents a generally favorable security posture based on the provided static analysis and vulnerability history. The absence of any recorded CVEs, critical vulnerabilities in taint analysis, dangerous function usage, file operations, or external HTTP requests is a strong positive indicator. Furthermore, all SQL queries are properly prepared, and there's no indication of bundled libraries, which mitigates risks associated with outdated dependencies.

However, a significant concern arises from the complete lack of output escaping in the static analysis. With 42 total outputs analyzed and 0% properly escaped, this indicates a high likelihood of cross-site scripting (XSS) vulnerabilities. Any dynamic data rendered by this plugin could be injected with malicious scripts, posing a risk to users and site integrity. Additionally, the absence of nonce and capability checks, while not directly tied to identified entry points in this specific analysis, suggests a potential lack of robust authorization and session validation mechanisms, which could be exploited if new entry points were introduced or existing ones were discovered.

In conclusion, while the plugin shows strengths in areas like SQL sanitization and historical security, the pervasive issue of unescaped output is a critical weakness that demands immediate attention. The plugin is otherwise clean in terms of known vulnerabilities and code execution risks, but the XSS potential significantly lowers its overall security score.

Key Concerns

  • All outputs are unescaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

SC Simple SEO Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SC Simple SEO Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
42
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped42 total outputs
Attack Surface

SC Simple SEO Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_footerfunctions\google.php:24
actionwp_headfunctions\head.php:88
actionadmin_menufunctions\settings-init.php:3
actionadmin_initfunctions\settings-init.php:4
actionadmin_enqueue_scriptsindex.php:18
Maintenance & Trust

SC Simple SEO Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 12, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

SC Simple SEO Developer Profile

Sergio Costa

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SC Simple SEO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sc-simple-seo/css/sc-seo-bootstrap.css

HTML / DOM Fingerprints

HTML Comments
<!-- Opeh Graph Meta Tags --><!-- Dublin Core Meta Tags --><!-- Google Geo Location --><!-- Dublin Core Meta Data -->
Data Attributes
name="author"contentname="keywords"name="description"name="copyright"name="robots"+17 more
JS Globals
var _gaq
FAQ

Frequently Asked Questions about SC Simple SEO