Seeder Security & Risk Analysis

wordpress.org/plugins/seeder

Perform heavy / infrequent actions in a controlled manner.

10 active installs v2.0.0 PHP + WP 3.3+ Updated Nov 21, 2017
administratorinfrequent-actionsseed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Seeder Safe to Use in 2026?

Generally Safe

Score 85/100

Seeder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'seeder' plugin v2.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points like AJAX handlers, REST API routes, shortcodes, or cron events significantly reduces the potential for external exploitation. Furthermore, the code demonstrates good practices with 100% of SQL queries using prepared statements and all output being properly escaped. The presence of a nonce check is also a positive indicator. However, the taint analysis reveals one flow with an unsanitized path, flagged as high severity. While there is no known vulnerability history for this plugin, this single high-severity taint flow warrants attention as it suggests a potential, albeit currently unexploited, weakness in how data is handled, which could be leveraged if an attacker can control the unsanitized path. The lack of capability checks is a minor concern in the context of the limited attack surface, but it's a practice that could become problematic if the plugin's functionality expands in the future.

Key Concerns

  • High severity unsanitized taint flow
  • Missing capability checks
Vulnerabilities
None known

Seeder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Seeder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
7 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped7 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<handler> (src\handler.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Seeder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menusrc\admin.php:5
actionadmin_initsrc\handler.php:14
Maintenance & Trust

Seeder Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedNov 21, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Seeder Developer Profile

Aaron Holbrook

4 plugins · 40 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Seeder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Seeder