SEO Editor Security & Risk Analysis

wordpress.org/plugins/seo-editor

Edit SEO Data in bulk to save time. Includes meta title, description, and keyword editing for all post types, taxonomies, and users.

400 active installs v1.0.7 PHP + WP 4.0+ Updated Apr 6, 2020
seoseo-bulk-editorseo-editor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SEO Editor Safe to Use in 2026?

Generally Safe

Score 85/100

SEO Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "seo-editor" plugin version 1.0.7 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries, exclusively using prepared statements, and has a clean vulnerability history with no known CVEs. It also has a relatively small attack surface in terms of REST API routes and shortcodes. However, there are significant concerns primarily related to the unprotected AJAX handlers.

The static analysis reveals that both of the plugin's AJAX handlers lack authentication checks. This is a critical oversight as it exposes these entry points to potential abuse by unauthenticated users. While the taint analysis shows no critical or high severity unsanitized paths, the presence of 3 flows with unsanitized paths, though not classified as critical, is still a cause for concern, especially when combined with unprotected entry points. The output escaping is also not fully robust, with only 57% of outputs being properly escaped, indicating a potential for cross-site scripting (XSS) vulnerabilities, particularly in conjunction with the unprotected AJAX handlers.

Overall, the plugin's lack of known vulnerabilities is a positive indicator, but the identified security weaknesses in its AJAX handling and output sanitization represent real risks. The presence of unprotected entry points is the most pressing issue. While strengths exist, particularly in its SQL handling and lack of past exploits, the immediate concerns regarding AJAX security and output escaping should be addressed to improve its overall security posture.

Key Concerns

  • AJAX handlers without authentication checks
  • Flows with unsanitized paths
  • Output escaping below 75%
Vulnerabilities
None known

SEO Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SEO Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
80
107 escaped
Nonce Checks
1
Capability Checks
4
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

57% escaped187 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

5 flows3 with unsanitized paths
editor_page (admin\class-seo-editor-admin.php:315)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

SEO Editor Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_SEO_Editor_content_previewincludes\class-seo-editor.php:153
authwp_ajax_save_changesincludes\class-seo-editor.php:156
WordPress Hooks 10
actionplugins_loadedincludes\class-seo-editor.php:119
actionadmin_noticesincludes\class-seo-editor.php:135
actionadmin_menuincludes\class-seo-editor.php:138
actionaioseop_modules_add_menusincludes\class-seo-editor.php:141
filtercustom_menu_orderincludes\class-seo-editor.php:144
actionadmin_enqueue_scriptsincludes\class-seo-editor.php:147
actionadmin_enqueue_scriptsincludes\class-seo-editor.php:150
actionadmin_initincludes\class-seo-editor.php:159
actionadmin_footerincludes\class-wp-list-table.php:115
actionplugins_loadedseo-editor.php:47
Maintenance & Trust

SEO Editor Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 6, 2020
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings3
Active installs400
Developer Profile

SEO Editor Developer Profile

WetPaint

1 plugin · 400 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SEO Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/seo-editor/css/seo-editor-admin.css/wp-content/plugins/seo-editor/js/seo-editor-admin.js
Script Paths
/wp-content/plugins/seo-editor/js/seo-editor-admin.js
Version Parameters
seo-editor/css/seo-editor-admin.css?ver=seo-editor/js/seo-editor-admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- TODO: 1.x Content Preview feature. -->
JS Globals
seom_obj
FAQ

Frequently Asked Questions about SEO Editor