"SEO-HEADERS-Easy" Protocol HTTP 1.1 Security & Risk Analysis

wordpress.org/plugins/seo-http-headers-easy

Sends to a client correct HTTP headers Last Modified, Cache Control and 304 Not Modified

100 active installs v2.0.0 PHP + WP 3.5.1+ Updated Dec 10, 2015
headersheadinghttphttp1-1protocol
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is "SEO-HEADERS-Easy" Protocol HTTP 1.1 Safe to Use in 2026?

Generally Safe

Score 85/100

"SEO-HEADERS-Easy" Protocol HTTP 1.1 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "seo-http-headers-easy" v2.0.0 plugin presents a mixed security profile. On the positive side, it demonstrates an absence of known vulnerabilities in its history and avoids common risky practices like raw SQL queries or file operations. The static analysis reveals a seemingly small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected, which is a strong indication of good initial design regarding entry points.

However, several critical concerns arise from the code analysis. The most significant issue is that 100% of the plugin's output is not properly escaped, with a total of 10 output operations. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied or manipulated data could be rendered directly in the browser. Furthermore, the taint analysis reveals 3 flows with unsanitized paths, which, while not classified as critical or high severity in this report, still indicates potential avenues for injection attacks if not properly handled. The lack of nonce and capability checks on any entry points (even though there are zero identified) suggests a potential weakness if new entry points were introduced or if the current ones are misclassified. The plugin also lacks any external HTTP requests and dangerous functions, which are positive indicators.

In conclusion, while the plugin has a clean vulnerability history and avoids some dangerous practices, the pervasive lack of output escaping and the presence of unsanitized taint flows represent substantial security risks that need immediate attention. The absence of explicit capability and nonce checks, while potentially mitigated by the zero attack surface, still represents a gap in defensive programming that could be exploited if the attack surface were to grow or be misunderstood. The plugin's strengths lie in its lack of historical CVEs and avoidance of raw SQL, but its weaknesses in output sanitization and taint handling are significant.

Key Concerns

  • Unescaped output detected (10/10)
  • Unsanitized paths in taint analysis (3 flows)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

"SEO-HEADERS-Easy" Protocol HTTP 1.1 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

"SEO-HEADERS-Easy" Protocol HTTP 1.1 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
_set_headers (seo_http_headers.class.php:226)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

"SEO-HEADERS-Easy" Protocol HTTP 1.1 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedseo_http_headers.class.php:38
actionadmin_menuseo_http_headers.class.php:88
actionadmin_enqueue_scriptsseo_http_headers.class.php:90
actionwpseo_http_headers.class.php:95
filterplugin_action_linksseo_http_headers.class.php:96
filterplugin_row_metaseo_http_headers.class.php:97
Maintenance & Trust

"SEO-HEADERS-Easy" Protocol HTTP 1.1 Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 10, 2015
PHP min version
Downloads4K

Community Trust

Rating94/100
Number of ratings3
Active installs100
Developer Profile

"SEO-HEADERS-Easy" Protocol HTTP 1.1 Developer Profile

Smiling_Hemp

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect "SEO-HEADERS-Easy" Protocol HTTP 1.1

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/seo-http-headers-easy/css/admin-style.css/wp-content/plugins/seo-http-headers-easy/css/jquery-ui.min.css/wp-content/plugins/seo-http-headers-easy/js/script.js/wp-content/plugins/seo-http-headers-easy/js/ajax.js
Script Paths
/wp-content/plugins/seo-http-headers-easy/js/script.js/wp-content/plugins/seo-http-headers-easy/js/ajax.js
Version Parameters
seo-http-headers-easy/css/admin-style.css?ver=seo-http-headers-easy/css/jquery-ui.min.css?ver=seo-http-headers-easy/js/script.js?ver=seo-http-headers-easy/js/ajax.js?ver=

HTML / DOM Fingerprints

JS Globals
httpVar
FAQ

Frequently Asked Questions about "SEO-HEADERS-Easy" Protocol HTTP 1.1