
SEO Stats Widget Security & Risk Analysis
wordpress.org/plugins/seo-stats-widgetDisplay SEO Statistics of blog
Is SEO Stats Widget Safe to Use in 2026?
Generally Safe
Score 85/100SEO Stats Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The seo-stats-widget plugin v1.1 presents a mixed security posture. On the positive side, it demonstrates good practices by having zero known CVEs and no recorded past vulnerabilities, suggesting a generally stable codebase. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which significantly reduces common attack vectors. The absence of a large attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events, is also a strength.
However, several concerning code signals warrant attention. The presence of the `create_function` dangerous function is a notable risk, as it can lead to arbitrary code execution if exploited. Additionally, the low rate of output escaping (only 25% properly escaped) exposes the plugin to potential Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the WordPress admin area or the front-end if widget output is displayed there. The complete lack of nonce and capability checks, especially concerning the absence of authentication checks on AJAX handlers and REST API routes (though there are zero of these), indicates a fundamental oversight in securing entry points, even if the current entry points are limited.
In conclusion, while the plugin benefits from a clean vulnerability history and solid practices in areas like SQL handling and minimizing external interactions, the use of `create_function` and the significant lack of output escaping, coupled with the absence of critical security checks like nonces and capability checks on potential entry points, create exploitable weaknesses. The limited attack surface currently mitigates the immediate impact, but any future expansion or modification of entry points without addressing these issues could dramatically increase the risk.
Key Concerns
- Use of dangerous function 'create_function'
- Low rate of output escaping (25%)
- No nonce checks
- No capability checks
SEO Stats Widget Security Vulnerabilities
SEO Stats Widget Code Analysis
Dangerous Functions Found
Output Escaping
SEO Stats Widget Attack Surface
WordPress Hooks 5
Maintenance & Trust
SEO Stats Widget Maintenance & Trust
Maintenance Signals
Community Trust
SEO Stats Widget Alternatives
WP Keywords Report
wp-keywords-report
Know your blog position in Google SERP
BoldGrid Easy SEO – Simple and Effective SEO
boldgrid-easy-seo
Easy SEO helps you easily create keyword rich content and rank higher in the search engines.
SmartCrawl SEO checker, analyzer & optimizer
smartcrawl-seo
SEO checker, content analysis & SEO optimizer. Rank higher on search engines with 301 redirects, XML sitemaps & one-click setup.
WP All Import – Import SEO Settings for Yoast SEO
yoast-seo-settings-xml-csv-import
Drag & drop to import from any CSV, Excel, XML, or Google Sheets file into Yoast SEO's titles, meta descriptions, focus keywords, schema sett …
Internal Links Manager
seo-automated-link-building
Boost your SEO and get better rankings with our automated link building plugin. With this plugin you can link any keyword to any URL - internal or ext …
SEO Stats Widget Developer Profile
7 plugins · 270 total installs
How We Detect SEO Stats Widget
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/seo-stats-widget/style.cssseo-stats-widget/style.css?ver=HTML / DOM Fingerprints
wpseostatscreditrel="designer"