SEO404 Security & Risk Analysis

wordpress.org/plugins/seo404

SEO404 redirects to the Blog front page with a 301. No more 404 errors on Google/Bing/etc.

70 active installs v0.4 PHP + WP 3.2+ Updated May 2, 2012
301404redirectseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SEO404 Safe to Use in 2026?

Generally Safe

Score 85/100

SEO404 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The seo404 plugin v0.4 presents a seemingly secure posture based on the provided static analysis and vulnerability history. The absence of known CVEs and the fact that there are no currently unpatched vulnerabilities are positive indicators. Furthermore, the plugin reports zero AJAX handlers, REST API routes, shortcodes, or cron events as entry points, suggesting a minimal attack surface. The code analysis also shows no dangerous functions and all SQL queries utilize prepared statements, which are excellent security practices. However, a significant concern is the 100% of output escaping being unproperly handled, meaning any dynamic content generated by the plugin could be susceptible to cross-site scripting (XSS) vulnerabilities. This is a notable weakness that could be exploited if user-supplied data or dynamic content is not correctly sanitized before being displayed to the user.

Despite the lack of known vulnerabilities and a small attack surface, the unescaped output is a critical flaw that should not be overlooked. While the plugin may have a clean history, this does not guarantee future safety, especially with the identified output escaping issue. The plugin's strengths lie in its lack of complex entry points and secure database interaction. The primary weakness is the potential for XSS due to improper output handling. Therefore, while the overall risk appears low due to the limited attack surface and clean history, the unescaped output represents a concrete and exploitable vulnerability.

Key Concerns

  • Output escaping is not properly handled
Vulnerabilities
None known

SEO404 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SEO404 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

SEO404 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initSEO404.php:54
action404_templateSEO404.php:96
actionadmin_menuSEO404.php:99
Maintenance & Trust

SEO404 Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMay 2, 2012
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

SEO404 Developer Profile

larsstorm

1 plugin · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SEO404

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<input type="text" name="maindomain" value="<?php echo get_option('maindomain'); ?>" /><p>Where should the 301 redirect to? e.g. http://mysite.com/</p><p>Here it is also possible to add tracking for Google analytics to allow information on the redirect e.g. http://mysite.com/?utm_source=SEO404&utm_medium=OldDomain&utm_campaign=Redirect</p>
FAQ

Frequently Asked Questions about SEO404