SeoPilot Security & Risk Analysis

wordpress.org/plugins/seopilot

Wtyczka umożliwia wyświetlanie reklam systemu seopilot.pl

10 active installs v1.1 PHP + WP 3.6+ Updated Sep 19, 2013
seopilotseopilot-pl
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SeoPilot Safe to Use in 2026?

Generally Safe

Score 85/100

SeoPilot has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The seopilot plugin v1.1 exhibits a mixed security posture. On the positive side, it has a very small attack surface with only one shortcode and no AJAX handlers or REST API routes that appear to be directly exposed. Furthermore, there are no known vulnerabilities (CVEs) associated with this plugin, and it utilizes prepared statements for all SQL queries, which is a strong security practice. The absence of critical or high severity taint flows is also reassuring.

However, there are significant areas of concern. The plugin's output escaping is non-existent, with 0% of its outputs properly escaped. This is a critical vulnerability that could lead to cross-site scripting (XSS) attacks if any user-supplied data is ever displayed on the frontend without sanitization. Additionally, the plugin makes 11 file operations and performs 1 external HTTP request without apparent sanitization or validation, which could be leveraged for path traversal, unauthorized file modifications, or SSRF attacks. The complete lack of nonce checks across any entry points, combined with only one capability check, suggests a significant reliance on the logged-in user's existing permissions rather than robust, per-action authorization, which is a weakness.

Given the lack of historical vulnerabilities, it might suggest that these code weaknesses have either gone unnoticed or have not been successfully exploited. However, the identified code signals, particularly the unescaped output and the extensive file operations and external requests without proper checks, represent tangible risks that could be exploited by a motivated attacker. The plugin would benefit greatly from implementing output escaping, better sanitization around file operations and HTTP requests, and more granular authorization checks.

Key Concerns

  • No output escaping
  • File operations without explicit checks
  • External HTTP request without explicit checks
  • No nonce checks
  • Limited capability checks
Vulnerabilities
None known

SeoPilot Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SeoPilot Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
11
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

SeoPilot Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[seopilot] seopilot.php:122
WordPress Hooks 2
actionwidgets_initseopilot.php:117
actionadmin_menuseopilot.php:125
Maintenance & Trust

SeoPilot Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 19, 2013
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Alternatives

SeoPilot Alternatives

No alternatives data available yet.

Developer Profile

SeoPilot Developer Profile

radke447

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SeoPilot

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<p><strong>Twoj identyfikator SeoPilot:</strong><br/><input type="text" name="SEOPILOT_USER" value="
FAQ

Frequently Asked Questions about SeoPilot