Xenial – Subdomain SEO Security & Risk Analysis

wordpress.org/plugins/subdomain-seo

Create sub-domains from current website content.

0 active installs v1.0.0 PHP 7.3.0+ WP 4.0.0+ Updated Jan 13, 2019
google-seoseosubdomain-creation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Xenial – Subdomain SEO Safe to Use in 2026?

Generally Safe

Score 85/100

Xenial – Subdomain SEO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "subdomain-seo" v1.0.0 plugin presents a generally positive security posture, demonstrating good practices in several areas. The complete absence of known CVEs, critical or high severity taint flows, and a zero-day vulnerability history are strong indicators of a well-maintained and secure codebase. Furthermore, the plugin avoids exposing a large attack surface through unprotected AJAX handlers, REST API routes, or shortcodes. File operations and external HTTP requests are minimal, and the presence of nonce and capability checks suggest an awareness of common WordPress security vectors.

However, there are areas that warrant attention. The SQL query implementation is concerning, with only 25% utilizing prepared statements, leaving a significant portion susceptible to SQL injection vulnerabilities. This, combined with a taint flow identified with unsanitized paths, introduces a potential risk, even if not classified as critical or high severity in this analysis. While output escaping is at a reasonable 69%, the remaining 31% could still lead to cross-site scripting (XSS) vulnerabilities if sensitive data is involved. The limited number of identified flows and signals might also mean that deeper, more complex vulnerabilities could be present but were not detected by the static analysis.

In conclusion, "subdomain-seo" v1.0.0 has a strong foundation with no documented vulnerabilities and a limited attack surface. The key weaknesses lie in its handling of SQL queries and potential for unescaped output. Addressing these specific areas, particularly by migrating all SQL queries to prepared statements and ensuring comprehensive output escaping, would significantly bolster the plugin's security and mitigate the identified risks.

Key Concerns

  • SQL queries not using prepared statements
  • Taint flow with unsanitized paths
  • Output escaping not fully implemented
Vulnerabilities
None known

Xenial – Subdomain SEO Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Xenial – Subdomain SEO Release Timeline

vxenial-subdomain-seo
Code Analysis
Analyzed Mar 17, 2026

Xenial – Subdomain SEO Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
2 prepared
Unescaped Output
13
29 escaped
Nonce Checks
3
Capability Checks
4
File Operations
5
External Requests
1
Bundled Libraries
0

SQL Query Safety

25% prepared8 total queries

Output Escaping

69% escaped42 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
sds_findSubdomainOnServer (sds-functions.php:561)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Xenial – Subdomain SEO Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_headincludes\sds-cssIncludes.php:23
actionwp_enqueue_scriptsincludes\sds-javaScriptIncludes.php:18
actionadmin_enqueue_scriptsincludes\sds-javaScriptIncludes.php:37
actionadmin_menuincludes\sds-menuIncludes.php:57
actionall_admin_noticesincludes\sds-menuIncludes.php:89
actioninitsds-functions.php:627
actioninitsds-functions.php:659
actioninitsds-functions.php:697
Maintenance & Trust

Xenial – Subdomain SEO Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 13, 2019
PHP min version7.3.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Xenial – Subdomain SEO Developer Profile

Joshua Trimm

3 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Xenial – Subdomain SEO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/subdomain-seo/includes/class-sds-xmlapi.php/wp-content/plugins/subdomain-seo/includes/class-sds-content.php/wp-content/plugins/subdomain-seo/includes/sds-login.php/wp-content/plugins/subdomain-seo/includes/sds-update.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Xenial – Subdomain SEO