Vanilla Bean – Meta Maid Security & Risk Analysis

wordpress.org/plugins/vanilla-bean-meta-maid

Meta Maid is the simplest of plugins, allowing you to add meta tags, script tags and tracking code to

20 active installs v2.1.0 PHP + WP 4.0+ Updated Jun 22, 2024
footer-codeheader-codemeta-tagstracking-code
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Vanilla Bean – Meta Maid Safe to Use in 2026?

Generally Safe

Score 92/100

Vanilla Bean – Meta Maid has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The vanilla-bean-meta-maid plugin v2.1.0 demonstrates a strong security posture based on the provided static analysis and vulnerability history. The plugin has zero known CVEs, indicating a history of stability and security. Furthermore, the static analysis reveals no critical or high severity taint flows, a complete absence of dangerous functions, and all SQL queries are properly prepared, which significantly reduces the risk of SQL injection vulnerabilities. The plugin also avoids external HTTP requests and file operations, limiting its potential attack surface in those areas.

However, there are areas for improvement. While the attack surface is zero, which is excellent, the lack of nonce checks across all entry points (though there are no entry points currently) suggests a potential oversight if new entry points are introduced without careful consideration. A significant concern is the output escaping, with only 69% of outputs properly escaped. This leaves nearly a third of outputs vulnerable to cross-site scripting (XSS) attacks, which could be exploited if unsanitized data is displayed to users. The presence of capability checks (3) is positive, indicating some level of access control, but the absence of these checks on potential future entry points remains a risk.

In conclusion, vanilla-bean-meta-maid v2.1.0 is a generally secure plugin with a clean vulnerability history and good practices regarding SQL and dangerous functions. The primary weakness lies in the incomplete output escaping, posing a risk of XSS vulnerabilities. Addressing this by ensuring all output is properly escaped would significantly enhance its security. The current data suggests a strong foundation, but vigilance regarding output sanitization and future entry point development is crucial.

Key Concerns

  • Output escaping is not comprehensive (69% proper)
Vulnerabilities
None known

Vanilla Bean – Meta Maid Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Vanilla Bean – Meta Maid Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
34 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

69% escaped49 total outputs
Attack Surface

Vanilla Bean – Meta Maid Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_headinc\meta-maid.php:23
filterwp_footerinc\meta-maid.php:37
actionadmin_menuvanilla-bean-meta-maid.php:67
actionadmin_initvanilla-bean-meta-maid.php:84
Maintenance & Trust

Vanilla Bean – Meta Maid Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 22, 2024
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Vanilla Bean – Meta Maid Developer Profile

vsmash

5 plugins · 70 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Vanilla Bean – Meta Maid

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
pixelplug
FAQ

Frequently Asked Questions about Vanilla Bean – Meta Maid