
Xenial Security & Risk Analysis
wordpress.org/plugins/xenialCustom Schema.org Structured Data for SEO Search Engine Optimization
Is Xenial Safe to Use in 2026?
Generally Safe
Score 85/100Xenial has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "xenial" v1.1.10 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any known CVEs and a clean vulnerability history suggest a well-maintained and secure codebase. The static analysis shows no direct attack surface in terms of unprotected AJAX handlers, REST API routes, shortcodes, or cron events, which is a significant positive. Furthermore, the code demonstrates good practices like a high percentage of SQL queries using prepared statements and a decent proportion of properly escaped output. File operations and external HTTP requests are also limited.
However, there are areas for improvement. The presence of one flow with unsanitized paths in the taint analysis, even if not critically severe, represents a potential risk. While the plugin has some capability checks, the complete absence of nonce checks across its entry points is a notable concern, especially if any of the "file operations" involve user-controlled input or could lead to unintended actions. The low number of capability checks (4) and the lack of authentication checks on the identified entry points (though there are 0 entry points, this is a contradiction that needs clarification but points to potential gaps if any were present) are also weaknesses that could be exploited if new entry points were introduced or misconfigurations occurred.
In conclusion, "xenial" v1.1.10 appears to be a relatively secure plugin with a commendable history and a well-controlled attack surface. The primary concerns stem from a single taint flow with an unsanitized path and the complete absence of nonce checks. Addressing these specific points would further strengthen its security. The plugin's strengths lie in its lack of historical vulnerabilities and its efforts towards secure SQL querying and output escaping.
Key Concerns
- Flow with unsanitized path
- 0 Nonce checks present
- Low number of capability checks
- 14% of SQL queries not prepared
- 28% of outputs not properly escaped
Xenial Security Vulnerabilities
Xenial Release Timeline
Xenial Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Xenial Attack Surface
WordPress Hooks 10
Maintenance & Trust
Xenial Maintenance & Trust
Maintenance Signals
Community Trust
Xenial Alternatives
Disable Yoast's Structured Data
disable-yoast-ld-json
Prevent conflict with other structured data plugins
Business Schema JSON-LD
business-schema-json-ld
Generate Structured Data in JSON-LD format for Product based businesses. Supports popular schema.org types that would be commonly used by a typical bu …
ElPlan Kuchikomi Wall
elplan-kuchikomi-wall
Display Google Business Profile reviews on your site. Pro: your business appears with ★ star ratings in Google Search results — boosting local SEO and …
Microdata to JSON-LD Converter
microdata-to-json-ld-converter
A powerful tool to convert your existing Schema.org Microdata into the preferred JSON-LD format, clean up your HTML, and maintain structured data.
Schema & Structured Data for WP & AMP
schema-and-structured-data-for-wp
Schema & Structured Data adds Google Rich Snippets markup according to Schema.org guidelines to structure your site for SEO.
Xenial Developer Profile
3 plugins · 0 total installs
How We Detect Xenial
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/xenial-WP/js/checkAllPages.js/wp-content/plugins/xenial-WP/js/openTabs.js/wp-content/plugins/xenial-WP/js/checkAllPaymentTypes.js/wp-content/plugins/xenial-WP/js/checkAllPages.js/wp-content/plugins/xenial-WP/js/openTabs.js/wp-content/plugins/xenial-WP/js/checkAllPaymentTypes.jsHTML / DOM Fingerprints
<!-- Header Comment -->