wordpress-admin
Warn
Audited by Socket on Mar 18, 2026
1 alert found:
AnomalyAnomalyscripts/wp-seo.py
LOWAnomalyLOW
scripts/wp-seo.py
No evidence of intentionally malicious code (no backdoor, exfiltration, or obfuscation). However, the module uses subprocess.run(..., shell=True) with user-controlled inputs (post_id and command fragments), which creates a command injection / remote code execution vulnerability. Treat this as a moderate-to-high security risk for supply-chain use: safe to use only after fixing the shell invocation (use argument array or strict validation) or restricting who can call the script. Hardcoded site URLs and container names are informational but not secrets.
Confidence: 90%Severity: 60%
Audit Metadata