Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
Share on:

How to Fix RankMath AMP Canonical Issue?

Invicti Web Application Security Scanner – the only solution that delivers automatic verification of vulnerabilities with Proof-Based Scanning™.

Fixing Canonical tag appearing twice on an AMP page

RankMath is gaining popularity for WordPress SEO plugins. Looks like direct competition to Yoast.

I thought to give a try, and all went well except the issue which I noticed when Google indexed my new post.

Do you see the message – Your page has AMP implementation errors. ?

I was curious to find what it is and how to fix so went to Google AMP inspect tool and enter the URL manually and got the issue details.

As you can see, the issue is with a canonical tag appearing twice.

Are you in the same situation as I was? No worries, you can fix it as I did.

Before that, I am using AMP for WP plugin. Not sure if this issue is with another plugin too, but this instruction is for AMP for WP with RankMath.

  • Go to AMP >> Settings >> SEO
  • Select SEO plugin like Rank Math SEO
  • Ensure Canonical from Rank Math is selected (green)

  • Save changes

That’s all!

Let’s verify, go to the Google AMP inspection tool and enter the URL to test the URL. And, as you can see – it’s fixed!

I hope it helps you to keep the AMP pages error-free.

Thanks to our Sponsors
More great readings on WordPress
Power Your Business
Some of the tools and services to help your business grow.
  • Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.
    Try Invicti
  • Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data.
    Try Brightdata
  • Semrush is an all-in-one digital marketing solution with more than 50 tools in SEO, social media, and content marketing.
    Try Semrush
  • Intruder is an online vulnerability scanner that finds cyber security weaknesses in your infrastructure, to avoid costly data breaches.
    Try Intruder