CC-Redirects Security & Risk Analysis

wordpress.org/plugins/cc-redirects

This plugin allows you to create simple redirect requests to another page on your site or elsewhere on the web.

10 active installs v1.1.1 PHP 7.4+ WP 4.9.4+ Updated Unknown
301redirectredirectsseourl
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CC-Redirects Safe to Use in 2026?

Generally Safe

Score 100/100

CC-Redirects has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'cc-redirects' plugin version 1.1.1 exhibits a strong security posture based on the provided static analysis. The complete absence of identified entry points such as AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code signals indicate good security practices, with all SQL queries utilizing prepared statements and the presence of nonce and capability checks. The lack of dangerous functions, file operations, and external HTTP requests further bolsters its security. Taint analysis also shows no critical or high severity flows, suggesting no obvious vulnerabilities related to data sanitization or unsanitized paths.

However, the most significant area of concern lies in the output escaping. With 67 total outputs, only 4% are properly escaped. This represents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, where user-supplied data, if not properly handled before being displayed on the frontend, could be injected and executed by a user's browser. While the plugin has no recorded vulnerability history, this does not negate the inherent risk posed by the low percentage of properly escaped output. The plugin's strengths in limiting attack surface and employing authentication checks are commendable, but the output escaping deficiency demands attention and remediation.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

CC-Redirects Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CC-Redirects Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
64
3 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

4% escaped67 total outputs
Attack Surface

CC-Redirects Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterset-screen-optionincludes\Settings.php:53
Maintenance & Trust

CC-Redirects Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedUnknown
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CC-Redirects Developer Profile

Clearcode

16 plugins · 220 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CC-Redirects

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cc-redirects/admin/css/style.css/wp-content/plugins/cc-redirects/admin/js/redirects.js
Version Parameters
cc-redirects/admin/css/style.css?ver=cc-redirects/admin/js/redirects.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about CC-Redirects