Detect Search Engine Referrer Security & Risk Analysis

wordpress.org/plugins/detect-search-engine-referrer

This plugin disable w3 total cache plugin functionality if visitor is coming from search engine.

10 active installs v0.1 PHP + WP 2.0.2+ Updated Jul 12, 2011
search-enginew3-total-cache
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Detect Search Engine Referrer Safe to Use in 2026?

Generally Safe

Score 85/100

Detect Search Engine Referrer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "detect-search-engine-referrer" plugin, in version 0.1, presents a very strong initial security posture based on the static analysis provided. The absence of any identified dangerous functions, the exclusive use of prepared statements for SQL queries (though none were found), and the complete output escaping are all indicative of robust development practices. Furthermore, the plugin demonstrates no file operations, external HTTP requests, or the use of bundled libraries, which eliminates common avenues for exploitation. The taint analysis also shows zero flows with unsanitized paths, reinforcing the impression of secure coding.

However, the static analysis reveals a complete lack of security checks on any potential entry points, as there are zero AJAX handlers, REST API routes, shortcodes, or cron events. While the absence of these components means there are no *currently* unprotected entry points, it also means there are no inherent security mechanisms in place for future expansion. The vulnerability history is clean, with no known CVEs, which is a positive sign. Nevertheless, the lack of any recorded vulnerabilities does not guarantee future safety, especially given the minimal feature set and lack of robust security primitives observed.

In conclusion, version 0.1 of this plugin appears to be very secure due to its simplicity and the developer's apparent adherence to secure coding principles for the features it does implement. The main concern is the complete absence of any security checks or defined entry points, which, while not a direct vulnerability in its current state, could become a concern if the plugin's functionality expands without the introduction of proper authentication and authorization.

Key Concerns

  • No nonce checks on any entry points
  • No capability checks on any entry points
Vulnerabilities
None known

Detect Search Engine Referrer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Detect Search Engine Referrer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Detect Search Engine Referrer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitwp-search-engine-referrer.php:25
Maintenance & Trust

Detect Search Engine Referrer Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJul 12, 2011
PHP min version
Downloads3K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Detect Search Engine Referrer Developer Profile

moazam

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Detect Search Engine Referrer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
WP_SE_REFERRER
FAQ

Frequently Asked Questions about Detect Search Engine Referrer