DeviceRedirect24 Security & Risk Analysis

wordpress.org/plugins/deviceredirect24

Create smart links that automatically redirect users to different URLs based on their device (iOS, Android, Desktop). Perfect for app marketing!

0 active installs v2.2.0 PHP 7.4+ WP 5.8+ Updated Mar 10, 2026
androiddevice-detectioniosmobileredirect
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DeviceRedirect24 Safe to Use in 2026?

Generally Safe

Score 100/100

DeviceRedirect24 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The static analysis of deviceredirect24 v2.2.0 indicates a generally strong security posture. The plugin demonstrates good development practices by exclusively using prepared statements for all SQL queries and properly escaping all output, which significantly mitigates risks of SQL injection and cross-site scripting (XSS) vulnerabilities. The absence of file operations and external HTTP requests further reduces the attack surface. Furthermore, the presence of nonce and capability checks, although not exhaustive across all potential entry points (which are zero in this case), shows an intent to secure interactions. The zero recorded CVEs and lack of historical vulnerabilities suggest a mature and well-maintained codebase over time.

While the plugin appears robust, the static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events. This indicates a minimal attack surface, which is a positive sign. However, it also means there are no identified entry points that would necessitate nonce or capability checks. The taint analysis found no flows with unsanitized paths, and no dangerous functions were detected. The lack of vulnerabilities in its history strongly implies a consistent commitment to security by the developers. The plugin's strengths lie in its secure coding practices for data handling and output, coupled with a clean vulnerability record.

Vulnerabilities
None known

DeviceRedirect24 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

DeviceRedirect24 Release Timeline

v2.2.0Current
v1.0
Code Analysis
Analyzed Apr 16, 2026

DeviceRedirect24 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
36 prepared
Unescaped Output
0
237 escaped
Nonce Checks
4
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared36 total queries

Output Escaping

100% escaped237 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
<add-link> (admin/views/add-link.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

DeviceRedirect24 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuadmin/class-dbrd-admin.php:22
actionadmin_enqueue_scriptsadmin/class-dbrd-admin.php:23
actionadmin_initadmin/class-dbrd-admin.php:24
actionadmin_footeradmin/class-dbrd-admin.php:25
actioninitdeviceredirect24.php:82
actiontemplate_redirectdeviceredirect24.php:83
actionadmin_initdeviceredirect24.php:150
Maintenance & Trust

DeviceRedirect24 Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 10, 2026
PHP min version7.4
Downloads217

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

DeviceRedirect24 Developer Profile

deviceredirect24

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DeviceRedirect24

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/deviceredirect24/assets/css/admin.css
Version Parameters
deviceredirect24/assets/css/admin.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about DeviceRedirect24