ezRedirect Security & Risk Analysis

wordpress.org/plugins/ezredirect

Allows the creation of redirections to internal pages and posts, and external addresses.

10 active installs v1.1.0 PHP + WP 4.0+ Updated Unknown
adminadministrationlinksredirectionresources
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ezRedirect Safe to Use in 2026?

Generally Safe

Score 100/100

ezRedirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "ezredirect" v1.1.0 plugin presents a mixed security picture. On the positive side, it demonstrates good practices regarding SQL queries, utilizing prepared statements exclusively. The absence of known CVEs and a clean vulnerability history suggest a relatively stable and well-maintained codebase in the past. The plugin also shows an effort towards security with a single nonce check, indicating awareness of common WordPress attack vectors.

However, significant concerns arise from the static analysis. The "taint analysis" reveals one flow with an unsanitized path, specifically flagged as high severity. This is a critical finding as it points to a potential pathway for malicious input to be processed without proper sanitization, which could lead to various vulnerabilities depending on how this unsanitized data is used. Furthermore, the "output escaping" is only 59% proper, meaning a substantial portion of output may be vulnerable to cross-site scripting (XSS) attacks, especially if user-provided data is involved in these unescaped outputs.

While the plugin boasts a small attack surface with no apparent unprotected entry points, the identified high-severity taint flow and the low rate of proper output escaping are substantial weaknesses. The lack of capability checks on the limited entry points is also a concern, though the absence of entry points without authentication mitigates this risk to some degree. The conclusion is that while the plugin has a clean past and uses prepared statements, the current version has high-severity risks related to unsanitized input and XSS vulnerabilities due to insufficient output escaping that require immediate attention.

Key Concerns

  • High severity taint flow with unsanitized path
  • Low proper output escaping rate (59%)
  • No capability checks on entry points
Vulnerabilities
None known

ezRedirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ezRedirect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
7 prepared
Unescaped Output
23
33 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared7 total queries

Output Escaping

59% escaped56 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<ezredirect> (ezredirect.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ezRedirect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitezredirect.php:87
actiontemplate_redirectezredirect.php:93
actionadmin_menuezredirect.php:234
Maintenance & Trust

ezRedirect Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

ezRedirect Developer Profile

nuagelab

3 plugins · 10K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
602 days
View full developer profile
Detection Fingerprints

How We Detect ezRedirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ezredirect/js/ezredirect.js/wp-content/plugins/ezredirect/css/ezredirect.css
Script Paths
/wp-content/plugins/ezredirect/js/ezredirect.js
Version Parameters
ezredirect/js/ezredirect.js?ver=ezredirect/css/ezredirect.css?ver=

HTML / DOM Fingerprints

CSS Classes
ezredirect-admin-notice
HTML Comments
<!-- ezRedirect Admin Notice -->
Data Attributes
data-ezredirect-nonce
JS Globals
ezredirect
FAQ

Frequently Asked Questions about ezRedirect