Force Domain Redirect Security & Risk Analysis

wordpress.org/plugins/force-domain-redirect

Forces your Wordpress site to load on the domain registered in the WP admin.

200 active installs v0.3 PHP + WP 3.0+ Updated Jan 20, 2022
301domainredirecturiurl
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Force Domain Redirect Safe to Use in 2026?

Generally Safe

Score 85/100

Force Domain Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "force-domain-redirect" plugin v0.3 exhibits a mixed security posture. On the positive side, there are no known CVEs in its history and the code does not appear to use dangerous functions, make external HTTP requests, or perform file operations. All SQL queries are properly prepared, which is a strong security practice. However, there are significant concerns regarding output escaping and taint analysis. The fact that 0% of outputs are properly escaped is a major red flag, potentially leading to cross-site scripting (XSS) vulnerabilities. Furthermore, the taint analysis revealed two flows with unsanitized paths, which, while not classified as critical or high severity, still indicate potential weaknesses in how user-supplied data is handled. The absence of nonce checks and capability checks on any potential entry points (though none were detected) also leaves room for theoretical vulnerabilities if the plugin were to evolve its attack surface without implementing these crucial security measures. In conclusion, while the plugin has a clean vulnerability history and good practices in some areas like SQL, the critical lack of output escaping and the presence of unsanitized paths represent tangible risks that need immediate attention.

Key Concerns

  • Unescaped output detected
  • Flows with unsanitized paths
Vulnerabilities
None known

Force Domain Redirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Force Domain Redirect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
redirect_URL (force-domain-redirect.php:13)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Force Domain Redirect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitforce-domain-redirect.php:28
Maintenance & Trust

Force Domain Redirect Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJan 20, 2022
PHP min version
Downloads7K

Community Trust

Rating80/100
Number of ratings4
Active installs200
Developer Profile

Force Domain Redirect Developer Profile

Nimbus Digital

3 plugins · 340 total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
277 days
View full developer profile
Detection Fingerprints

How We Detect Force Domain Redirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
isn't the right domain:
FAQ

Frequently Asked Questions about Force Domain Redirect