genius 404 Security & Risk Analysis

wordpress.org/plugins/genius-404

Automatically redirect to the content the user was most likely after, or show suggestions, instead of showing an unhelpful 404 error.

10 active installs v1.0 PHP + WP 2.6+ Updated Apr 1, 2015
404genius-404redirectionsearch
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is genius 404 Safe to Use in 2026?

Generally Safe

Score 85/100

genius 404 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "genius-404" v1.0 plugin presents a mixed security posture. On the positive side, it boasts zero known CVEs, a completely clean vulnerability history, and all SQL queries utilize prepared statements, indicating good practices in these critical areas. The static analysis also shows no external HTTP requests, file operations, shortcodes, or cron events, which significantly limits the potential attack surface. However, several concerning code signals are present. The use of the deprecated and inherently insecure `create_function` is a major red flag, as this function is known to be a vector for code injection. Furthermore, all four identified output points are not properly escaped, posing a risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis, while not highlighting critical or high severity flows, did find two flows with unsanitized paths, which, when combined with the lack of output escaping, could potentially be exploited.

Key Concerns

  • Use of dangerous function: create_function
  • Unescaped output found
  • Taint analysis shows unsanitized paths
Vulnerabilities
None known

genius 404 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

genius 404 Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$patterns_array = array_map(create_function('$a', '$sep = (strpos($a, "@") === false ? "@" : "%"); rgenius404.php:56
create_function$postids = array_map(create_function('$a', 'return $a->ID;'), $GLOBALS["__genius404"]["suggestions"]genius404.php:331

Output Escaping

0% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
genius404_redirect (genius404.php:37)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

genius 404 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actiontemplate_redirectgenius404.php:351
filterredirect_canonicalgenius404.php:352
actionadmin_menugenius404.php:353
Maintenance & Trust

genius 404 Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedApr 1, 2015
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings1
Active installs10
Developer Profile

genius 404 Developer Profile

Hussam Hussien

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect genius 404

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/genius-404/css/genius404.css/wp-content/plugins/genius-404/js/genius404.js
Script Paths
/wp-content/plugins/genius-404/js/genius404.js
Version Parameters
genius-404/css/genius404.css?ver=genius-404/js/genius404.js?ver=

HTML / DOM Fingerprints

JS Globals
__genius404
FAQ

Frequently Asked Questions about genius 404