Gone Control Security & Risk Analysis

wordpress.org/plugins/gone-control

A WordPress plugin that ensures HTTP 410 (Gone) status code are returned for deleted posts, pages, and CPT, improving SEO and user experience.

0 active installs v0.5 PHP 7.4+ WP 5.6+ Updated Apr 3, 2026
contact-form-7contact-form-telegramtelegram
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gone Control Safe to Use in 2026?

Generally Safe

Score 100/100

Gone Control has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "gone-control" plugin v0.5 exhibits a generally strong security posture based on the provided static analysis. The absence of any known CVEs and the plugin's current unpatched status is a positive indicator, suggesting a history of secure development. Furthermore, the plugin demonstrates good practices in areas like SQL query preparation (100% prepared statements), output escaping (99% proper), and the implementation of capability checks (15) and nonce checks (4), all of which are crucial for mitigating common web vulnerabilities.

However, the static analysis does reveal potential areas for concern. Specifically, the taint analysis highlights two flows with "unsanitized paths" which have been classified as high severity. While the attack surface appears minimal with zero unprotected entry points, these unsanitized path flows could represent a latent risk. The presence of two file operations also warrants careful consideration in conjunction with the unsanitized path findings. The vulnerability history is clean, but this does not entirely negate the risks identified in the code analysis.

In conclusion, "gone-control" v0.5 has a strong foundation in secure coding practices, particularly regarding data handling and authentication. The key weakness identified lies in the high-severity taint flows related to unsanitized paths. Addressing these specific issues would significantly bolster the plugin's overall security and eliminate potential vulnerabilities that are not reflected in its historical CVE record.

Key Concerns

  • High severity unsanitized path taint flows
  • Two file operations
Vulnerabilities
None known

Gone Control Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Gone Control Release Timeline

v0.5Current
Code Analysis
Analyzed Apr 16, 2026

Gone Control Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
1
78 escaped
Nonce Checks
4
Capability Checks
15
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

99% escaped79 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
handleSaveSettings (src/Settings.php:339)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Gone Control Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actiongonecontrol_activatesrc/Controller/Activation.php:18
actionwp_trash_postsrc/Controller/MainController.php:21
actionbefore_delete_postsrc/Controller/MainController.php:22
actionpre_delete_termsrc/Controller/MainController.php:23
actiondelete_usersrc/Controller/MainController.php:24
actiontemplate_redirectsrc/Controller/MainController.php:25
actionadmin_menusrc/Settings.php:18
actionadmin_post_gonecontrol_add_entrysrc/Settings.php:19
actionadmin_post_gonecontrol_delete_entriessrc/Settings.php:20
actionadmin_post_gonecontrol_save_settingssrc/Settings.php:21
actionadmin_post_gonecontrol_import_entriessrc/Settings.php:22
actionadmin_enqueue_scriptssrc/Settings.php:23
Maintenance & Trust

Gone Control Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 3, 2026
PHP min version7.4
Downloads61

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Gone Control Developer Profile

iTRON

9 plugins · 11K total installs

94
trust score
Avg Security Score
91/100
Avg Patch Time
4 days
View full developer profile
Detection Fingerprints

How We Detect Gone Control

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gone-control/assets/admin-entries.js/wp-content/plugins/gone-control/assets/admin-entries.css
Script Paths
/wp-content/plugins/gone-control/assets/admin-entries.js
Version Parameters
gone-control/assets/admin-entries.css?ver=gone-control/assets/admin-entries.js?ver=

HTML / DOM Fingerprints

CSS Classes
gone-control-wrap
Data Attributes
data-gonecontrol-entries-per-page
JS Globals
gonecontrolAdminEntries
FAQ

Frequently Asked Questions about Gone Control