Hetjens Feed Redirect Security & Risk Analysis

wordpress.org/plugins/hetjens-feed-redirect

This plug-in redirect reqests to the main or comment feed of the blog to Feedburner or a similar service.

10 active installs v0.4 PHP + WP 2.7.0+ Updated Feb 25, 2016
feedfeedburnerlocationredirectrss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hetjens Feed Redirect Safe to Use in 2026?

Generally Safe

Score 85/100

Hetjens Feed Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The hetjens-feed-redirect plugin v0.4 presents a mixed security posture. On one hand, it demonstrates strong practices by avoiding common entry points like AJAX handlers, REST API routes, and shortcodes, and crucially, all SQL queries utilize prepared statements. There are no recorded vulnerabilities or CVEs, and the taint analysis shows no concerning flows, indicating a lack of readily exploitable paths for typical web attacks.

However, significant concerns arise from the static code analysis. The presence of the `create_function` is a major red flag, as it can lead to arbitrary code execution if not handled with extreme caution and proper sanitization, which appears to be absent based on the output escaping results. Furthermore, a concerning 0% of output is properly escaped, meaning any dynamic data rendered on the page could be vulnerable to Cross-Site Scripting (XSS) attacks. The absence of nonce and capability checks, while mitigated by the lack of direct entry points, still represents a gap in fundamental security practices.

In conclusion, while the plugin's limited attack surface and secure database interactions are positive, the use of `create_function` and the widespread lack of output escaping create substantial risks for XSS and potential code execution vulnerabilities. The vulnerability history is reassuring, but it doesn't negate the immediate threats identified in the code itself.

Key Concerns

  • Use of dangerous function: create_function
  • 0% of output properly escaped
  • 0% of output properly escaped
  • No nonce checks present
  • No capability checks present
Vulnerabilities
None known

Hetjens Feed Redirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Hetjens Feed Redirect Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('plugins_loaded', create_function('','$Hetjens_Feed_Redirect = new Hetjens_Feed_Redirect(Hetjens_Feed_Redirect.php:98

Output Escaping

0% escaped2 total outputs
Attack Surface

Hetjens Feed Redirect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actiontemplate_redirectHetjens_Feed_Redirect.php:36
actionadmin_initHetjens_Feed_Redirect.php:37
actionplugins_loadedHetjens_Feed_Redirect.php:98
Maintenance & Trust

Hetjens Feed Redirect Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedFeb 25, 2016
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Hetjens Feed Redirect Developer Profile

S Hetjens

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hetjens Feed Redirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
regular-text
Data Attributes
id="hetjens_feed_redirect_feed_url"name="hetjens_feed_redirect_feed_url"id="hetjens_feed_redirect_comments_url"name="hetjens_feed_redirect_comments_url"
FAQ

Frequently Asked Questions about Hetjens Feed Redirect