Mavis HTTPS to HTTP Redirection Security & Risk Analysis

wordpress.org/plugins/mavis-https-to-http-redirect

Provides page redirection back to non-secured pages (https: to http:)

100 active installs v1.4.3 PHP + WP 2.9+ Updated Aug 23, 2020
httphttpshttps-to-httpmavisredirection
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is Mavis HTTPS to HTTP Redirection Safe to Use in 2026?

Use With Caution

Score 63/100

Mavis HTTPS to HTTP Redirection has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 22, 2025Updated 5yr ago
Risk Assessment

The "mavis-https-to-http-redirect" plugin, version 1.4.3, presents a mixed security posture. On the positive side, the static analysis reveals a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are positive indicators. However, the analysis also flags a critical concern: 100% of output is not properly escaped, indicating a significant risk of Cross-Site Scripting (XSS) vulnerabilities if any dynamic content is displayed to users. The taint analysis also shows flows with unsanitized paths, although these did not reach a critical or high severity in this assessment, they warrant further investigation.

The plugin has a history of known vulnerabilities, with one medium severity CVE currently unpatched. This historical pattern, especially with a recent vulnerability dating to late 2025, suggests a recurring issue with security flaws. While the absence of obvious entry points for direct attacks is a strength, the unescaped output and historical vulnerability pattern are significant weaknesses. The overall risk is elevated due to the potential for XSS and the unaddressed past CVE, despite the absence of a large, exposed attack surface.

Key Concerns

  • Unpatched CVE
  • Output not properly escaped
  • Taint flows with unsanitized paths
Vulnerabilities
1

Mavis HTTPS to HTTP Redirection Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58261medium · 4.3Cross-Site Request Forgery (CSRF)

Mavis HTTPS to HTTP Redirection <= 1.4.3 - Cross-Site Request Forgery

Sep 22, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Mavis HTTPS to HTTP Redirection Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
displayMavisManagementPage (mavis.php:71)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Mavis HTTPS to HTTP Redirection Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitmavis.php:265
actionadmin_menumavis.php:266
Maintenance & Trust

Mavis HTTPS to HTTP Redirection Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 23, 2020
PHP min version
Downloads22K

Community Trust

Rating74/100
Number of ratings6
Active installs100
Developer Profile

Mavis HTTPS to HTTP Redirection Developer Profile

PressPage Entertainment Inc

5 plugins · 140 total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mavis HTTPS to HTTP Redirection

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapoptionseditform
Data Attributes
name='mavis_update'name='secured_page_tag'
FAQ

Frequently Asked Questions about Mavis HTTPS to HTTP Redirection