Mobile Device Redirection Security & Risk Analysis

wordpress.org/plugins/mobile-device-redirection

The Mobile Device Redirection plugin allows your Wordpress site to redirect to another url if a user visits it using a mobile device.

10 active installs v0.1 PHP + WP 2.7+ Updated Jun 24, 2011
ipadiphonemobilemobile-deviceseries-60
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mobile Device Redirection Safe to Use in 2026?

Generally Safe

Score 85/100

Mobile Device Redirection has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "mobile-device-redirection" plugin v0.1 exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, and external HTTP requests are positive indicators. Furthermore, the lack of any recorded vulnerabilities in its history suggests a history of secure development or minimal exposure.

However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, there's a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is outputted directly to the browser without proper sanitization can be exploited. The absence of nonce checks and capability checks, while not directly tied to an identified attack vector in this specific analysis, represents a missed opportunity to bolster security for any potential future entry points.

In conclusion, while the plugin has a clean history and avoids common pitfalls like raw SQL or dangerous functions, the critical oversight in output escaping presents a tangible and exploitable security risk. Addressing the unescaped output is paramount to improving its security. The lack of checks for nonces and capabilities, though not currently exploitable, are areas for improvement to ensure robustness against future threats.

Key Concerns

  • Unescaped output found
Vulnerabilities
None known

Mobile Device Redirection Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mobile Device Redirection Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Mobile Device Redirection Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_loadedmobile-device-redirection.php:37
actionadmin_menumobile-device-redirection.php:102
actionadmin_initmobile-device-redirection.php:103
Maintenance & Trust

Mobile Device Redirection Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJun 24, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Mobile Device Redirection Developer Profile

funkjedi

2 plugins · 9K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mobile Device Redirection

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="mobile_device_redirection_options[mobile_device_redirection_url]"
FAQ

Frequently Asked Questions about Mobile Device Redirection