WP Mobile Redirect Security & Risk Analysis

wordpress.org/plugins/mobile-redirect-plus-lite

Detect mobile device and redirect to mobile optimize website. You can also choose whether or not to redirect tablets by enabling or disabling the chec …

500 active installs v2.6 PHP + WP 3.0.1+ Updated Oct 29, 2024
android-redirectiphone-redirectmobile-redirectredirecttablet-redirect
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Mobile Redirect Safe to Use in 2026?

Generally Safe

Score 92/100

WP Mobile Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "mobile-redirect-plus-lite" v2.6 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its potential attack surface. Furthermore, the code signals show no dangerous functions, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests. The lack of recorded vulnerabilities in its history reinforces this positive outlook.

However, a notable concern arises from the low percentage of properly escaped output (18%). This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data might be rendered directly in the browser without adequate sanitization. While no taint analysis flows indicate immediate critical or high severity issues, the insufficient output escaping presents a tangible risk that could be exploited if an attacker can inject malicious scripts through other means not immediately apparent in this analysis. The complete absence of nonce checks and capability checks, while not directly linked to an exploitable condition in this snapshot, represents a missed opportunity for robust access control on potential future entry points.

In conclusion, the plugin is largely well-secured with a minimal attack surface and good database practices. The primary weakness lies in the inadequate output escaping, which poses a moderate XSS risk. While there are no historical vulnerabilities, the observed code quality issue warrants attention to prevent future security incidents.

Key Concerns

  • Low output escaping rate
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Mobile Redirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Mobile Redirect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

18% escaped11 total outputs
Attack Surface

WP Mobile Redirect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuincludes\settings.php:2
actionadmin_initincludes\settings.php:24
actioninitmobi.php:66
actionadmin_enqueue_scriptsmobi.php:77
Maintenance & Trust

WP Mobile Redirect Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 29, 2024
PHP min version
Downloads21K

Community Trust

Rating100/100
Number of ratings2
Active installs500
Developer Profile

WP Mobile Redirect Developer Profile

iqbalbary

1 plugin · 500 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Mobile Redirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mobile-redirect-plus-lite/includes/mobile-plus-redirect-lite.css/wp-content/plugins/mobile-redirect-plus-lite/includes/mobile-plus-redirect-lite.js
Version Parameters
mobile-redirect-plus-lite/includes/mobile-plus-redirect-lite.css?ver=mobile-redirect-plus-lite/includes/mobile-plus-redirect-lite.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Mobile Redirect