
PLU Redux Security & Risk Analysis
wordpress.org/plugins/plu-reduxDisplays a "Last Updated" date for all of your plugins installed by way of the WordPress Plugin Directory. On plugins that have not been upd …
Is PLU Redux Safe to Use in 2026?
Generally Safe
Score 85/100PLU Redux has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plu-redux plugin v2.2.3 exhibits a generally good security posture based on the static analysis. It demonstrates strong practices with 100% of SQL queries using prepared statements and all identified output being properly escaped. The absence of known CVEs, a history of vulnerabilities, and a clean taint analysis further contribute to this positive assessment. The plugin also has a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without authentication checks.
However, a significant concern arises from the presence of the `unserialize` function without any apparent upstream validation or sanitization of the data it processes. This function is notoriously dangerous when handling untrusted input, as it can lead to object injection vulnerabilities. Furthermore, the lack of nonce and capability checks on any potential entry points, combined with no recorded history of vulnerabilities, suggests that the plugin might not have been subjected to rigorous security testing or that any potential vulnerabilities have gone unnoticed. While the current static analysis doesn't show any exploitable flows, the `unserialize` function presents a potential risk that requires careful consideration.
Key Concerns
- Dangerous function used (unserialize)
- Missing nonce checks
- Missing capability checks
PLU Redux Security Vulnerabilities
PLU Redux Release Timeline
PLU Redux Code Analysis
Dangerous Functions Found
Output Escaping
PLU Redux Attack Surface
WordPress Hooks 2
Maintenance & Trust
PLU Redux Maintenance & Trust
Maintenance Signals
Community Trust
PLU Redux Alternatives
WPVulnerability
wpvulnerability
Get WordPress vulnerability alerts from the WPVulnerability Database API.
WP Fingerprint
wp-fingerprint
WP Fingerprint adds an additional layer of security to your WordPress website, working to check your plugins for signs of hack or exploit.
SiteLock Security – WP Hardening, Login Security & Malware Scans
sitelock
Free, lightweight WordPress security. Harden your site with login protection & 2FA, see Site Health clearly and run on-demand checks—setup in minutes.
WP Disable Site Health
wp-disable-site-health
License: GPLv2 or later Disables new Site Health screen from WP Dashboard
Plugin Security Scanner
plugin-security-scanner
This plugin alerts you if any of your plugins have security vulnerabilities. It does this by utilising the WPScan Vulnerability Database once a day.
PLU Redux Developer Profile
2 plugins · 30 total installs
How We Detect PLU Redux
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<!-- BEGIN PLU Redux --><!-- END PLU Redux --><!-- END IF --><!-- IF -->+2 more