PLU Redux Security & Risk Analysis

wordpress.org/plugins/plu-redux

Displays a "Last Updated" date for all of your plugins installed by way of the WordPress Plugin Directory. On plugins that have not been upd …

10 active installs v2.2.3 PHP 7.4+ WP 6.0+ Updated May 1, 2024
pluginssecuritysite-health
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is PLU Redux Safe to Use in 2026?

Generally Safe

Score 85/100

PLU Redux has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The plu-redux plugin v2.2.3 exhibits a generally good security posture based on the static analysis. It demonstrates strong practices with 100% of SQL queries using prepared statements and all identified output being properly escaped. The absence of known CVEs, a history of vulnerabilities, and a clean taint analysis further contribute to this positive assessment. The plugin also has a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without authentication checks.

However, a significant concern arises from the presence of the `unserialize` function without any apparent upstream validation or sanitization of the data it processes. This function is notoriously dangerous when handling untrusted input, as it can lead to object injection vulnerabilities. Furthermore, the lack of nonce and capability checks on any potential entry points, combined with no recorded history of vulnerabilities, suggests that the plugin might not have been subjected to rigorous security testing or that any potential vulnerabilities have gone unnoticed. While the current static analysis doesn't show any exploitable flows, the `unserialize` function presents a potential risk that requires careful consideration.

Key Concerns

  • Dangerous function used (unserialize)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

PLU Redux Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

PLU Redux Release Timeline

v2.2.3Current
v2.2.2
Code Analysis
Analyzed Apr 16, 2026

PLU Redux Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$response = unserialize( wp_remote_retrieve_body( $request ) ); // unserialize the responseplu-redux.php:88

Output Escaping

100% escaped1 total outputs
Attack Surface

PLU Redux Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterplugin_row_metaplu-redux.php:37
filtersite_status_testsplu-redux.php:140
Maintenance & Trust

PLU Redux Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 1, 2024
PHP min version7.4
Downloads814

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

PLU Redux Developer Profile

Jason Cosper

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PLU Redux

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- BEGIN PLU Redux --><!-- END PLU Redux --><!-- END IF --><!-- IF -->+2 more
FAQ

Frequently Asked Questions about PLU Redux