Post Date Change Redirection Security & Risk Analysis

wordpress.org/plugins/post-date-change-redirection

Handles the changes in the permalink due to change in post date by providing 301 redirection

50 active installs v2.0 PHP + WP 1.5.1+ Updated Feb 10, 2026
301post-dateredirection
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Date Change Redirection Safe to Use in 2026?

Generally Safe

Score 100/100

Post Date Change Redirection has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "post-date-change-redirection" v2.0 plugin exhibits a seemingly strong security posture based on the provided static analysis. The absence of identified dangerous functions, file operations, external HTTP requests, and the complete reliance on prepared statements for SQL queries are all positive indicators. Furthermore, the perfect record of output escaping and the lack of any recorded vulnerabilities in its history suggest a well-maintained and secure plugin.

However, a significant concern arises from the taint analysis, which reveals 3 flows with unsanitized paths. While no critical or high severity issues were flagged in these flows, the presence of unsanitized paths, even if deemed of lower severity in this specific analysis, indicates a potential weakness in how user-supplied data is handled and could lead to unexpected behavior or vulnerabilities if exploited in conjunction with other factors. The complete lack of nonces, capability checks, and AJAX/REST API entry points also contribute to a reduced attack surface, which is good, but the identified taint flows warrant careful review to ensure no latent risks exist.

Overall, the plugin has a good foundation with its secure coding practices for database interactions and output. The vulnerability history is excellent. The primary area for improvement and potential concern lies in the 3 identified taint flows with unsanitized paths, which require further investigation to confirm their benign nature and to ensure no subtle security risks are present.

Key Concerns

  • Taint flows with unsanitized paths found
Vulnerabilities
None known

Post Date Change Redirection Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Date Change Redirection Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
gs_pdcr_check_redirection (index.php:20)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post Date Change Redirection Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwpindex.php:54
Maintenance & Trust

Post Date Change Redirection Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 10, 2026
PHP min version
Downloads45K

Community Trust

Rating100/100
Number of ratings5
Active installs50
Developer Profile

Post Date Change Redirection Developer Profile

Gagan Deep Singh

8 plugins · 65K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Date Change Redirection

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post Date Change Redirection