Postcode Redirect Security & Risk Analysis

wordpress.org/plugins/postcode-redirect

A plugin to check a user\'s postcode and redirect the user to a pre-determined website. Make your website more user-friendly.

10 active installs v5.0.0 PHP 7.4+ WP 6.3+ Updated Jul 17, 2024
localpostcoderedirecturlwebsite
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Postcode Redirect Safe to Use in 2026?

Generally Safe

Score 92/100

Postcode Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "postcode-redirect" plugin v5.0.0 demonstrates some good security practices, particularly in its SQL query handling and output escaping. All SQL queries are prepared, and all identified outputs are properly escaped, which significantly reduces the risk of common web vulnerabilities like SQL injection and XSS. The absence of any known CVEs or vulnerability history is also a positive sign, suggesting a generally stable and well-maintained codebase.

However, there are notable security concerns arising from the static analysis. The plugin exposes two AJAX handlers without any authentication or capability checks. This creates a significant attack surface, as any authenticated user, regardless of their role or permissions, could potentially trigger these handlers. Without proper authorization checks, these unprotected entry points could be exploited to perform unintended actions or expose sensitive information, depending on the functionality they implement.

While the taint analysis shows no critical or high-severity issues, and there are no bundled libraries to worry about, the lack of nonce checks on AJAX handlers is a critical oversight. This, combined with the unprotected AJAX endpoints, presents a clear risk of Cross-Site Request Forgery (CSRF) attacks. In conclusion, while the plugin avoids common pitfalls like raw SQL and unescaped output, the unprotected AJAX endpoints are a substantial security weakness that requires immediate attention.

Key Concerns

  • AJAX handlers without auth checks
  • AJAX handlers without capability checks
  • Missing nonce checks on AJAX
Vulnerabilities
None known

Postcode Redirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Postcode Redirect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface
2 unprotected

Postcode Redirect Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_redirect_ajax_callpostcoderedirect.php:46
noprivwp_ajax_redirect_ajax_callpostcoderedirect.php:47

Shortcodes 1

[postcoderedirect] postcoderedirect.php:48
WordPress Hooks 3
actionwp_enqueue_scriptspostcoderedirect.php:43
actionadmin_initpostcoderedirect.php:44
actionadmin_menupostcoderedirect.php:45
Maintenance & Trust

Postcode Redirect Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJul 17, 2024
PHP min version7.4
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Postcode Redirect Developer Profile

Paul Glover

3 plugins · 100 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Postcode Redirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/postcode-redirect/css/style.css/wp-content/plugins/postcode-redirect/js/postlisten.js
Script Paths
/wp-content/plugins/postcode-redirect/js/postlisten.js
Version Parameters
postcode-redirect/style.css?ver=postcode-redirect/js/postlisten.js?ver=

HTML / DOM Fingerprints

JS Globals
postlisten_vars
Shortcode Output
<!--START Postcode Redirect-->
FAQ

Frequently Asked Questions about Postcode Redirect