Proper Redirect Security & Risk Analysis

wordpress.org/plugins/proper-redirect

Redirects you to the proper URL of the website. In case of stumbling upon a working alias.

20 active installs v0.01 PHP + WP 3.0.1+ Updated Jun 24, 2011
aliasaliassesmultiple-domain-namesmultiple-urlsredirect
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Proper Redirect Safe to Use in 2026?

Generally Safe

Score 85/100

Proper Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "proper-redirect" plugin version 0.01 exhibits a seemingly robust security posture based on the provided static analysis. There are no identified dangerous functions, all SQL queries utilize prepared statements, and output escaping is consistently applied. Furthermore, the absence of file operations and external HTTP requests reduces the attack surface significantly. The plugin also reports zero known vulnerabilities, including no critical or high-severity CVEs.

However, the static analysis does reveal two flows with unsanitized paths. While no critical or high severity is assigned to these taint flows, this indicates a potential for unexpected behavior or information disclosure if specific conditions are met. The complete lack of nonce checks and capability checks across all identified entry points (even though there are zero in this version) is a significant concern. This implies that if any entry points were to be added or discovered in future versions, they would be inherently unprotected against common attack vectors like Cross-Site Request Forgery (CSRF) or unauthorized access.

In conclusion, the plugin appears to have been developed with some security best practices in mind, particularly regarding data handling and SQL injection prevention. However, the presence of unsanitized paths and the complete absence of authorization and noncing mechanisms are critical weaknesses that could be exploited if the attack surface were to expand. The lack of historical vulnerabilities is a positive sign, but it does not negate the risks posed by the identified code signals.

Key Concerns

  • Unsanitized paths in taint flows
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Proper Redirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Proper Redirect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
redirect (proper-redirect.php:31)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Proper Redirect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitproper-redirect.php:69
Maintenance & Trust

Proper Redirect Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJun 24, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Proper Redirect Developer Profile

peterarends

2 plugins · 40 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Proper Redirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Proper Redirect