Redirect anonymous users Security & Risk Analysis

wordpress.org/plugins/redirect-anonymous-users

Users who are not logged-in are redirected to a specific URL.

10 active installs v0.1.0 PHP + WP 3.0+ Updated Jul 27, 2016
launchmembershipredirect
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Redirect anonymous users Safe to Use in 2026?

Generally Safe

Score 85/100

Redirect anonymous users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "redirect-anonymous-users" plugin v0.1.0 exhibits a strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, indicating a very small attack surface. Crucially, all SQL queries utilize prepared statements, and there are no dangerous functions, file operations, or external HTTP requests identified. Taint analysis shows no critical or high severity flows with unsanitized paths. This suggests a well-written plugin in terms of preventing common vulnerabilities like SQL injection, file inclusion, and cross-site scripting (XSS).

However, a significant concern arises from the complete absence of nonce checks and capability checks. While the current version has a minimal attack surface, any future expansion or modification that introduces new entry points without proper authorization checks would pose a serious security risk. The plugin also has a 67% proper output escaping rate, meaning a third of its outputs are not properly escaped, which could lead to XSS vulnerabilities if sensitive data is displayed without sanitization. The lack of any recorded vulnerabilities in its history is a positive sign, but it's important to remember this is a very early version (v0.1.0) and may not have been subjected to extensive real-world testing or audits.

In conclusion, the plugin demonstrates good development practices by avoiding dangerous functions and using prepared statements. The limited attack surface and clean taint analysis are positive. The primary weaknesses lie in the complete lack of authentication/authorization checks (nonces and capabilities) and the unescaped output in a portion of its code. As the plugin matures, addressing these areas will be paramount to maintaining its security.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Redirect anonymous users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Redirect anonymous users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface

Redirect anonymous users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actiontemplate_redirectredirect_anon.php:20
actionadmin_menuredirect_anon.php:26
actionadmin_initredirect_anon.php:29
Maintenance & Trust

Redirect anonymous users Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 27, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Redirect anonymous users Developer Profile

Manuel Razzari

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Redirect anonymous users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
id="redirect_anon_url"name="redirect_anon_url"id="redirect_anon_url" name="redirect_anon_url"
FAQ

Frequently Asked Questions about Redirect anonymous users