
Redirect anonymous users Security & Risk Analysis
wordpress.org/plugins/redirect-anonymous-usersUsers who are not logged-in are redirected to a specific URL.
Is Redirect anonymous users Safe to Use in 2026?
Generally Safe
Score 85/100Redirect anonymous users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "redirect-anonymous-users" plugin v0.1.0 exhibits a strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, indicating a very small attack surface. Crucially, all SQL queries utilize prepared statements, and there are no dangerous functions, file operations, or external HTTP requests identified. Taint analysis shows no critical or high severity flows with unsanitized paths. This suggests a well-written plugin in terms of preventing common vulnerabilities like SQL injection, file inclusion, and cross-site scripting (XSS).
However, a significant concern arises from the complete absence of nonce checks and capability checks. While the current version has a minimal attack surface, any future expansion or modification that introduces new entry points without proper authorization checks would pose a serious security risk. The plugin also has a 67% proper output escaping rate, meaning a third of its outputs are not properly escaped, which could lead to XSS vulnerabilities if sensitive data is displayed without sanitization. The lack of any recorded vulnerabilities in its history is a positive sign, but it's important to remember this is a very early version (v0.1.0) and may not have been subjected to extensive real-world testing or audits.
In conclusion, the plugin demonstrates good development practices by avoiding dangerous functions and using prepared statements. The limited attack surface and clean taint analysis are positive. The primary weaknesses lie in the complete lack of authentication/authorization checks (nonces and capabilities) and the unescaped output in a portion of its code. As the plugin matures, addressing these areas will be paramount to maintaining its security.
Key Concerns
- Unescaped output detected
- Missing nonce checks
- Missing capability checks
Redirect anonymous users Security Vulnerabilities
Redirect anonymous users Code Analysis
Output Escaping
Redirect anonymous users Attack Surface
WordPress Hooks 3
Maintenance & Trust
Redirect anonymous users Maintenance & Trust
Maintenance Signals
Community Trust
Redirect anonymous users Alternatives
Simple Membership After Login Redirection
simple-membership-after-login-redirection
An addon for the simple membership plugin to configure after login redirection to a specific page based on the member's level.
Redirect After Comment Per Page
redirect-after-comment-per-page
The "Redirect After Comment Per Page" plugin will redirect automatically the commenter to a specific page after they validate a comment on y …
LCK cloud Connector
lck-cloud-connector
Easily restrict access to your existing WordPress pages and posts. Official connector to build secure membership sites with LCK cloud.
Pinnacle Marketing Login Redirect for Ultimate Member
pinnaclemarketing-login-redirect-for-ultimate-member
Redirect logged-in users away from the Ultimate Member login page to an internal destination you control.
Smart Role Login Redirects
smart-role-login-redirects
Role-based login redirects for WordPress.
Redirect anonymous users Developer Profile
2 plugins · 110 total installs
How We Detect Redirect anonymous users
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
wrapid="redirect_anon_url"name="redirect_anon_url"id="redirect_anon_url" name="redirect_anon_url"