Redirect via Geo IP WooCommerce Security & Risk Analysis

wordpress.org/plugins/redirect-geo-ip

Redirect via Geo IP plugin automatically determines visitors locations and redirects them to the correct store.

20 active installs v1.0.7 PHP 7.0+ WP 6.0+ Updated Feb 27, 2025
woocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Redirect via Geo IP WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Redirect via Geo IP WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'redirect-geo-ip' plugin v1.0.7 exhibits a mixed security posture. On the positive side, there are no known CVEs, a clean vulnerability history, and all observed SQL queries utilize prepared statements, indicating good practices in these areas. The attack surface is reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which is a strong indicator of reduced potential entry points for attackers.

However, there are significant concerns highlighted by the static analysis. The most critical finding is that 100% of the observed output is not properly escaped. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious code could be injected and executed in the user's browser, potentially leading to session hijacking or other attacks. Additionally, the absence of nonce and capability checks on any potential entry points, while currently reporting zero entry points, means that if any new entry points are introduced in future updates or if the initial analysis missed something, they would be unprotected by default.

Given the clean vulnerability history and lack of known CVEs, the plugin might appear safe, but the critical lack of output escaping is a severe and unmitigated risk that overshadows these positive aspects. Developers must prioritize implementing proper output escaping to protect users from XSS attacks. The current lack of critical taint flows is encouraging but does not negate the immediate threat posed by unescaped output.

Key Concerns

  • 0% of outputs properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Redirect via Geo IP WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Redirect via Geo IP WooCommerce Release Timeline

v1.0.7Current
v1.0.6
v1.0.5
v1.0.4
v1.0.3
v1.0.2
v1.0.1
Code Analysis
Analyzed Apr 16, 2026

Redirect via Geo IP WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

0% escaped5 total outputs
Attack Surface

Redirect via Geo IP WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuredirect-geo-ip.php:128
actionadmin_initredirect-geo-ip.php:138
actionwoocommerce_initredirect-geo-ip.php:185
Maintenance & Trust

Redirect via Geo IP WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 27, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Redirect via Geo IP WooCommerce Developer Profile

SunCart

17 plugins · 450 total installs

90
trust score
Avg Security Score
94/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Redirect via Geo IP WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapform-table
HTML Comments
Creates settings in the options table
Data Attributes
name="rgisunarc_settings_sunarc[geo_enable]"name="rgisunarc_settings_sunarc[visitor_country][]"name="rgisunarc_settings_sunarc[redirect]"
FAQ

Frequently Asked Questions about Redirect via Geo IP WooCommerce