Redirect Gravatar requests Security & Risk Analysis

wordpress.org/plugins/redirect-gravatar-requests

All requests to load an avatar from gravatar.com are redirected to a local image, preventing Gravatar from potentially gathering data about your site …

200 active installs v2.0.0 PHP 5.6.20+ WP 4.6+ Updated May 24, 2022
avatarblockdisablegravatarredirect
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Redirect Gravatar requests Safe to Use in 2026?

Generally Safe

Score 85/100

Redirect Gravatar requests has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "redirect-gravatar-requests" v2.0.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, cron events, dangerous functions, direct SQL queries, unescaped output, file operations, external HTTP requests, nonce checks, or capability checks on its entry points indicates a well-designed plugin that minimizes its attack surface. The complete lack of taint flows with unsanitized paths further reinforces this positive assessment.

Furthermore, the plugin's vulnerability history is exceptionally clean, with no recorded CVEs of any severity. This suggests a history of secure development and maintenance. The absence of common vulnerability types further indicates that the developers are likely adhering to secure coding practices. The plugin's strengths lie in its minimal attack surface and its lack of known vulnerabilities, suggesting it is likely safe for use.

However, it is important to acknowledge that the static analysis reported zero total entry points and zero unprotected entry points. While this is excellent, it could also imply that the plugin's functionality is extremely limited or that its core purpose is achieved through methods not captured by this specific static analysis, such as by directly modifying core WordPress behavior through filters and actions without explicit entry points. In a perfect world, we would see some evidence of capability checks or nonce usage even for internal operations, but their absence here, coupled with no known vulnerabilities, is still a very positive sign.

Vulnerabilities
None known

Redirect Gravatar requests Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Redirect Gravatar requests Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Redirect Gravatar requests Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitredirect-gravatar-requests.php:97
filterget_avatarredirect-gravatar-requests.php:100
filteravatar_defaultsredirect-gravatar-requests.php:102
filterplugin_row_metaredirect-gravatar-requests.php:104
Maintenance & Trust

Redirect Gravatar requests Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedMay 24, 2022
PHP min version5.6.20
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

Redirect Gravatar requests Developer Profile

Bart Kuijper

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Redirect Gravatar requests

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Redirect Gravatar requests