Redirect Old Slugs Security & Risk Analysis

wordpress.org/plugins/redirect-old-slugs

Allows you to change your post slugs without breaking your permalinks.

50 active installs v0.3 PHP + WP 1.5.2+ Updated Mar 16, 2007
postsredirectslugs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Redirect Old Slugs Safe to Use in 2026?

Generally Safe

Score 85/100

Redirect Old Slugs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 19yr ago
Risk Assessment

The "redirect-old-slugs" plugin v0.3 exhibits a mixed security posture. On the positive side, the static analysis reveals a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no reported dangerous functions, file operations, or external HTTP requests, and the single SQL query uses prepared statements, indicating good practices in these areas. The absence of any known vulnerabilities or CVEs in its history is also a strong positive indicator, suggesting a well-maintained or less complex plugin.

However, significant concerns arise from the output escaping. With 100% of outputs not properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed to users that originates from user input or is not rigorously sanitized before output could be exploited by attackers to inject malicious scripts. The complete absence of nonce checks and capability checks, especially if any entry points were to exist (even if currently none are reported), would represent a critical security gap, allowing unauthenticated or unauthorized actions.

In conclusion, while the plugin's attack surface and known vulnerability history are currently very low, the lack of output escaping presents a serious and immediate risk. Developers should prioritize addressing the unescaped output to prevent potential XSS attacks. The absence of checks like nonces and capabilities, although not directly exploitable with the current static analysis findings, points to a potential for future vulnerabilities if the plugin's functionality expands.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

Redirect Old Slugs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Redirect Old Slugs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Redirect Old Slugs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actiontemplate_redirectredirect-old-slugs.php:95
actionedit_postredirect-old-slugs.php:96
actionedit_form_advancedredirect-old-slugs.php:97
actionedit_page_formredirect-old-slugs.php:98
Maintenance & Trust

Redirect Old Slugs Maintenance & Trust

Maintenance Signals

WordPress version tested2.0.10
Last updatedMar 16, 2007
PHP min version
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

Redirect Old Slugs Developer Profile

Mark Jaquith

29 plugins · 176K total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
3337 days
View full developer profile
Detection Fingerprints

How We Detect Redirect Old Slugs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
txfx-old-slug
Shortcode Output
<input type="hidden" id="txfx-old-slug" name="txfx-old-slug" value="
FAQ

Frequently Asked Questions about Redirect Old Slugs