
Redirection HTTPS for Apache Security & Risk Analysis
wordpress.org/plugins/redirection-https-for-apacheRedirection HTTPS for Apache is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published …
Is Redirection HTTPS for Apache Safe to Use in 2026?
Generally Safe
Score 85/100Redirection HTTPS for Apache has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "redirection-https-for-apache" v1.0 presents a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with or without authentication significantly limits the potential attack surface. Furthermore, the code demonstrates good practices with 100% of SQL queries utilizing prepared statements and all outputs being properly escaped, indicating a robust approach to preventing common web vulnerabilities like SQL injection and cross-site scripting. The plugin also shows no history of known vulnerabilities, which is a strong indicator of its current stability and security.
However, there are areas that warrant attention. The static analysis revealed 3 "flows with unsanitized paths." While these are not classified as critical or high severity in the taint analysis, unsanitized path flows can still be a vector for directory traversal or other file-related attacks if not handled carefully. The presence of 8 "file operations" also suggests that the plugin interacts with the file system, making the unsanitized path flows a more significant concern. The lack of nonce checks and capability checks, while not directly exploitable due to the limited attack surface, suggests a potential weakness if new entry points were to be introduced in future versions without proper security controls.
In conclusion, "redirection-https-for-apache" v1.0 is currently in a good security state with a minimal attack surface and strong adherence to secure coding practices for SQL and output handling. The primary concern lies with the identified unsanitized path flows within file operations, which, although not rated critically, should be thoroughly reviewed and mitigated to ensure comprehensive security. The lack of vulnerability history is a definite strength, but the plugin's security should be continuously monitored, especially concerning the file operation vulnerabilities and the absence of robust authentication checks on potential future entry points.
Key Concerns
- Flows with unsanitized paths
- File operations present
- No nonce checks
- No capability checks
Redirection HTTPS for Apache Security Vulnerabilities
Redirection HTTPS for Apache Release Timeline
Redirection HTTPS for Apache Code Analysis
Data Flow Analysis
Redirection HTTPS for Apache Attack Surface
WordPress Hooks 2
Maintenance & Trust
Redirection HTTPS for Apache Maintenance & Trust
Maintenance Signals
Community Trust
Redirection HTTPS for Apache Alternatives
No alternatives data available yet.
Redirection HTTPS for Apache Developer Profile
2 plugins · 40 total installs
How We Detect Redirection HTTPS for Apache
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
BEGIN Redirection HTTPS for Apache (Infranetworking) The directives (lines) between `BEGIN Redirect to HTTPS` and `END Redirect to HTTPS` are dynamically generated, and should only be modified via WordPress filters. Any changes to the directives between these markers will be overwritten.+1 more