Redistats – Multisite stats Security & Risk Analysis

wordpress.org/plugins/redistats

Web stats especially made for WordPress Multisite with a large number of blogs but also works on a single blog. No additional load on your server.

10 active installs v0.3 PHP + WP 3.4.2+ Updated Aug 21, 2013
multisiteredistatsstatisticsstats
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Redistats – Multisite stats Safe to Use in 2026?

Generally Safe

Score 85/100

Redistats – Multisite stats has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The static analysis of redistats v0.3 indicates a plugin with a seemingly minimal attack surface. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed, which significantly reduces the opportunities for external attackers to interact with the plugin. Furthermore, the code signals show no dangerous functions, file operations, or external HTTP requests, and all SQL queries utilize prepared statements. This suggests a conscientious approach to core security practices within the plugin's current development.

However, a significant concern arises from the output escaping. With 9 total outputs and 0% properly escaped, this presents a clear and present risk of Cross-Site Scripting (XSS) vulnerabilities. Any data processed or displayed by the plugin, if not adequately sanitized before output, could be exploited by attackers to inject malicious scripts into web pages viewed by users. The absence of nonce checks and capability checks on potential entry points (though none are explicitly listed) also leaves room for potential authorization bypasses if any vulnerabilities are discovered in other areas. The lack of vulnerability history is positive but doesn't negate the inherent risks identified in the code itself.

In conclusion, while redistats v0.3 has a low attack surface and uses prepared statements for SQL, the complete lack of output escaping is a critical weakness. This makes the plugin highly susceptible to XSS attacks. The absence of any recorded vulnerabilities in its history is encouraging, but the current code analysis reveals a severe oversight that needs immediate attention to ensure user safety.

Key Concerns

  • Unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Redistats – Multisite stats Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Redistats – Multisite stats Release Timeline

v0.3Current
v0.2
v0.1
Code Analysis
Analyzed Apr 16, 2026

Redistats – Multisite stats Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Attack Surface

Redistats – Multisite stats Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
action_network_admin_menuredistats.php:23
action_admin_menuredistats.php:25
action_admin_menuredistats.php:38
actionadmin_menuredistats.php:98
actionwp_footerredistats.php:109
Maintenance & Trust

Redistats – Multisite stats Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedAug 21, 2013
PHP min version
Downloads2K

Community Trust

Rating80/100
Number of ratings3
Active installs10
Developer Profile

Redistats – Multisite stats Developer Profile

Jim Westergren

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Redistats – Multisite stats

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
redistats/icon.png

HTML / DOM Fingerprints

CSS Classes
updated
HTML Comments
Redistats, track version 1.0
JS Globals
global_idproperty_id
FAQ

Frequently Asked Questions about Redistats – Multisite stats