
Restrict WP Pages With Redirect Security & Risk Analysis
wordpress.org/plugins/restrict-wp-pages-with-redirectA Plugin To Enable Pages To have ability to show/hide to Login and No Login Users
Is Restrict WP Pages With Redirect Safe to Use in 2026?
Generally Safe
Score 85/100Restrict WP Pages With Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of the "restrict-wp-pages-with-redirect" v1.0.0 plugin reveals a generally positive security posture with no identified vulnerabilities or critical code signals. The plugin exhibits good practices by having zero AJAX handlers, REST API routes, shortcodes, or cron events, significantly limiting its attack surface. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is commendable. All SQL queries are properly prepared, and the plugin does not bundle any libraries, reducing potential exposure from outdated components. Taint analysis also shows no critical or high severity flows, indicating a lack of exploitable data handling issues.
However, there are some areas for improvement. The plugin has no capability checks or nonce checks implemented, which are fundamental security mechanisms in WordPress. While the current attack surface is zero, this absence of checks means that if any entry points were to be introduced in future versions, they would be inherently unprotected. The 67% output escaping rate, while not critical, means that two out of the three outputs are not properly escaped, presenting a potential Cross-Site Scripting (XSS) risk if user-controlled data is involved in those outputs.
The vulnerability history for this plugin is clean, with no known CVEs. This, coupled with the current static analysis findings, suggests a plugin that has historically been secure and is developed with care. The lack of past vulnerabilities is a strong indicator of good development practices. Despite the clean history and strong static analysis results in most areas, the missing capability and nonce checks, along with imperfect output escaping, represent real, albeit minor, security concerns that should be addressed to ensure the plugin's long-term resilience.
Key Concerns
- Missing capability checks
- Missing nonce checks
- Unescaped output detected (1/3)
Restrict WP Pages With Redirect Security Vulnerabilities
Restrict WP Pages With Redirect Release Timeline
Restrict WP Pages With Redirect Code Analysis
Output Escaping
Restrict WP Pages With Redirect Attack Surface
WordPress Hooks 4
Maintenance & Trust
Restrict WP Pages With Redirect Maintenance & Trust
Maintenance Signals
Community Trust
Restrict WP Pages With Redirect Alternatives
Membership Plugin – Restrict Content
restrict-content
Restrict Content is a powerful WordPress membership plugin that gives you full control over who can and cannot view content on your WordPress site.
Simple Restrict
simple-restrict
Restrict pages based on permissions assigned to pages and granted in user profiles.
Restrict Posts based on Conditions – Conditional Post Restrictions
wp-conditional-post-restrictions
Restrict , hide , or block the content of your WordPress posts using a conditional rules system.
HTTP Authentication By KIMoFy
http-authentication-by-kimofy
HTTP Authentication lets you make a site without letting anyone view it without valid credentials. This can protect the full site or only admin pages.
Simple PageAccess
simple-pageaccess
Control who can view pages with a simple checkbox — restrict access to logged-in users and roles, right from the WordPress page editor.
Restrict WP Pages With Redirect Developer Profile
2 plugins · 3K total installs
How We Detect Restrict WP Pages With Redirect
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
widefatname="wp_login_logout_pages_option"value="1"value="2"name="wp_login_logout_pages_redirect"