Role Based Redirect Security & Risk Analysis

wordpress.org/plugins/role-based-redirect

Redirect users after login/logout by role. Optionally hide admin bar and block dashboard access for selected roles.

2K active installs v1.6 PHP 5.6+ WP 4.0+ Updated Jul 18, 2025
hide-admin-barredirectionrestrict-dashboardroleuser
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Role Based Redirect Safe to Use in 2026?

Generally Safe

Score 100/100

Role Based Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The role-based-redirect plugin v1.6 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and a lack of recorded historical vulnerabilities suggest a history of responsible development and maintenance. Furthermore, the static analysis reveals a limited attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication or permission checks. The code also shows a good percentage of properly escaped output and the presence of nonce and capability checks, indicating an awareness of common security practices. However, a closer look at the SQL query handling reveals a potential area for improvement. While there are a moderate number of SQL queries, only 13% use prepared statements, leaving the remaining 87% potentially vulnerable to SQL injection if user-supplied data is not rigorously sanitized before being incorporated into these queries. The taint analysis showing zero flows, while positive in that no immediate critical issues were found, could also indicate limited test coverage or a lack of complex data flows that might otherwise reveal vulnerabilities. Overall, the plugin is relatively secure, but the lack of prepared statements in the majority of SQL queries presents a notable risk that should be addressed.

Key Concerns

  • Low usage of prepared statements for SQL queries
Vulnerabilities
None known

Role Based Redirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Role Based Redirect Release Timeline

v1.5
v1.4
v1.3
v1.2
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Role Based Redirect Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
1 prepared
Unescaped Output
8
18 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

13% prepared8 total queries

Output Escaping

69% escaped26 total outputs
Attack Surface

Role Based Redirect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menurole-based-redirect.php:16
actionadmin_enqueue_scriptsrole-based-redirect.php:17
filterlogin_redirectrole-based-redirect.php:18
actionafter_setup_themerole-based-redirect.php:19
actionadmin_initrole-based-redirect.php:20
actionwp_logoutrole-based-redirect.php:21
filtershow_admin_barrole-based-redirect.php:84
Maintenance & Trust

Role Based Redirect Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJul 18, 2025
PHP min version5.6
Downloads25K

Community Trust

Rating96/100
Number of ratings17
Active installs2K
Developer Profile

Role Based Redirect Developer Profile

Yasar Khalifa

9 plugins · 3K total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Role Based Redirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/role-based-redirect/assets/css/custom.css/wp-content/plugins/role-based-redirect/images/icon.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Role Based Redirect