RedCase Security & Risk Analysis

wordpress.org/plugins/webera-redcase

This plugin is used to show deals based on Sheerid RedCase platform

10 active installs v4.2 PHP 5.2.4+ WP 4.6+ Updated Jul 25, 2019
dealsoffers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is RedCase Safe to Use in 2026?

Generally Safe

Score 85/100

RedCase has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The webera-redcase v4.2 plugin presents a mixed security posture. On the positive side, it has no recorded vulnerabilities or known CVEs, indicating a history of relative security and a lack of immediately exploitable public weaknesses. The absence of dangerous functions, file operations, and critical taint analysis findings are also encouraging signs. However, the static analysis reveals several significant concerns that detract from its overall security.

The plugin exposes an unprotected AJAX handler, creating a direct entry point for potential attacks without any authentication or authorization checks. Furthermore, its handling of SQL queries is highly problematic, with no prepared statements used for any of the identified queries, increasing the risk of SQL injection vulnerabilities. The low percentage of properly escaped output is another critical weakness, leaving the plugin susceptible to cross-site scripting (XSS) attacks. The lack of nonce checks on AJAX endpoints further exacerbates the risk of cross-site request forgery (CSRF) attacks.

In conclusion, while the plugin's vulnerability history is clean, the static analysis highlights substantial security flaws. The unprotected AJAX handler, raw SQL queries, and insufficient output escaping represent immediate and serious risks. The absence of capability checks on entry points is also a concern. These issues, despite the clean CVE record, necessitate careful review and remediation to improve the plugin's security.

Key Concerns

  • Unprotected AJAX handler detected
  • SQL queries without prepared statements
  • Low percentage of output escaping
  • No nonce checks on AJAX
  • No capability checks on entry points
Vulnerabilities
None known

RedCase Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

RedCase Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
20
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
1

Bundled Libraries

jQuery

SQL Query Safety

0% prepared2 total queries

Output Escaping

20% escaped25 total outputs
Attack Surface
1 unprotected

RedCase Attack Surface

Entry Points3
Unprotected1

AJAX Handlers 1

authwp_ajax_store_admin_dataincludes\admin\config.php:48

Shortcodes 2

[show_deals] index.php:39
[show_single_deal] index.php:40
WordPress Hooks 8
actionadmin_menuincludes\admin\config.php:47
actionadmin_enqueue_scriptsincludes\admin\config.php:49
actionadd_meta_boxes_dealsincludes\admin\init.php:8
actionadmin_enqueue_scriptsincludes\admin\init.php:9
filtermanage_edit-deals_columnsincludes\admin\init.php:10
actioninitindex.php:33
filterrewrite_rules_arrayindex.php:34
filterquery_varsindex.php:35
Maintenance & Trust

RedCase Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedJul 25, 2019
PHP min version5.2.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

RedCase Developer Profile

Joel Zamboni

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RedCase

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/webera-redcase/assets/css/admin.css/wp-content/plugins/webera-redcase/assets/js/admin.js/wp-content/plugins/webera-redcase/assets/css/style.css/wp-content/plugins/webera-redcase/assets/js/script.js

HTML / DOM Fingerprints

CSS Classes
redcase_admin_nonceredcase_keyredcase-admin-save
Data Attributes
data-nonce="redcase_admin"
JS Globals
redcase_exchanger
Shortcode Output
<div class="row"><div class="container"><div id="root">
FAQ

Frequently Asked Questions about RedCase