WP HTTPS Redirect Security & Risk Analysis

wordpress.org/plugins/wp-https-redirect

This plugin helps you redirect HTTP traffic to HTTPS without the need of touching any code.

0 active installs v1.0.0 PHP + WP 3.9+ Updated Oct 31, 2017
forcehttpssecuritysslssl-certificate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP HTTPS Redirect Safe to Use in 2026?

Generally Safe

Score 85/100

WP HTTPS Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of "wp-https-redirect" v1.0.0 reveals a plugin with a minimal attack surface and seemingly strong coding practices. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no direct entry points into the plugin's functionality. Furthermore, the code signals indicate a lack of dangerous functions, all SQL queries utilize prepared statements, and all outputs are properly escaped. The absence of file operations, external HTTP requests, nonce checks, and capability checks in the code analysis is also a positive sign, suggesting the plugin doesn't engage in potentially risky operations or bypass standard WordPress security mechanisms. The vulnerability history is clean, with no known CVEs recorded, further bolstering its security reputation. However, the taint analysis shows 2 flows with unsanitized paths, though these are not flagged as critical or high severity. While the absence of vulnerabilities and attack vectors is excellent, the presence of unsanitized paths in taint analysis, even if low severity, suggests a potential for subtle issues that might not have manifested as exploitable vulnerabilities yet. The lack of capability checks and nonce checks, while seemingly good due to the lack of direct entry points, could become a concern if functionality were ever added or if the plugin interacted with other components in unintended ways.

Key Concerns

  • Flows with unsanitized paths
Vulnerabilities
None known

WP HTTPS Redirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP HTTPS Redirect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wp_https_redirect (main.php:12)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP HTTPS Redirect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actiontemplate_redirectmain.php:9
actionadmin_initwp-ssl.php:18
actionadmin_menuwp-ssl.php:38
actionadmin_headwp-ssl.php:68
Maintenance & Trust

WP HTTPS Redirect Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedOct 31, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WP HTTPS Redirect Developer Profile

ozvacate

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP HTTPS Redirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapabout-wrap
FAQ

Frequently Asked Questions about WP HTTPS Redirect