WP-Redirection Security & Risk Analysis

wordpress.org/plugins/wp-redirection

An alternative to setup redirection without modifying the htaccess file

10 active installs v1.0.3 PHP + WP 3.0+ Updated Aug 23, 2020
redirection
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Redirection Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Redirection has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "wp-redirection" plugin version 1.0.3 exhibits a concerning security posture despite its clean vulnerability history. The static analysis reveals a critical issue: all three analyzed taint flows have unsanitized paths and are flagged with high severity. This suggests potential vulnerabilities where user-supplied data could be used in a dangerous way, such as file path manipulation or command injection, despite the lack of direct file operations or external HTTP requests in the code signals. The complete absence of output escaping on all seven detected outputs is another major red flag, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. While the plugin has no recorded CVEs and a seemingly empty attack surface from direct entry points like AJAX or REST API, the internal code analysis reveals significant weaknesses that could be exploited if an attacker finds a way to trigger these unsanitized flows or inject malicious scripts into the unescaped outputs. The high percentage of prepared statements for SQL queries is a positive sign, but it doesn't mitigate the risks posed by the taint flows and output escaping issues. Therefore, this plugin should be treated with caution due to the high-severity taint flows and lack of output escaping, which outweigh the benefits of its clean vulnerability history and seemingly small attack surface.

Key Concerns

  • High severity taint flows with unsanitized paths
  • Zero output escaping on all detected outputs
Vulnerabilities
None known

WP-Redirection Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP-Redirection Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
9 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

90% prepared10 total queries

Output Escaping

0% escaped7 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
displayWPRedirectionManagementPage (wp-redirection.php:31)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-Redirection Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuwp-redirection.php:666
actioninitwp-redirection.php:667
Maintenance & Trust

WP-Redirection Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 23, 2020
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-Redirection Developer Profile

PressPage Entertainment Inc

5 plugins · 140 total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Redirection

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-redirection/

HTML / DOM Fingerprints

CSS Classes
wrapoptionseditform
Data Attributes
name="redirect"name="brd_host"name="brd_path"name="brd_new_host"name="brd_map"name="brd_code"+3 more
JS Globals
editItemdeleteItemnewItem
FAQ

Frequently Asked Questions about WP-Redirection