Redis User Session Storage Security & Risk Analysis

wordpress.org/plugins/wp-redis-user-session-storage

Store WordPress session tokens in Redis rather than the usermeta table.

200 active installs v0.2 PHP 5.6+ WP 4.0+ Updated Jul 16, 2022
session-storagesession-tokensuser-sessions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Redis User Session Storage Safe to Use in 2026?

Generally Safe

Score 85/100

Redis User Session Storage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "wp-redis-user-session-storage" v0.2 plugin exhibits a very strong security posture based on the provided static analysis. The complete absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), unescaped output, file operations, and external HTTP requests indicates a high level of coding discipline. Furthermore, the plugin has no recorded vulnerability history, suggesting a mature and secure development process. The zero attack surface, particularly with no unprotected entry points, is a significant strength, meaning there are no immediately obvious ways for an attacker to interact with the plugin without proper authorization.

While the static analysis is highly positive, the complete lack of taint analysis data is a minor concern. This could mean that either no taint analysis was performed or that the analysis tools found no issues. However, given the other positive signals, it's likely that the plugin is well-written. The lack of nonce and capability checks on entry points (which are currently zero) is noted, but this is effectively mitigated by the absence of any entry points in the first place. Overall, this plugin appears to be a very secure option for its intended purpose, with no identified vulnerabilities or significant code weaknesses.

Vulnerabilities
None known

Redis User Session Storage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Redis User Session Storage Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries
Attack Surface

Redis User Session Storage Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedwp-redis-user-session-storage.php:62
filtersession_token_managerwp-redis-user-session-storage.php:68
Maintenance & Trust

Redis User Session Storage Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJul 16, 2022
PHP min version5.6
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

Redis User Session Storage Developer Profile

Erick Hitter

12 plugins · 48K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
2199 days
View full developer profile
Detection Fingerprints

How We Detect Redis User Session Storage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-redis-user-session-storage/inc/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Redis User Session Storage