Appsila WooQuote Security & Risk Analysis

wordpress.org/plugins/appsila-wooquote

Appsila WooQuote is a plugin that enables your customers send quote requests from your woocommerce shop which will then be tracked in a full functiona …

0 active installs v1.5.0 PHP + WP 4.0.0+ Updated Jul 5, 2018
quoterequest-a-quoterequest-a-quote-buttonwoocommerce-request-a-quote-shortcodewoocommerce-request-for-quote
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Appsila WooQuote Safe to Use in 2026?

Generally Safe

Score 85/100

Appsila WooQuote has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "appsila-wooquote" v1.5.0 plugin exhibits a generally positive security posture, with no recorded vulnerabilities or CVEs, suggesting a history of stable and secure development. The static analysis reveals a minimal attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or bundled libraries, which are good security practices. However, the analysis does highlight some areas of concern. A significant portion of output (73%) is not properly escaped, indicating a risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully during output. The presence of 3 external HTTP requests could potentially be exploited if the target endpoints are compromised or if sensitive data is sent insecurely. The taint analysis, while not yielding critical or high-severity issues, identified 4 flows with unsanitized paths, which warrants further investigation to ensure these paths are indeed handled securely. Despite these minor concerns, the plugin's lack of known vulnerabilities and its robust handling of SQL are strong indicators of its current security. The primary risk lies in the unescaped output and the potential for XSS, which should be prioritized for remediation.

Key Concerns

  • Unescaped output detected
  • External HTTP requests detected
  • Taint flows with unsanitized paths
Vulnerabilities
None known

Appsila WooQuote Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Appsila WooQuote Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
109
40 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

27% escaped149 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
<PartialView_Component_Modal_Result> (PartialViews\PartialView_Component_Modal_Result.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Appsila WooQuote Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionwp_enqueue_scriptsResources\wpScriptCSSImports.php:93
actionwp_headResources\wpScriptCSSImports.php:95
actionadmin_enqueue_scriptsResources\wpScriptCSSImports.php:97
actionadmin_headResources\wpScriptCSSImports.php:99
actionadmin_menuWooQuote.php:78
filterhttp_request_timeoutWooQuote.php:88
actionwoocommerce_after_add_to_cart_formWooQuote.php:693
actionwoocommerce_cart_actionsWooQuote.php:873
Maintenance & Trust

Appsila WooQuote Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJul 5, 2018
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs0
Developer Profile

Appsila WooQuote Developer Profile

appsila

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Appsila WooQuote

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/appsila-wooquote/css/wqt_backend.css/wp-content/plugins/appsila-wooquote/css/wqt_frontend.css/wp-content/plugins/appsila-wooquote/js/wqt_backend.js/wp-content/plugins/appsila-wooquote/js/wqt_frontend.js/wp-content/plugins/appsila-wooquote/js/wooquote-shortcode.js
Script Paths
/wp-content/plugins/appsila-wooquote/js/wqt_backend.js/wp-content/plugins/appsila-wooquote/js/wqt_frontend.js/wp-content/plugins/appsila-wooquote/js/wooquote-shortcode.js
Version Parameters
appsila-wooquote/css/wqt_backend.css?ver=appsila-wooquote/css/wqt_frontend.css?ver=appsila-wooquote/js/wqt_backend.js?ver=appsila-wooquote/js/wqt_frontend.js?ver=appsila-wooquote/js/wooquote-shortcode.js?ver=

HTML / DOM Fingerprints

CSS Classes
wqt-quote-buttonappsila-wooquote-settings-tab
HTML Comments
Everything you see on mainpage are included in here(Tabs, informations, inputs etc.)This section is executed if user presses the 'Save changes' button.If 'email', 'apikey' and 'website' inputs are same as the last updates datas, it executes this else block.Putting the users inputs to an array.+1 more
Data Attributes
name="email-api"name="website-api"name="wc-api-key"name="wc-api-secret"name="hostname"name="enable"
JS Globals
appsila_wooquote_ajax_object
Shortcode Output
[wooquote]
FAQ

Frequently Asked Questions about Appsila WooQuote