Auto Quote Security & Risk Analysis

wordpress.org/plugins/auto-quote

The Auto Quote plugin enables your website to automatically collect leads for your products and services.

20 active installs v1.5.2 PHP 5.2.0+ WP 4.7.0+ Updated Sep 24, 2021
activecampaigncrmhubspotpipedrivesales
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Auto Quote Safe to Use in 2026?

Generally Safe

Score 85/100

Auto Quote has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "auto-quote" plugin v1.5.2 exhibits a mixed security posture. On the positive side, it has a very small attack surface with only one entry point (a shortcode) and no known historical vulnerabilities. Furthermore, all SQL queries are properly prepared, and there are a reasonable number of nonce and capability checks present. However, the presence of two instances of the dangerous `unserialize` function is a significant concern, especially without further context on how the serialized data is sourced and validated.

The static analysis reveals potential risks primarily associated with the `unserialize` function. While the taint analysis did not identify critical or high severity flows, the fact that all four analyzed flows had unsanitized paths, even if classified as lower severity, warrants attention. The output escaping, with only 42% being properly escaped, also presents a moderate risk of cross-site scripting (XSS) vulnerabilities, particularly if the unescaped outputs handle user-controlled data.

Given the absence of any recorded vulnerabilities, the plugin's history is a strength, suggesting a history of responsible development or limited exposure to exploitable issues. However, this does not negate the risks identified in the current code. The plugin's strengths lie in its limited attack surface and secure SQL handling. The primary weaknesses are the use of `unserialize` and the concerning percentage of unescaped output, which could be exploited in conjunction with other less severe issues.

Key Concerns

  • Use of unserialize function
  • Low percentage of properly escaped output
  • All analyzed taint flows have unsanitized paths
Vulnerabilities
None known

Auto Quote Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Auto Quote Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
53
39 escaped
Nonce Checks
9
Capability Checks
1
File Operations
26
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$result = unserialize($response);admin\auto_quote_admin.php:536
unserialize$result = unserialize($response);auto_quote.php:341

Output Escaping

42% escaped92 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
gritonl_auto_quote_plugin_options (admin\auto_quote_admin.php:30)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Auto Quote Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gritonl_auto_quote] auto_quote.php:41
WordPress Hooks 2
actionadmin_menuadmin\auto_quote_admin.php:21
actionwp_headauto_quote.php:53
Maintenance & Trust

Auto Quote Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedSep 24, 2021
PHP min version5.2.0
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Auto Quote Developer Profile

Ilari Arovuo

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Quote

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/auto-quote/css/form.css/wp-content/plugins/auto-quote/js/jquery.cbchecker.js
Script Paths
/wp-content/plugins/auto-quote/js/jquery.cbchecker.js

HTML / DOM Fingerprints

CSS Classes
aq-fieldaq-button
Data Attributes
name="quote-requested"id="checkBtn"name="firstname"name="lastname"name="email"name="phone"+1 more
Shortcode Output
<form action="" method="post"><p>First Name<br/>
FAQ

Frequently Asked Questions about Auto Quote