Dashboard Quick Actions Security & Risk Analysis

wordpress.org/plugins/dashboard-quick-actions

Admin dashboard quick action icons and links for WordPress

20 active installs v1.2 PHP + WP 3.8+ Updated Jul 9, 2016
actionsadmindashboardlinksquick
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Dashboard Quick Actions Safe to Use in 2026?

Generally Safe

Score 85/100

Dashboard Quick Actions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'dashboard-quick-actions' plugin version 1.2 exhibits a generally positive security posture with no known vulnerabilities or critical code signals. The absence of any recorded CVEs, a clean taint analysis with no unsanitized paths, and the use of prepared statements for all SQL queries are strong indicators of good security practices in these areas. The plugin also has a remarkably small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are accessible without proper authentication.

However, the static analysis reveals a significant concern regarding output escaping. With 100% of the 72 identified outputs being improperly escaped, this presents a substantial risk for cross-site scripting (XSS) vulnerabilities. Although there are no direct indicators of XSS in the taint analysis, the lack of escaping means that any data processed by the plugin and then displayed to the user could be maliciously manipulated. The presence of only one capability check and zero nonce checks, while not directly tied to an attack vector in this analysis, could become a weakness if new entry points were introduced or if existing functionality relied on user context that wasn't properly validated.

In conclusion, while the plugin is strong in areas like SQL injection prevention and minimizing its direct attack surface, the pervasive lack of output escaping is a critical weakness that needs immediate attention. The vulnerability history is reassuring, suggesting a generally secure development process, but the identified code signal regarding output escaping is a major blind spot that could be exploited.

Key Concerns

  • Outputs improperly escaped
  • No nonce checks
Vulnerabilities
None known

Dashboard Quick Actions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Dashboard Quick Actions Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
72
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped72 total outputs
Attack Surface

Dashboard Quick Actions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menudashboard-quick-actions.php:23
actionadmin_enqueue_scriptsdashboard-quick-actions.php:42
actionwp_dashboard_setupdashboard-quick-actions.php:160
Maintenance & Trust

Dashboard Quick Actions Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 9, 2016
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs20
Developer Profile

Dashboard Quick Actions Developer Profile

uniquelylost

4 plugins · 2K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dashboard Quick Actions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dashboard-quick-actions/assets/dashboard-quick-actions.css

HTML / DOM Fingerprints

CSS Classes
dqa-widgetdqa-icon-blockmetro-bg
Data Attributes
hvr-
JS Globals
dqa_options
FAQ

Frequently Asked Questions about Dashboard Quick Actions