Enterra Quick Clone Security & Risk Analysis

wordpress.org/plugins/enterra-quick-clone

Easily clone or clone & edit WooCommerce products or WordPress posts with one click.

0 active installs v1.2.0 PHP 7.4+ WP 6.5+ Updated Unknown
cloneduplicateproductsquick-editwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Enterra Quick Clone Safe to Use in 2026?

Generally Safe

Score 100/100

Enterra Quick Clone has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The enterra-quick-clone plugin v1.2.0 demonstrates a strong adherence to secure coding practices based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, or unescaped output is highly commendable. Furthermore, the presence of nonce and capability checks across its limited entry points indicates a thoughtful approach to preventing unauthorized access and actions. The plugin also has no recorded vulnerability history, which suggests a history of secure development or diligent patching.

However, the most significant concern arises from the complete lack of any identified entry points (AJAX, REST API, shortcodes, cron events) in the static analysis. While this indicates a minimal attack surface, it also raises questions about the plugin's actual functionality and how it's intended to be used. If the plugin is meant to perform any operations, the absence of discoverable entry points could mean they are obfuscated or that the static analysis has limitations in discovering them. Without any taint analysis results, it's impossible to assess the security of any potential data flows within the plugin. The plugin's overall security posture appears good on the surface, but the lack of discoverable entry points and taint analysis results prevents a comprehensive risk assessment. It's recommended to understand how the plugin operates and ensure any actual entry points are properly secured.

Key Concerns

  • No taint analysis performed
  • No identified AJAX handlers
  • No identified REST API routes
  • No identified shortcodes
  • No identified cron events
Vulnerabilities
None known

Enterra Quick Clone Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Enterra Quick Clone Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
11 escaped
Nonce Checks
4
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped11 total outputs
Attack Surface

Enterra Quick Clone Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterpost_row_actionsenterra-quick-clone.php:20
filterpage_row_actionsenterra-quick-clone.php:21
actionadmin_action_qpc_clone_contententerra-quick-clone.php:24
actionadmin_action_qpc_clone_and_edit_contententerra-quick-clone.php:25
actionadmin_noticesenterra-quick-clone.php:28
Maintenance & Trust

Enterra Quick Clone Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads290

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Enterra Quick Clone Developer Profile

Enterrahost

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enterra Quick Clone

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
data-type="wp_element"data-wp-element="link"
FAQ

Frequently Asked Questions about Enterra Quick Clone