
Frontier Query Security & Risk Analysis
wordpress.org/plugins/frontier-queryDisplay list and grouping of posts in widgets, posts and pages. Breakdown posts by categories, taxonomies, date, post type etc.
Is Frontier Query Safe to Use in 2026?
Generally Safe
Score 85/100Frontier Query has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "frontier-query" plugin v1.6.5 exhibits a mixed security posture, with several positive aspects but also concerning code practices. The absence of known CVEs and a clean vulnerability history suggest a generally stable codebase. Furthermore, the plugin demonstrates good security hygiene in its handling of AJAX, REST API, and cron events, with no unprotected entry points identified in these areas. The majority of SQL queries utilize prepared statements, which is a strong indicator of protection against SQL injection vulnerabilities. File operations and external HTTP requests are also absent, reducing potential attack vectors.
However, the code analysis reveals several areas of concern. The presence of `create_function` is a significant security risk, as it can be exploited for remote code execution if not handled with extreme care and proper sanitization, which the taint analysis results suggest is lacking. The extremely low percentage of properly escaped output (17%) is a major red flag for Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data is likely being rendered directly into the page without adequate sanitization. The lack of nonce checks is another critical oversight, as it leaves the plugin susceptible to Cross-Site Request Forgery (CSRF) attacks, especially given the presence of shortcodes which often serve as interaction points.
Despite the lack of known vulnerabilities and generally secure handling of core WordPress entry points, the identified weaknesses in output escaping and the presence of `create_function` create significant potential for exploitation. The plugin's strengths lie in its structured approach to core WordPress integrations, but its internal code quality regarding output sanitization and the use of deprecated/dangerous functions needs substantial improvement to mitigate the risks of XSS and RCE.
Key Concerns
- Use of dangerous function: create_function
- Low percentage of properly escaped output (17%)
- 0 Nonce checks
- 2 unsanitized taint flows
Frontier Query Security Vulnerabilities
Frontier Query Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Frontier Query Attack Surface
Shortcodes 7
WordPress Hooks 11
Maintenance & Trust
Frontier Query Maintenance & Trust
Maintenance Signals
Community Trust
Frontier Query Alternatives
Query Filter
query-filter
Advanced taxonomy and Custom Fields CPT filtering plugin.
ACF Advanced Search
acf-advanced-search
Advanced search for the Advanced Custom Fields plugin (Free & Pro).
Widget Search Filter
widget-search-filter
Widget Search Filter allows you to quickly search & filter your widgets in real time. No more excessive searching, scrolling, and dragging.
Filter Search Page
filter-search-page
This plugin will help you to filter the search page results by category and post type.
EP Widgets Search
ep-widgets-search
This plugin add a search bar in wordpress dashbaord widgets page. You can search widgets that is available on your WordPress installation.
Frontier Query Developer Profile
5 plugins · 570 total installs
How We Detect Frontier Query
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/frontier-query/css/frontier-query.css/wp-content/plugins/frontier-query/js/frontier-query.js/wp-content/plugins/frontier-query/js/frontier-query.jsfrontier-query/css/frontier-query.css?ver=frontier-query/js/frontier-query.js?ver=HTML / DOM Fingerprints
frontier-query-resultsfrontier-query-search-formfq-widget-titlefq-infobox-content<!-- Frontier Query Start --><!-- Frontier Query End --><!-- Frontier Search Form Start --><!-- Frontier Search Form End -->+4 moredata-fq-iddata-fq-search-iddata-fq-infobox-iddata-fq-widget-idfrontier_query_object[fq-shortcode-builder][fq-infobox][fq-widget][frontier-query]