
Query Editor Security & Risk Analysis
wordpress.org/plugins/query-editorAdds a simple set of options to modify the default query by changing what post types are used, the ordering and more.
Is Query Editor Safe to Use in 2026?
Generally Safe
Score 85/100Query Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "query-editor" v0.3.1 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of direct attack surface points like AJAX handlers, REST API routes, shortcodes, and cron events is a significant strength, as it limits the potential for unauthorized access or malicious input. Furthermore, the fact that all identified SQL queries utilize prepared statements is excellent practice, mitigating SQL injection risks. The plugin also demonstrates a commitment to security by including capability checks, although it lacks nonce checks for any potential entry points, which is a concern if any are inadvertently introduced. The low percentage of properly escaped output (44%) is a notable weakness, as it indicates a risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis showing no unsanitized paths and the clean vulnerability history, with no known CVEs, further contribute to a generally positive security assessment, but the unescaped output remains a key area of concern.
While the plugin has no known vulnerabilities and a minimal attack surface, the 44% rate of proper output escaping suggests a significant potential for XSS vulnerabilities. This means that data displayed to users might not be properly sanitized, allowing for the injection of malicious scripts. The lack of nonce checks, while not directly exploitable given the absence of AJAX or similar entry points, represents a missed opportunity for robust security if any such features were to be added in the future. The vulnerability history is clean, which is a positive sign, but it's important to remember that absence of evidence is not evidence of absence. The core strength lies in the minimal attack surface and secure SQL practices, but the output escaping issue requires attention to achieve a truly secure state.
Key Concerns
- Low percentage of properly escaped output
- Missing nonce checks
Query Editor Security Vulnerabilities
Query Editor Release Timeline
Query Editor Code Analysis
Output Escaping
Data Flow Analysis
Query Editor Attack Surface
WordPress Hooks 3
Maintenance & Trust
Query Editor Maintenance & Trust
Maintenance Signals
Community Trust
Query Editor Alternatives
Cherry Pick for Query Loop
cherry-pick-for-query-loop
Pick specific posts for Query Loop block and display them in your preferred order.
Master Query Loop
master-query-loop
The plugin helps you to add advanced features to the WordPress core query loop block: get specific posts, popular posts and more!
Query Loop Load More
query-loop-load-more
This WordPress plugin adds a load more option to the Query Loop Pagination block in Gutenberg, allowing users to load more posts without refreshing th …
Inject Query Posts
inject-query-posts
Facilitates injecting an array of posts into a WP query object as if queried. Particularly useful to allow use of standard template tags.
Random Posts for Query Loop Block
random-posts-for-query-loop-block
Adds "rand" to the REST API orderby options so the Query Loop block can use random post order safely without breaking the Site Editor preview.
Query Editor Developer Profile
5 plugins · 740 total installs
How We Detect Query Editor
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
custom-orderbyname="qe_post_types[]"name="qe_exclude_terms[name="qe_order"name="qe_orderby"name="qe_orderby_tax"name="qe_orderby_tax_order"+5 more