Show WordPress Queries – Query Interface Security & Risk Analysis

wordpress.org/plugins/query-interface

An interface to show, run & execute wordpress queries, display queries on pages with loading time so you may optimize them etc.

10 active installs v1.3.1 PHP + WP + Updated Jan 14, 2015
display-queriesexplain-queriesquery-interfaceshow-queries
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Show WordPress Queries – Query Interface Safe to Use in 2026?

Generally Safe

Score 85/100

Show WordPress Queries – Query Interface has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'query-interface' plugin version 1.3.1 exhibits a concerning security posture primarily due to its significant attack surface exposed through AJAX handlers without adequate authentication or capability checks. While the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and avoids dangerous functions, file operations, and external HTTP requests, these strengths are overshadowed by the numerous unprotected entry points. The static analysis reveals 4 AJAX handlers, all of which lack authentication checks. Furthermore, the taint analysis, though limited, identified a flow with unsanitized paths, which in combination with the unprotected AJAX handlers, presents a potential risk for various injection attacks.

The vulnerability history for this plugin is clean, with no recorded CVEs. This absence of past vulnerabilities is a positive indicator, suggesting either a well-developed codebase or a lack of past scrutiny. However, this should not be interpreted as a guarantee of current security, especially given the identified weaknesses in the static analysis. The plugin's lack of nonces and capability checks on its AJAX endpoints is a critical oversight that could allow unauthorized users to trigger plugin functionalities, potentially leading to unintended data manipulation or disclosure if the unsanitized paths are exploited. In conclusion, while the plugin has strengths in its SQL handling and avoidance of other risky operations, the unprotected AJAX handlers and the presence of unsanitized paths create a substantial security risk that requires immediate attention.

Key Concerns

  • 4 AJAX handlers without auth checks
  • Unsanitized path in taint flow
  • 0 Nonce checks on AJAX handlers
  • 0 Capability checks on AJAX handlers
  • 13% of output properly escaped
Vulnerabilities
None known

Show WordPress Queries – Query Interface Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Show WordPress Queries – Query Interface Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

13% escaped23 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<qi> (qi.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

Show WordPress Queries – Query Interface Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

authwp_ajax_view_fieldsqueryinterface.php:234
noprivwp_ajax_view_fieldsqueryinterface.php:235
authwp_ajax_set_queriesqueryinterface.php:237
noprivwp_ajax_set_queriesqueryinterface.php:238
WordPress Hooks 5
actionwp_headqueryinterface.php:26
actionwp_footerqueryinterface.php:27
actionwp_loginqueryinterface.php:28
actionwp_logoutqueryinterface.php:29
actionadmin_menuqueryinterface.php:32
Maintenance & Trust

Show WordPress Queries – Query Interface Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedJan 14, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Alternatives

Show WordPress Queries – Query Interface Alternatives

No alternatives data available yet.

Developer Profile

Show WordPress Queries – Query Interface Developer Profile

queryinn

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Show WordPress Queries – Query Interface

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
qi_topqi_normalqi_alt1qi_headtd_head
Data Attributes
id="qi_table"
JS Globals
qi_scroll
REST Endpoints
/wp-json/admin-ajax.php?action=view_fields/wp-json/admin-ajax.php?action=set_queries
FAQ

Frequently Asked Questions about Show WordPress Queries – Query Interface