
Show WordPress Queries – Query Interface Security & Risk Analysis
wordpress.org/plugins/query-interfaceAn interface to show, run & execute wordpress queries, display queries on pages with loading time so you may optimize them etc.
Is Show WordPress Queries – Query Interface Safe to Use in 2026?
Generally Safe
Score 85/100Show WordPress Queries – Query Interface has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'query-interface' plugin version 1.3.1 exhibits a concerning security posture primarily due to its significant attack surface exposed through AJAX handlers without adequate authentication or capability checks. While the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and avoids dangerous functions, file operations, and external HTTP requests, these strengths are overshadowed by the numerous unprotected entry points. The static analysis reveals 4 AJAX handlers, all of which lack authentication checks. Furthermore, the taint analysis, though limited, identified a flow with unsanitized paths, which in combination with the unprotected AJAX handlers, presents a potential risk for various injection attacks.
The vulnerability history for this plugin is clean, with no recorded CVEs. This absence of past vulnerabilities is a positive indicator, suggesting either a well-developed codebase or a lack of past scrutiny. However, this should not be interpreted as a guarantee of current security, especially given the identified weaknesses in the static analysis. The plugin's lack of nonces and capability checks on its AJAX endpoints is a critical oversight that could allow unauthorized users to trigger plugin functionalities, potentially leading to unintended data manipulation or disclosure if the unsanitized paths are exploited. In conclusion, while the plugin has strengths in its SQL handling and avoidance of other risky operations, the unprotected AJAX handlers and the presence of unsanitized paths create a substantial security risk that requires immediate attention.
Key Concerns
- 4 AJAX handlers without auth checks
- Unsanitized path in taint flow
- 0 Nonce checks on AJAX handlers
- 0 Capability checks on AJAX handlers
- 13% of output properly escaped
Show WordPress Queries – Query Interface Security Vulnerabilities
Show WordPress Queries – Query Interface Code Analysis
Output Escaping
Data Flow Analysis
Show WordPress Queries – Query Interface Attack Surface
AJAX Handlers 4
WordPress Hooks 5
Maintenance & Trust
Show WordPress Queries – Query Interface Maintenance & Trust
Maintenance Signals
Community Trust
Show WordPress Queries – Query Interface Alternatives
No alternatives data available yet.
Show WordPress Queries – Query Interface Developer Profile
1 plugin · 10 total installs
How We Detect Show WordPress Queries – Query Interface
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
qi_topqi_normalqi_alt1qi_headtd_headid="qi_table"qi_scroll/wp-json/admin-ajax.php?action=view_fields/wp-json/admin-ajax.php?action=set_queries