Query Shortcode Security & Risk Analysis

wordpress.org/plugins/query-shortcode

An insanely powerful shortcode that enables you to query anything you want and display it however you like.

30 active installs v0.2.1 PHP + WP 3.3+ Updated Apr 27, 2013
postqueryshortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Query Shortcode Safe to Use in 2026?

Generally Safe

Score 85/100

Query Shortcode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "query-shortcode" plugin v0.2.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices by having no known CVEs, no dangerous functions, and all SQL queries utilize prepared statements. The absence of external HTTP requests and file operations also reduces potential attack vectors. However, a significant concern is the complete lack of output escaping, meaning that any data processed or displayed by the shortcode is vulnerable to Cross-Site Scripting (XSS) attacks. Furthermore, the analysis indicates a lack of capability checks and nonce checks, which, while not directly exploited by the current static analysis (due to no AJAX or REST API entries), leaves the plugin's single entry point (the shortcode) potentially vulnerable if it handles user-supplied data without proper authorization validation. The absence of any recorded vulnerabilities in its history is encouraging, but this may be a result of limited previous scrutiny or the identified weaknesses not having been exploited or publicly disclosed yet. Overall, while the plugin avoids common pitfalls like raw SQL and dangerous functions, the critical oversight in output escaping presents a clear and present danger for XSS, and the lack of authorization checks for its shortcode creates a potential avenue for abuse.

Key Concerns

  • 0% of outputs are properly escaped
  • 0 capability checks on shortcode
  • 0 nonce checks on shortcode
Vulnerabilities
None known

Query Shortcode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Query Shortcode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped14 total outputs
Attack Surface

Query Shortcode Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[query] init.php:35
WordPress Hooks 2
actioninitinit.php:30
actiontemplate_redirectinit.php:31
Maintenance & Trust

Query Shortcode Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedApr 27, 2013
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings5
Active installs30
Developer Profile

Query Shortcode Developer Profile

shazdeh

24 plugins · 4K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Query Shortcode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/query-shortcode/css/library-rtl.css/wp-content/plugins/query-shortcode/css/library.css
Version Parameters
query-shortcode/css/library-rtl.css?ver=query-shortcode/css/library.css?ver=

HTML / DOM Fingerprints

CSS Classes
rowone-halfone-thirdone-fourthone-fifthone-sixthlastclear
Shortcode Output
<!-- /.row -->
FAQ

Frequently Asked Questions about Query Shortcode