Quick Add Child Security & Risk Analysis

wordpress.org/plugins/quick-add-child

Add child posts right from a hierarchical post editing screen.

10 active installs v0.7.0 PHP + WP 3.5.1+ Updated Feb 27, 2015
child-postcptpages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Quick Add Child Safe to Use in 2026?

Generally Safe

Score 85/100

Quick Add Child has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "quick-add-child" plugin version 0.7.0 exhibits a seemingly strong security posture based on the static analysis, with no identified entry points like AJAX handlers, REST API routes, or shortcodes. Furthermore, the code analysis revealed no dangerous functions, file operations, or external HTTP requests, which are common vectors for exploitation. The plugin also boasts no recorded vulnerabilities in its history, indicating a potential history of secure development.

However, several areas of concern emerge from the code analysis. The SQL query usage is worrying, with only 25% of queries employing prepared statements. This significantly increases the risk of SQL injection vulnerabilities, especially given the total of 4 SQL queries present. Additionally, only 50% of output escaping is properly handled, meaning there's a risk of cross-site scripting (XSS) vulnerabilities. The taint analysis, while limited in scope with only two flows, revealed that both flows had unsanitized paths, which is a serious concern, even if they didn't reach a critical or high severity in this specific analysis. The complete absence of nonce and capability checks across all code paths is a critical oversight, leaving the plugin vulnerable to various forms of attack, including CSRF and privilege escalation if any hidden entry points or future functionality are added.

In conclusion, while the "quick-add-child" plugin has a clean vulnerability history and avoids many common security pitfalls, the identified issues with SQL querying, output escaping, and the complete lack of authorization checks present significant risks. The taint analysis also highlights a potential for vulnerabilities that might not have been fully realized in this static analysis pass. The absence of these fundamental security checks is the most concerning aspect and should be addressed immediately.

Key Concerns

  • SQL queries not using prepared statements
  • Output escaping not properly handled
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Quick Add Child Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Quick Add Child Release Timeline

v0.7.0Current
v0.6.0
Code Analysis
Analyzed Mar 17, 2026

Quick Add Child Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
1 prepared
Unescaped Output
3
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

25% prepared4 total queries

Output Escaping

50% escaped6 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
admin_notice (admin\class-quick-add-child-admin.php:187)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Quick Add Child Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_enqueue_scriptsadmin\class-quick-add-child-admin.php:70
actionadmin_menuadmin\class-quick-add-child-admin.php:74
actionadmin_noticesadmin\class-quick-add-child-admin.php:81
filterpage_attributes_dropdown_pages_argsadmin\class-quick-add-child-admin.php:83
actionadmin_initadmin\includes\settings.php:37
actioninitpublic\class-quick-add-child.php:65
actionwpmu_new_blogpublic\class-quick-add-child.php:68
actionadmin_noticespublic\class-quick-add-child.php:71
actionwp_before_admin_bar_renderpublic\class-quick-add-child.php:74
actionplugins_loadedquick-add-child.php:45
actionplugins_loadedquick-add-child.php:57
Maintenance & Trust

Quick Add Child Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedFeb 27, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Quick Add Child Developer Profile

Yoren Chang

6 plugins · 4K total installs

79
trust score
Avg Security Score
87/100
Avg Patch Time
51 days
View full developer profile
Detection Fingerprints

How We Detect Quick Add Child

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/quick-add-child/assets/js/admin.js
Script Paths
/wp-content/plugins/quick-add-child/assets/js/admin.js
Version Parameters
quick-add-child/assets/js/admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-parent_id
JS Globals
quick_add_child_js_params
FAQ

Frequently Asked Questions about Quick Add Child