
Quick Add Child Security & Risk Analysis
wordpress.org/plugins/quick-add-childAdd child posts right from a hierarchical post editing screen.
Is Quick Add Child Safe to Use in 2026?
Generally Safe
Score 85/100Quick Add Child has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "quick-add-child" plugin version 0.7.0 exhibits a seemingly strong security posture based on the static analysis, with no identified entry points like AJAX handlers, REST API routes, or shortcodes. Furthermore, the code analysis revealed no dangerous functions, file operations, or external HTTP requests, which are common vectors for exploitation. The plugin also boasts no recorded vulnerabilities in its history, indicating a potential history of secure development.
However, several areas of concern emerge from the code analysis. The SQL query usage is worrying, with only 25% of queries employing prepared statements. This significantly increases the risk of SQL injection vulnerabilities, especially given the total of 4 SQL queries present. Additionally, only 50% of output escaping is properly handled, meaning there's a risk of cross-site scripting (XSS) vulnerabilities. The taint analysis, while limited in scope with only two flows, revealed that both flows had unsanitized paths, which is a serious concern, even if they didn't reach a critical or high severity in this specific analysis. The complete absence of nonce and capability checks across all code paths is a critical oversight, leaving the plugin vulnerable to various forms of attack, including CSRF and privilege escalation if any hidden entry points or future functionality are added.
In conclusion, while the "quick-add-child" plugin has a clean vulnerability history and avoids many common security pitfalls, the identified issues with SQL querying, output escaping, and the complete lack of authorization checks present significant risks. The taint analysis also highlights a potential for vulnerabilities that might not have been fully realized in this static analysis pass. The absence of these fundamental security checks is the most concerning aspect and should be addressed immediately.
Key Concerns
- SQL queries not using prepared statements
- Output escaping not properly handled
- Taint flows with unsanitized paths
- No nonce checks
- No capability checks
Quick Add Child Security Vulnerabilities
Quick Add Child Release Timeline
Quick Add Child Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Quick Add Child Attack Surface
WordPress Hooks 11
Maintenance & Trust
Quick Add Child Maintenance & Trust
Maintenance Signals
Community Trust
Quick Add Child Alternatives
Bainternet Posts Creation Limits
bainternet-posts-creation-limits
this plugin helps you to limit the number of posts/pages/custom post types each user can create on your site.
Hierarchy
hierarchy
Move your Pages/Posts/Custom Post Type admin links from the sidebar to a Content menu that nests everything where it should be
.html for all url
html-for-all-url
convert your url in .html easaly for post, page, custom post type ...
WP Duplicate posts pages & CPT
wp-duplicate-posts-pages-cpt
Duplicate posts, pages and CPT with all custom data.
Create Posts & Terms
create-posts-terms
Create pages, posts, custom post items, categories, post tags & custom taxonomies terms in bulk.
Quick Add Child Developer Profile
6 plugins · 4K total installs
How We Detect Quick Add Child
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/quick-add-child/assets/js/admin.js/wp-content/plugins/quick-add-child/assets/js/admin.jsquick-add-child/assets/js/admin.js?ver=HTML / DOM Fingerprints
data-parent_idquick_add_child_js_params