Quick Adsense Mobile Security & Risk Analysis

wordpress.org/plugins/quick-adsense-mobile

Quick Adsense Mobile is a plugin based on Quick Adsense , this plugins offers a quicker & flexible way to insert Google Adsense or any Ads code in …

200 active installs v2.0 PHP + WP 3.5+ Updated May 23, 2017
adsenseampgoogle-adsensemobilewordpress-plugin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Quick Adsense Mobile Safe to Use in 2026?

Generally Safe

Score 85/100

Quick Adsense Mobile has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The quick-adsense-mobile plugin, version 2.0, exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs), no external HTTP requests, and all SQL queries utilize prepared statements, indicating good practices in these areas. The attack surface is reported as zero entry points, which is a strong indicator of a well-secured plugin in terms of direct entry points like AJAX, REST API, shortcodes, and cron jobs. The taint analysis also shows no critical or high-severity flows, suggesting that data processing within the plugin may be adequately sanitized or not expose sensitive operations.

However, several concerning code signals raise red flags. The presence of the `create_function` is a significant risk as it can be a vector for code injection if user-supplied input is ever used to construct the arguments for this function. Furthermore, a very low percentage (2%) of output is properly escaped, which is a major concern for Cross-Site Scripting (XSS) vulnerabilities. File operations are present, and while the specific impact isn't detailed, it's an area that needs careful scrutiny. The complete lack of nonce checks and capability checks on any potential entry points (though reported as zero) is a serious oversight. Even with a zero attack surface, a single oversight in these checks could expose the plugin to significant risks.

Given the clean vulnerability history, it might suggest that the plugin authors have been diligent, or that the specific usage patterns haven't yet exposed existing weaknesses. However, the code analysis reveals potential vulnerabilities that have not manifested as reported CVEs. The reliance on the absence of exploitable paths rather than robust security mechanisms like nonces and proper output escaping is a weakness. The plugin's strengths lie in its SQL handling and lack of external dependencies or recorded past exploits, but the identified code signals point to significant inherent risks that could be exploited.

Key Concerns

  • Dangerous function: create_function
  • Low output escaping percentage (2%)
  • No nonce checks
  • No capability checks
  • File operations present
Vulnerabilities
None known

Quick Adsense Mobile Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Quick Adsense Mobile Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
116
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$displaycall[$i] = create_function('$args', $displaystr);quick-adsense-mobile.php:519

Output Escaping

2% escaped118 total outputs
Attack Surface

Quick Adsense Mobile Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuquick-adsense-mobile.php:83
actionadmin_initquick-adsense-mobile.php:84
filterplugin_action_linksquick-adsense-mobile.php:94
actionadmin_print_footer_scriptsquick-adsense-mobile.php:181
actionadmin_headquick-adsense-mobile.php:183
filterthe_contentquick-adsense-mobile.php:497
actioninitquick-adsense-mobile.php:526
Maintenance & Trust

Quick Adsense Mobile Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMay 23, 2017
PHP min version
Downloads19K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

Quick Adsense Mobile Developer Profile

Miguelo2008

2 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Quick Adsense Mobile

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/quick-adsense-mobile/quick-adsense-mobile-admin.php
Version Parameters
quick-adsense-mobile/quick-adsense-mobile.php?ver=quick-adsense-mobile/quick-adsense-mobile-admin.php?ver=

HTML / DOM Fingerprints

HTML Comments
<!--Ads1--><!--Ads2--><!--Ads3--><!--Ads4-->+17 more
Data Attributes
id="ads1"id="ads2"id="ads3"id="ads4"id="ads5"id="ads6"+14 more
JS Globals
wpvcompedaddIDedaddNmedadddynadsedButtons
FAQ

Frequently Asked Questions about Quick Adsense Mobile