Quick-Insight Security & Risk Analysis

wordpress.org/plugins/quick-insights

Quickly view active theme, post/page count, and storage stats with REST API and React for interactive insights.

0 active installs v1.0.1 PHP 7.2+ WP 5.0+ Updated Aug 5, 2025
insightpage-countpost-countstorage-overviewtheme-information
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Quick-Insight Safe to Use in 2026?

Generally Safe

Score 100/100

Quick-Insight has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8mo ago
Risk Assessment

The Quick Insights plugin v1.0.1 exhibits a concerning security posture primarily due to its significant attack surface lacking authentication. While the static analysis indicates good practices in areas like SQL prepared statements and output escaping, the presence of three REST API routes without permission callbacks represents a critical vulnerability. This means any user, including unauthenticated ones, can potentially trigger these endpoints, leading to unintended actions or information disclosure.

The absence of any recorded CVEs and the clean taint analysis are positive signs, suggesting the developers are likely not introducing common, easily detectable vulnerabilities. However, this historical cleanliness does not negate the immediate risks identified in the current code. The complete lack of nonce checks and capability checks on the identified entry points further exacerbates the risk, as there are no standard WordPress security mechanisms in place to protect these functions.

In conclusion, while the plugin demonstrates strengths in how it handles data and queries, the lack of proper authorization on its REST API routes is a severe weakness. This makes the plugin highly susceptible to unauthorized access and manipulation. Addressing these unprotected entry points should be the highest priority for the plugin's security.

Key Concerns

  • REST API routes without permission callbacks
  • AJAX handlers without auth checks
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Quick-Insight Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Quick-Insight Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface
3 unprotected

Quick-Insight Attack Surface

Entry Points3
Unprotected3

REST API Routes 3

GET/wp-json/quick-insights-api/v1/storagequick-insights.php:90
GET/wp-json/quick-insights-api/v1/active-pluginsquick-insights.php:97
GET/wp-json/quick-insights-api/v1/active-themequick-insights.php:102
WordPress Hooks 3
actionadmin_enqueue_scriptsquick-insights.php:32
actionwp_dashboard_setupquick-insights.php:43
actionrest_api_initquick-insights.php:107
Maintenance & Trust

Quick-Insight Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 5, 2025
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Quick-Insight Developer Profile

Ahsan Riad

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Quick-Insight

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/quick-insights/dist/bundle.js
Script Paths
/wp-content/plugins/quick-insights/dist/bundle.js

HTML / DOM Fingerprints

JS Globals
siteData
REST Endpoints
/wp-json/quick-insights-api/v1/storage/wp-json/quick-insights-api/v1/active-plugins/wp-json/quick-insights-api/v1/active-theme
Shortcode Output
<div id="my-custom-menu-root"></div>
FAQ

Frequently Asked Questions about Quick-Insight