Quick Preloader Security & Risk Analysis

wordpress.org/plugins/quick-preloader

This plugin will enable custom background color and custom preloader image url in your wordpress site.

10 active installs v1.0 PHP + WP 3.4.0+ Updated Sep 21, 2016
preloadpreloaderpreloader-optionsquickquick-preloader
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Quick Preloader Safe to Use in 2026?

Generally Safe

Score 85/100

Quick Preloader has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "quick-preloader" v1.0 plugin exhibits a generally positive security posture based on the provided static analysis and vulnerability history. There are no identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication. Furthermore, the code does not appear to utilize dangerous functions or perform file operations, and it avoids external HTTP requests. The adherence to prepared statements for all SQL queries is a significant strength, demonstrating good practice in preventing SQL injection vulnerabilities.

However, a critical concern arises from the output escaping analysis, where 0% of the 5 total outputs are properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by the plugin could potentially be manipulated by an attacker to inject malicious scripts, which could then be executed in the context of a user's browser. The absence of nonce and capability checks, while not directly exploitable due to the lack of exposed entry points, indicates a potential weakness if entry points were to be added in the future without proper security measures.

The plugin's vulnerability history is clean, with no known CVEs or recorded past vulnerabilities. This suggests a generally well-maintained codebase or a low profile that hasn't attracted significant security scrutiny. Nevertheless, the identified output escaping issues represent a tangible and immediate risk that needs to be addressed. The overall security is decent due to the minimal attack surface and clean history, but the lack of output escaping severely undermines it.

Key Concerns

  • Unescaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Quick Preloader Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Quick Preloader Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Quick Preloader Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitquick-preloader.php:19
actionadmin_menuquick-preloader.php:26
actionadmin_enqueue_scriptsquick-preloader.php:29
actionadmin_initquick-preloader.php:48
actionwp_footerquick-preloader.php:154
actionwp_footerquick-preloader.php:158
Maintenance & Trust

Quick Preloader Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedSep 21, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Quick Preloader Developer Profile

Sumon Hasan

3 plugins · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Quick Preloader

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/quick-preloader/js/color-pickr.js

HTML / DOM Fingerprints

CSS Classes
wpd-color-fieldwpd-color-fields
JS Globals
jQuery
FAQ

Frequently Asked Questions about Quick Preloader