QuickTags Security & Risk Analysis

wordpress.org/plugins/quicktags

Allows for front-end tagging of posts via a simple widget.

10 active installs v0.0.4 PHP + WP 3.0.1+ Updated Feb 12, 2013
autocompletejquery-uiquick-tagstags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is QuickTags Safe to Use in 2026?

Generally Safe

Score 85/100

QuickTags has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "quicktags" plugin version 0.0.4 exhibits a generally positive security posture due to robust use of prepared statements for SQL queries, comprehensive nonce checks, and capability checks for all identified AJAX handlers. There are no known vulnerabilities or CVEs associated with this version, and the plugin avoids dangerous file operations and external HTTP requests, which are common attack vectors. The absence of shortcodes and cron events also limits the potential attack surface.

However, a significant concern arises from the presence of a "dangerous function" signal specifically related to `create_function`. While the static analysis did not identify any taint flows originating from or leading to this function, its mere presence indicates a potential for insecure code execution if not handled with extreme care. Furthermore, the low percentage of properly escaped output (17%) presents a notable risk of Cross-Site Scripting (XSS) vulnerabilities, particularly in the context of user-generated content that might be processed or displayed by the plugin's AJAX handlers. The lack of taint analysis data is also a limitation, as it means deeper, context-aware security risks could be masked.

In conclusion, "quicktags" v0.0.4 benefits from strong foundational security practices like prepared statements and authentication checks on its entry points. Nevertheless, the use of `create_function` and the significantly under-escaped output demand caution. While no active vulnerabilities are known, these code signals suggest that potential weaknesses exist that could be exploited under specific conditions, especially regarding XSS.

Key Concerns

  • Dangerous function detected (create_function)
  • Low percentage of properly escaped output
Vulnerabilities
None known

QuickTags Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

QuickTags Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
10
2 escaped
Nonce Checks
3
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("qt_optionsWidget");'));quicktags.php:41

Output Escaping

17% escaped12 total outputs
Attack Surface

QuickTags Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_searchTagsAJAXqt_optionsWidgetAJAX.php:9
authwp_ajax_addNewTagAJAXqt_optionsWidgetAJAX.php:10
authwp_ajax_removeTagAJAXqt_optionsWidgetAJAX.php:11
WordPress Hooks 1
actionwidgets_initquicktags.php:41
Maintenance & Trust

QuickTags Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedFeb 12, 2013
PHP min version
Downloads3K

Community Trust

Rating96/100
Number of ratings4
Active installs10
Developer Profile

QuickTags Developer Profile

Rafiki

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect QuickTags

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/quicktags/css/qt_optionsWidgetCSS.css/wp-content/plugins/quicktags/css/jquery-ui-theme/jquery-ui-qt.css/wp-content/plugins/quicktags/js/qt_optionsWidget.js

HTML / DOM Fingerprints

CSS Classes
qt_postTagsqt_postTagremoveTag
Data Attributes
data-tagid
JS Globals
qtJSqt_addTagsqt_postID
FAQ

Frequently Asked Questions about QuickTags