Run SQL Query Security & Risk Analysis

wordpress.org/plugins/run-sql-query

Run SQL Query is a simple plugin to quickly execute any type of SQL query into the WordPress's DB and export the results in a CSV format file.

700 active installs v1.0.0 PHP + WP 4.4+ Updated Aug 1, 2016
admindatabasemanagerquerysql
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Run SQL Query Safe to Use in 2026?

Generally Safe

Score 85/100

Run SQL Query has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "run-sql-query" plugin v1.0.0 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and avoids file operations or external HTTP requests. The absence of known CVEs and a clean vulnerability history also suggest a generally stable codebase up to this point. However, a significant concern arises from the presence of one unprotected AJAX handler, which represents a direct entry point into the plugin's functionality without any authentication or authorization checks. While no critical taint flows were detected and dangerous functions are absent, this unprotected AJAX handler creates a potential avenue for unauthorized actions if malicious data can be passed to it.

Despite the lack of historical vulnerabilities, the single unprotected AJAX endpoint is a glaring weakness. It's crucial for plugins to implement proper nonce and capability checks on all AJAX actions to prevent cross-site request forgery (CSRF) and unauthorized privilege escalation. The plugin's static analysis shows a nonce check exists, but its application to the unprotected AJAX handler is not explicitly stated and is a critical omission if not properly implemented. In conclusion, while the plugin has avoided major security pitfalls historically and in its core SQL handling, the unprotected AJAX handler introduces a tangible risk that requires immediate attention to ensure robust security.

Key Concerns

  • Unprotected AJAX handler
  • Output escaping partially insufficient
Vulnerabilities
None known

Run SQL Query Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Run SQL Query Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface
1 unprotected

Run SQL Query Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_run_sql_queryincludes\class-run-sql-query.php:98
WordPress Hooks 3
actionadmin_menuincludes\class-run-sql-query.php:92
actionadmin_print_styles-tools_page_run-sql-queryincludes\class-run-sql-query.php:94
actionadmin_print_scripts-tools_page_run-sql-queryincludes\class-run-sql-query.php:96
Maintenance & Trust

Run SQL Query Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedAug 1, 2016
PHP min version
Downloads14K

Community Trust

Rating100/100
Number of ratings1
Active installs700
Developer Profile

Run SQL Query Developer Profile

Fabricio Carella

1 plugin · 700 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Run SQL Query

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/run-sql-query/admin/css/run-sql-query-admin.css/wp-content/plugins/run-sql-query/admin/js/run-sql-query-admin.js/wp-content/plugins/run-sql-query/admin/js/jquery.jsontotable.min.js
Script Paths
/wp-content/plugins/run-sql-query/admin/js/run-sql-query-admin.js/wp-content/plugins/run-sql-query/admin/js/jquery.jsontotable.min.js
Version Parameters
run-sql-query/css/run-sql-query-admin.css?ver=run-sql-query/js/run-sql-query-admin.js?ver=jquery.jsontotable.min.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Run SQL Query