Simple Q&A Security & Risk Analysis

wordpress.org/plugins/simple-qa

Simple Plugin to let your users ask questions.

30 active installs v2.1 PHP + WP 3.0+ Updated Jul 4, 2016
answerqaquestionquestion-and-answerquestions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Q&A Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Q&A has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "simple-qa" plugin version 2.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and has no known vulnerabilities (CVEs) recorded. The attack surface is also relatively small, with only one shortcode identified as an entry point, and importantly, no unprotected entry points were found based on the provided data. However, significant concerns arise from the static code analysis. The presence of two instances of the `create_function` function is a major red flag, as this function is deprecated and can be a source of security vulnerabilities if not handled with extreme care. Furthermore, a very low rate of output escaping (7%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-provided or dynamically generated content might be rendered directly in the browser without proper sanitization. The taint analysis, while showing no critical or high severity flows, did identify two flows with unsanitized paths, which, when combined with the poor output escaping, suggests potential for malicious input to be processed in an unsafe manner.

The lack of vulnerability history for this plugin is generally a positive sign, suggesting it hasn't been a target for significant exploitation or that previous versions were well-secured. However, this should not overshadow the immediate risks identified in the code. The plugin's strengths lie in its SQL handling and lack of known exploits, but its weaknesses in output escaping and the use of deprecated, potentially dangerous functions create a considerable risk that needs to be addressed. The developer should prioritize fixing the unescaped output and refactoring the code to avoid `create_function`.

Key Concerns

  • Dangerous function create_function used
  • Low output escaping rate
  • Flows with unsanitized paths found
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Simple Q&A Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Q&A Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
79
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter('wp_mail_content_type', create_function('', 'return "text/html";'));qa-plugin.php:204
create_functionadd_filter('wp_mail_content_type', create_function('', 'return "text/html";'));qa-plugin.php:260

Output Escaping

7% escaped85 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
show_qa (qa-plugin.php:130)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple Q&A Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[qa] qa-plugin.php:307
WordPress Hooks 22
actionplugins_loadedqa-plugin.php:19
actionadmin_noticesqa-plugin.php:34
actioninitqa-plugin.php:77
actioninitqa-plugin.php:80
actioninitqa-plugin.php:83
actioninitqa-plugin.php:112
actioninitqa-plugin.php:115
actioninitqa-plugin.php:118
filterenter_title_hereqa-plugin.php:128
filterwp_mail_content_typeqa-plugin.php:204
filterwp_mail_content_typeqa-plugin.php:260
filtermanage_edit-qa_columnsqa-plugin.php:485
actionmanage_qa_posts_custom_columnqa-plugin.php:527
actionadd_meta_boxesqa-plugin.php:545
actionsave_postqa-plugin.php:573
actionactivity_box_endqa-plugin.php:620
actionadmin_initqa-plugin.php:645
actionadmin_menuqa-plugin.php:647
actionadmin_menuqa-plugin.php:876
actionpublish_qaqa-plugin.php:889
actionwp_headqa-plugin.php:908
actionwp_enqueue_scriptsqa-plugin.php:915
Maintenance & Trust

Simple Q&A Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 4, 2016
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

Simple Q&A Developer Profile

Evgeniy Kutsenko

2 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Q&A

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-qa/css/qa-plugin-rtl.css/wp-content/plugins/simple-qa/css/qa-plugin.css

HTML / DOM Fingerprints

CSS Classes
qa__messageqa__message_successqa__message_danger
Data Attributes
data-posttype
JS Globals
recaptchaCallback
Shortcode Output
[simple_qa]
FAQ

Frequently Asked Questions about Simple Q&A