WP Quick Post Duplicator Security & Risk Analysis

wordpress.org/plugins/wp-quick-post-duplicator

Copy or Duplicate any post types, including pages, taxonomies & custom fields with a single click.

3K active installs v2.2 PHP + WP 3.0+ Updated Jan 1, 2026
clone-pagecopy-postwordpress-page-duplicatewordpress-page-duplicatorwordpress-post-duplicate
98
A · Safe
CVEs total2
Unpatched0
Last CVEJan 8, 2026
Safety Verdict

Is WP Quick Post Duplicator Safe to Use in 2026?

Generally Safe

Score 98/100

WP Quick Post Duplicator has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Jan 8, 2026Updated 3mo ago
Risk Assessment

The static analysis of wp-quick-post-duplicator v2.2 reveals a strong adherence to secure coding practices. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and proper output escaping all contribute to a generally positive security posture. Furthermore, the plugin implements nonce and capability checks, which are essential for protecting against common web vulnerabilities. The attack surface is impressively small, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without proper authentication or permission callbacks.

Taint analysis shows no critical or high severity flows with unsanitized paths, indicating that user input is likely handled safely within the analyzed code. However, the vulnerability history presents a significant concern. The plugin has a history of two known medium-severity CVEs, with the last one occurring on January 8, 2026. The common vulnerability type being 'Missing Authorization' suggests a recurring pattern of insufficient access control, even though the current static analysis does not reveal immediate exploitable vulnerabilities of this nature. This historical pattern, despite the current positive static analysis, warrants attention.

In conclusion, wp-quick-post-duplicator v2.2 demonstrates good security practices in its current code. The limited attack surface and secure coding implementations are commendable strengths. The primary weakness lies in its historical vulnerability record, specifically regarding missing authorization issues. While the latest analysis doesn't show immediate exploitable flaws, the past indicates a susceptibility to authorization bypasses that users should be aware of, and developers should remain vigilant about. The plugin is currently unpatched for its historical CVEs, which is a critical oversight.

Key Concerns

  • Historically unpatched medium CVEs
Vulnerabilities
2

WP Quick Post Duplicator Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2026-24387medium · 4.3Missing Authorization

WP Quick Post Duplicator <= 2.1 - Missing Authorization

Jan 8, 2026 Patched in 2.2 (27d)
CVE-2023-31214medium · 5.4Missing Authorization

WP Quick Post Duplicator <= 2.0 - Missing Authorization

Jul 25, 2023 Patched in 2.1 (183d)
Code Analysis
Analyzed Mar 16, 2026

WP Quick Post Duplicator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
2 escaped
Nonce Checks
1
Capability Checks
5
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

100% escaped2 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
apj_duplicate_post_as_a_draft (wp-quick-post-duplicator.php:86)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Quick Post Duplicator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_action_apj_duplicate_post_as_a_draftwp-quick-post-duplicator.php:184
filterplugin_row_metawp-quick-post-duplicator.php:196
Maintenance & Trust

WP Quick Post Duplicator Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJan 1, 2026
PHP min version
Downloads22K

Community Trust

Rating60/100
Number of ratings2
Active installs3K
Developer Profile

WP Quick Post Duplicator Developer Profile

Arul Prasad J

7 plugins · 8K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
95 days
View full developer profile
Detection Fingerprints

How We Detect WP Quick Post Duplicator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
dashiconsdashicons-heart
Data Attributes
rel="permalink"
FAQ

Frequently Asked Questions about WP Quick Post Duplicator