
WP Quick Post Duplicator Security & Risk Analysis
wordpress.org/plugins/wp-quick-post-duplicatorCopy or Duplicate any post types, including pages, taxonomies & custom fields with a single click.
Is WP Quick Post Duplicator Safe to Use in 2026?
Generally Safe
Score 98/100WP Quick Post Duplicator has a strong security track record. Known vulnerabilities have been patched promptly.
The static analysis of wp-quick-post-duplicator v2.2 reveals a strong adherence to secure coding practices. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and proper output escaping all contribute to a generally positive security posture. Furthermore, the plugin implements nonce and capability checks, which are essential for protecting against common web vulnerabilities. The attack surface is impressively small, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without proper authentication or permission callbacks.
Taint analysis shows no critical or high severity flows with unsanitized paths, indicating that user input is likely handled safely within the analyzed code. However, the vulnerability history presents a significant concern. The plugin has a history of two known medium-severity CVEs, with the last one occurring on January 8, 2026. The common vulnerability type being 'Missing Authorization' suggests a recurring pattern of insufficient access control, even though the current static analysis does not reveal immediate exploitable vulnerabilities of this nature. This historical pattern, despite the current positive static analysis, warrants attention.
In conclusion, wp-quick-post-duplicator v2.2 demonstrates good security practices in its current code. The limited attack surface and secure coding implementations are commendable strengths. The primary weakness lies in its historical vulnerability record, specifically regarding missing authorization issues. While the latest analysis doesn't show immediate exploitable flaws, the past indicates a susceptibility to authorization bypasses that users should be aware of, and developers should remain vigilant about. The plugin is currently unpatched for its historical CVEs, which is a critical oversight.
Key Concerns
- Historically unpatched medium CVEs
WP Quick Post Duplicator Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
WP Quick Post Duplicator <= 2.1 - Missing Authorization
WP Quick Post Duplicator <= 2.0 - Missing Authorization
WP Quick Post Duplicator Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP Quick Post Duplicator Attack Surface
WordPress Hooks 2
Maintenance & Trust
WP Quick Post Duplicator Maintenance & Trust
Maintenance Signals
Community Trust
WP Quick Post Duplicator Alternatives
Clone Posts
clone-posts
Easily clone (duplicate) Posts, Pages and Custom Post Types, including their custom fields (post_meta)
Post/Page Import Export – Migrate Content with Custom Fields & Taxonomies
postpage-import-export-with-custom-fields-taxonomies
Export and import WordPress posts & pages as JSON files with full support for custom fields, taxonomies, ACF fields, and featured images.
Duplicate Page Post – MCC
duplicate-post-mycodecare
Easily duplicate posts, pages, and custom post types to streamline your workflow.
Duplicate Post
copy-delete-posts
Duplicate post
Duplicate Page and Post
duplicate-wp-page-post
Duplicate post, Duplicate page and Duplicate custom post or clone page and clone post.
WP Quick Post Duplicator Developer Profile
7 plugins · 8K total installs
How We Detect WP Quick Post Duplicator
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
dashiconsdashicons-heartrel="permalink"