WP Quick Provision Security & Risk Analysis

wordpress.org/plugins/wp-quick-provision

This is a powerful provisioning plugin to install multiple themes and plugins automatically by providing them as a list from https://gist.github.com.

20 active installs v3.0.1 PHP + WP + Updated Mar 4, 2021
developmentmanagementprovisionsettingssetup
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Quick Provision Safe to Use in 2026?

Generally Safe

Score 85/100

WP Quick Provision has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "wp-quick-provision" v3.0.1 plugin exhibits a generally good security posture, with no recorded vulnerabilities or CVEs. The static analysis reveals a small attack surface with zero identified entry points that lack authentication. Furthermore, the code demonstrates robust practices by utilizing prepared statements for all SQL queries and showing a high percentage of properly escaped output, indicating an effort to prevent common web vulnerabilities. The absence of dangerous functions and file operations further contributes to its positive security profile. However, a single taint flow with an unsanitized path warrants attention, as this could potentially lead to unforeseen security issues if not handled correctly, despite not being classified as critical or high severity in this analysis. The presence of external HTTP requests, while not inherently a vulnerability, is an area to monitor for potential supply chain risks or unintended data exposure.

Key Concerns

  • Taint flow with unsanitized path detected
  • External HTTP requests present
Vulnerabilities
None known

WP Quick Provision Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Quick Provision Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
27 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
4
Bundled Libraries
0

Output Escaping

71% escaped38 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<wp-quick-provision> (wp-quick-provision.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Quick Provision Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedwp-quick-provision.php:20
actionadmin_enqueue_scriptswp-quick-provision.php:24
actionadmin_menuwp-quick-provision.php:30
actionactivated_pluginwp-quick-provision.php:391
filterplugin_row_metawp-quick-provision.php:398
Maintenance & Trust

WP Quick Provision Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedMar 4, 2021
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings19
Active installs20
Developer Profile

WP Quick Provision Developer Profile

HasinHayder

4 plugins · 440 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Quick Provision

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-quick-provision/assets/css/wpqp.css
Version Parameters
wp-quick-provision/assets/css/wpqp.css?ver=

HTML / DOM Fingerprints

CSS Classes
wpqpwpqp_boxwpqp_box_headerwpqp_box_contentwpqp_formwpqp_hidewpqp_textwpqp_info+2 more
HTML Comments
This block checks if the submitted provision configuration url is valid or not.If it is empty or if the URL doesn't have valid body content, a JOSN object with themes and plugins in itwe're going to redirect the visitor to input it againThis if block hides the form elements, especially gist textbox+11 more
Data Attributes
wpqp_textwpqp_formwpqp_hidewpqp_large_button
FAQ

Frequently Asked Questions about WP Quick Provision