WP Quick Push Security & Risk Analysis

wordpress.org/plugins/wp-quick-push

Quickly send notification to Push enabled devices from WordPress dashboard.

10 active installs v2.0.1 PHP + WP 4.3+ Updated Sep 2, 2017
mobile-pushonesignal-compushpush-notificationwordpress-push
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Quick Push Safe to Use in 2026?

Generally Safe

Score 85/100

WP Quick Push has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "wp-quick-push" v2.0.1 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, and there are no known CVEs associated with it. The code also demonstrates good practices regarding SQL queries, utilizing prepared statements for all identified queries. However, there are notable areas of concern. The low percentage of properly escaped output (33%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the two identified "flows with unsanitized paths" in the taint analysis, even without critical or high severity, indicate potential pathways for malicious input to be processed without adequate sanitization, which could lead to unintended behavior or vulnerabilities depending on how those paths are utilized internally. The presence of an external HTTP request without explicit mention of authentication or sanitization around its parameters also warrants caution. While the lack of vulnerability history is a strength, the current code analysis reveals weaknesses that, if exploited, could be severe.

Key Concerns

  • Low output escaping percentage
  • Unsanitized paths in taint flows
  • External HTTP request without context
Vulnerabilities
None known

WP Quick Push Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Quick Push Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

33% escaped21 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
<quickpush_sender> (includes\quickpush_sender.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Quick Push Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_noticesindex.php:27
actionadmin_noticesindex.php:35
actionadmin_initindex.php:65
actionadmin_menuindex.php:66
Maintenance & Trust

WP Quick Push Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedSep 2, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Quick Push Developer Profile

Aky

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Quick Push

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-quick-push/css/quickpush-style.css/wp-content/plugins/wp-quick-push/js/quickpush-scripts.js
Script Paths
/wp-content/plugins/wp-quick-push/js/quickpush-scripts.js
Version Parameters
wp-quick-push/css/quickpush-style.css?ver=wp-quick-push/js/quickpush-scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
quickpush-curl-alertquickpush-warn
Data Attributes
data-quickpush-titledata-quickpush-contentdata-quickpush-urldata-quickpush-segments
FAQ

Frequently Asked Questions about WP Quick Push