Request For Quote Security & Risk Analysis

wordpress.org/plugins/wpheka-request-for-quote

Request For Quote plugin allows your customers to submit quotes for any product and negotiate with you for the best price.

10 active installs v1.7.1 PHP + WP 4.8+ Updated Feb 12, 2026
quoterequest-a-quoterequest-a-quote-buttonwoocommerce-request-a-quote-shortcodewoocommerce-request-for-quote
99
A · Safe
CVEs total1
Unpatched0
Last CVEJul 5, 2021
Safety Verdict

Is Request For Quote Safe to Use in 2026?

Generally Safe

Score 99/100

Request For Quote has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jul 5, 2021Updated 3mo ago
Risk Assessment

The "wpheka-request-for-quote" plugin version 1.7.1 exhibits a generally strong security posture based on the provided static analysis. The plugin effectively utilizes prepared statements for all SQL queries, demonstrates excellent output escaping with 97% of outputs properly handled, and avoids dangerous functions, file operations, and external HTTP requests. The absence of any unsanitized paths in the taint analysis is also a positive indicator. However, a notable concern is the complete lack of capability checks across all entry points, which, despite the presence of nonce checks on some AJAX handlers, leaves room for potential privilege escalation or unauthorized actions if an attacker can bypass nonce verification or find alternative ways to trigger actions.

The plugin's vulnerability history shows a single high-severity Cross-Site Request Forgery (CSRF) vulnerability reported in 2021. The fact that this vulnerability is now patched is a positive sign, but it highlights a historical weakness in protecting against CSRF attacks. The absence of critical or medium vulnerabilities is encouraging, but the prior high-severity CSRF suggests that careful review of user input and state-changing actions is crucial for this plugin.

In conclusion, "wpheka-request-for-quote" v1.7.1 has solid technical safeguards in place regarding SQL and output handling. The primary weakness lies in the absence of robust authorization checks (capability checks). While past vulnerabilities have been addressed, the CSRF history should prompt vigilance. The plugin can be considered reasonably secure, but the lack of capability checks on its entry points presents a potential area for improvement.

Key Concerns

  • Missing capability checks on entry points
  • Past high severity CSRF vulnerability
Vulnerabilities
1 published

Request For Quote Security Vulnerabilities

CVEs by Year

1 CVE in 2021
2021
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

WF-8429148b-e28e-4bb3-bd18-390216b74dc4-wpheka-request-for-quotehigh · 8.8Cross-Site Request Forgery (CSRF)

Request for Quote < 1.3 - Cross-Site Request Forgery

Jul 5, 2021 Patched in 1.3 (932d)
Code Analysis
Analyzed Apr 16, 2026

Request For Quote Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
14 prepared
Unescaped Output
5
192 escaped
Nonce Checks
6
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared14 total queries

Output Escaping

97% escaped197 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
action_save_wpheka_rfq_plugin_data (includes/class-wpheka-rfq-ajax.php:55)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Request For Quote Attack Surface

Entry Points12
Unprotected0

AJAX Handlers 11

authwp_ajax_save_wpheka_rfq_plugin_dataincludes/class-wpheka-rfq-ajax.php:28
authwp_ajax_wpheka_add_to_quoteincludes/class-wpheka-rfq-ajax.php:31
noprivwp_ajax_wpheka_add_to_quoteincludes/class-wpheka-rfq-ajax.php:32
authwp_ajax_wpheka_add_to_quote_shopincludes/class-wpheka-rfq-ajax.php:34
noprivwp_ajax_wpheka_add_to_quote_shopincludes/class-wpheka-rfq-ajax.php:35
authwp_ajax_update_rfq_listincludes/class-wpheka-rfq-ajax.php:38
noprivwp_ajax_update_rfq_listincludes/class-wpheka-rfq-ajax.php:39
authwp_ajax_remove_item_from_rfq_listincludes/class-wpheka-rfq-ajax.php:42
noprivwp_ajax_remove_item_from_rfq_listincludes/class-wpheka-rfq-ajax.php:43
authwp_ajax_send_rfq_listincludes/class-wpheka-rfq-ajax.php:46
noprivwp_ajax_send_rfq_listincludes/class-wpheka-rfq-ajax.php:47

Shortcodes 1

[wpheka_request_for_quote] includes/class-wpheka-rfq-shortcodes.php:27
WordPress Hooks 23
actionadmin_menuincludes/admin/class-wpheka-rfq-admin.php:29
actionadmin_enqueue_scriptsincludes/admin/class-wpheka-rfq-admin.php:32
actionwp_enqueue_scriptsincludes/class-wpheka-rfq-frontend.php:30
actionwoocommerce_before_add_to_cart_buttonincludes/class-wpheka-rfq-frontend.php:35
actionwoocommerce_after_add_to_cart_buttonincludes/class-wpheka-rfq-frontend.php:39
actionwoocommerce_single_product_summaryincludes/class-wpheka-rfq-frontend.php:41
actionwpheka_after_rfq_listincludes/class-wpheka-rfq-frontend.php:46
actionwpheka_rfq_content_startincludes/class-wpheka-rfq-frontend.php:48
actionwpheka_rfq_content_endincludes/class-wpheka-rfq-frontend.php:50
actionwpincludes/class-wpheka-rfq-frontend.php:53
actionwoocommerce_after_shop_loop_itemincludes/class-wpheka-rfq-frontend.php:56
filterwoocommerce_loop_add_to_cart_linkincludes/class-wpheka-rfq-frontend.php:78
filterwoocommerce_get_price_htmlincludes/class-wpheka-rfq-frontend.php:88
filterwoocommerce_variable_price_htmlincludes/class-wpheka-rfq-frontend.php:89
filterwoocommerce_variable_sale_price_htmlincludes/class-wpheka-rfq-frontend.php:90
filterwoocommerce_grouped_price_htmlincludes/class-wpheka-rfq-frontend.php:91
actionshutdownincludes/class-wpheka-rfq-session-handler.php:73
actionwp_logoutincludes/class-wpheka-rfq-session-handler.php:74
filternonce_user_logged_outincludes/class-wpheka-rfq-session-handler.php:77
actioninitincludes/class-wpheka-rfq.php:121
actioninitincludes/class-wpheka-rfq.php:122
filterwoocommerce_email_classesincludes/class-wpheka-rfq.php:123
actionbefore_woocommerce_initincludes/class-wpheka-rfq.php:124
Maintenance & Trust

Request For Quote Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 12, 2026
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Request For Quote Developer Profile

akshayaswaroop

5 plugins · 2K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
932 days
View full developer profile
Detection Fingerprints

How We Detect Request For Quote

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpheka-request-for-quote/assets/admin/css/admin.css/wp-content/plugins/wpheka-request-for-quote/assets/admin/css/common.css/wp-content/plugins/wpheka-request-for-quote/assets/admin/js/plugin-loader.js/wp-content/plugins/wpheka-request-for-quote/assets/admin/js/admin-settings.js
Version Parameters
wpheka-request-for-quote/assets/admin/css/admin.css?ver=wpheka-request-for-quote/assets/admin/css/common.css?ver=wpheka-request-for-quote/assets/admin/js/plugin-loader.js?ver=wpheka-request-for-quote/assets/admin/js/admin-settings.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpheka-page-barwpheka-page-wrapperwpheka-sidebarwpheka-main-contentwpheka-boxwpheka-box-title-barwpheka-box-content
HTML Comments
=== Duplicate Items Hack ===
Data Attributes
wpheka-page-barwpheka-page-wrapperwpheka-sidebarwpheka-main-contentwpheka-boxwpheka-box-title-bar+1 more
JS Globals
wpheka_admin_params
FAQ

Frequently Asked Questions about Request For Quote