
Request For Quote Security & Risk Analysis
wordpress.org/plugins/wpheka-request-for-quoteRequest For Quote plugin allows your customers to submit quotes for any product and negotiate with you for the best price.
Is Request For Quote Safe to Use in 2026?
Generally Safe
Score 99/100Request For Quote has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "wpheka-request-for-quote" plugin version 1.7.1 exhibits a generally strong security posture based on the provided static analysis. The plugin effectively utilizes prepared statements for all SQL queries, demonstrates excellent output escaping with 97% of outputs properly handled, and avoids dangerous functions, file operations, and external HTTP requests. The absence of any unsanitized paths in the taint analysis is also a positive indicator. However, a notable concern is the complete lack of capability checks across all entry points, which, despite the presence of nonce checks on some AJAX handlers, leaves room for potential privilege escalation or unauthorized actions if an attacker can bypass nonce verification or find alternative ways to trigger actions.
The plugin's vulnerability history shows a single high-severity Cross-Site Request Forgery (CSRF) vulnerability reported in 2021. The fact that this vulnerability is now patched is a positive sign, but it highlights a historical weakness in protecting against CSRF attacks. The absence of critical or medium vulnerabilities is encouraging, but the prior high-severity CSRF suggests that careful review of user input and state-changing actions is crucial for this plugin.
In conclusion, "wpheka-request-for-quote" v1.7.1 has solid technical safeguards in place regarding SQL and output handling. The primary weakness lies in the absence of robust authorization checks (capability checks). While past vulnerabilities have been addressed, the CSRF history should prompt vigilance. The plugin can be considered reasonably secure, but the lack of capability checks on its entry points presents a potential area for improvement.
Key Concerns
- Missing capability checks on entry points
- Past high severity CSRF vulnerability
Request For Quote Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Request for Quote < 1.3 - Cross-Site Request Forgery
Request For Quote Release Timeline
Request For Quote Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Request For Quote Attack Surface
AJAX Handlers 11
Shortcodes 1
WordPress Hooks 23
Maintenance & Trust
Request For Quote Maintenance & Trust
Maintenance Signals
Community Trust
Request For Quote Alternatives
YITH Request a Quote for WooCommerce
yith-woocommerce-request-a-quote
The YITH Request a Quote for WooCommerce plugin lets your customers ask for an estimate of a list of products they are interested into.
Appsila WooQuote
appsila-wooquote
Appsila WooQuote is a plugin that enables your customers send quote requests from your woocommerce shop which will then be tracked in a full functiona …
Request a Quote for WooCommerce – Get a Quote Button
get-a-quote-button-for-woocommerce
Request a Quote for WooCommerce and Elementor plugin shows a Contact Form 7 or WPForms popup on button click. Quote for WooCommerce, price on request.
ELEX WooCommerce Request a Quote
elex-request-a-quote
ELEX Request a Quote plugin allows your customers to add products to a quote list, fill out a form, and request a custom price.
B2B Request a Quote
woo-add-to-quote
Add B2B quote requests to WooCommerce. Let your customers request, manage, and negotiate quotes comfortably to boost B2B sales on your WordPress site.
Request For Quote Developer Profile
5 plugins · 2K total installs
How We Detect Request For Quote
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wpheka-request-for-quote/assets/admin/css/admin.css/wp-content/plugins/wpheka-request-for-quote/assets/admin/css/common.css/wp-content/plugins/wpheka-request-for-quote/assets/admin/js/plugin-loader.js/wp-content/plugins/wpheka-request-for-quote/assets/admin/js/admin-settings.jswpheka-request-for-quote/assets/admin/css/admin.css?ver=wpheka-request-for-quote/assets/admin/css/common.css?ver=wpheka-request-for-quote/assets/admin/js/plugin-loader.js?ver=wpheka-request-for-quote/assets/admin/js/admin-settings.js?ver=HTML / DOM Fingerprints
wpheka-page-barwpheka-page-wrapperwpheka-sidebarwpheka-main-contentwpheka-boxwpheka-box-title-barwpheka-box-content=== Duplicate Items Hack ===wpheka-page-barwpheka-page-wrapperwpheka-sidebarwpheka-main-contentwpheka-boxwpheka-box-title-bar+1 morewpheka_admin_params