
WT Quick Reorder Security & Risk Analysis
wordpress.org/plugins/wt-quick-reorderWoo Quick Reorder Plugin simplifies reordering by letting customers quickly access and repurchase past orders, enhancing their shopping experience.
Is WT Quick Reorder Safe to Use in 2026?
Generally Safe
Score 92/100WT Quick Reorder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wt-quick-reorder" plugin v1.0.1 demonstrates a strong security posture with several good practices in place. Notably, all identified AJAX and REST API entry points appear to have appropriate authentication or permission checks, and all SQL queries are executed using prepared statements, mitigating common injection risks. The plugin also implements nonce checks for its entry points, further hardening it against common web attacks. The absence of file operations and external HTTP requests also reduces the potential attack surface.
However, a key area of concern lies in the output escaping. With 74% of outputs properly escaped, a significant portion (26%) remains potentially unescaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled correctly before being displayed. The taint analysis shows two flows with unsanitized paths, which, while not flagged as critical or high severity, warrant careful investigation as they could represent potential vectors for exploitation depending on the data flow. The plugin's clean vulnerability history is a positive indicator, suggesting it has not historically been a source of major security flaws.
In conclusion, "wt-quick-reorder" v1.0.1 is generally well-secured, with a proactive approach to handling SQL and authentication. The primary weakness is the incomplete output escaping, which should be addressed to prevent potential XSS vulnerabilities. The unsanitized paths identified in the taint analysis also require attention to ensure they do not pose a risk.
Key Concerns
- Significant portion of output escaping is not proper
- Taint analysis shows unsanitized paths
WT Quick Reorder Security Vulnerabilities
WT Quick Reorder Release Timeline
WT Quick Reorder Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
WT Quick Reorder Attack Surface
AJAX Handlers 4
Shortcodes 1
WordPress Hooks 36
Maintenance & Trust
WT Quick Reorder Maintenance & Trust
Maintenance Signals
Community Trust
WT Quick Reorder Alternatives
Simple Custom Post Order
simple-custom-post-order
Easily reorder posts, pages, custom post types, and taxonomies with intuitive drag-and-drop sorting in the WordPress admin.
Rearrange Products for WooCommerce
rearrange-woocommerce-products
Boost WooCommerce sales with the Rearrange Products for WooCommerce plugin. Easily reorder products with a simple drag-and-drop tool!
Reorder Posts
metronet-reorder-posts
A simple and easy way to reorder your custom post types in WordPress.
Pre-Orders for WooCommerce
pre-orders-for-woocommerce
Ultimate Pre-Orders Plugin for WooCommerce.
ReOrder Posts within Categories
reorder-post-within-categories
Enables manual ranking of post (and custom post) within taxonomy terms using a drag & drop grid interface.
WT Quick Reorder Developer Profile
4 plugins · 30 total installs
How We Detect WT Quick Reorder
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wt-quick-reorder/admin/css/wt-quick-reorder-admin.css/wp-content/plugins/wt-quick-reorder/admin/js/wt-quick-reorder-admin.js/wp-content/plugins/wt-quick-reorder/admin/js/wt-quick-reorder-admin.jswt-quick-reorder/admin/css/wt-quick-reorder-admin.css?ver=wt-quick-reorder/admin/js/wt-quick-reorder-admin.js?ver=HTML / DOM Fingerprints
wt-panel-settingswt-submitloader-ellipsistextraction-wrappertextid="wt-panel-settings"id="plugin-data"name="reset"name="submit"/wp-ajax-urlwt-quick-reorder_datasavewt-quick-reorder_datareset