
Add To Home Screen Security & Risk Analysis
wordpress.org/plugins/add-to-home-screenMake your WordPress sites to appear in the home screen of mobile devices.
Is Add To Home Screen Safe to Use in 2026?
Generally Safe
Score 85/100Add To Home Screen has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "add-to-home-screen" plugin version 0.3.1 exhibits a generally positive security posture based on the static analysis, with a notable absence of identified dangerous functions, SQL injection vulnerabilities, and external HTTP requests. The attack surface is minimal, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and critically, none of these entry points are unprotected. Taint analysis also found no issues with unsanitized paths. The plugin's vulnerability history is clean, with zero known CVEs, suggesting a history of secure development or limited exposure.
However, a significant concern arises from the complete lack of output escaping. With 15 identified output points and 0% properly escaped, this presents a high risk for Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is directly outputted by the plugin could be manipulated by an attacker to inject malicious scripts into the user's browser. Additionally, the absence of any nonce checks or capability checks, while not directly exploited in the current attack surface, indicates a lack of robust authorization and verification mechanisms that could be exploited if new entry points were introduced or existing ones modified without proper security considerations.
In conclusion, while the plugin is free from common and critical vulnerabilities like SQL injection and lacks a large attack surface, the pervasive lack of output escaping is a severe weakness that needs immediate attention. The absence of nonce and capability checks, though not an immediate exploit, points to areas where security best practices are not being followed, potentially leading to future vulnerabilities. Addressing the output escaping is paramount to mitigating XSS risks.
Key Concerns
- No output escaping
- No nonce checks
- No capability checks
Add To Home Screen Security Vulnerabilities
Add To Home Screen Code Analysis
Output Escaping
Add To Home Screen Attack Surface
WordPress Hooks 5
Maintenance & Trust
Add To Home Screen Maintenance & Trust
Maintenance Signals
Community Trust
Add To Home Screen Alternatives
Super Progressive Web Apps
super-progressive-web-apps
SuperPWA helps you convert your WordPress website into a Progressive Web App instantly.
PWA
pwa
WordPress feature plugin to bring Progressive Web App (PWA) capabilities to Core
PWA for WP – Progressive Web Apps Made Simple
pwa-for-wp
PWA plugin is bringing the power of the Progressive Web Apps to the WP & AMP to take the user experience to the next level.
PWA — easy way to Progressive Web App
iworks-pwa
Your easy way to Progressive Web Application.
Hyper PWA
hyper-pwa
Provide Manifest and Service Worker, convert WordPress into Progressive Web Apps (PWA).
Add To Home Screen Developer Profile
3 plugins · 220 total installs
How We Detect Add To Home Screen
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/add-to-home-screen/lib/js/options-page.js/wp-content/plugins/add-to-home-screen/lib/js/options-page.jsHTML / DOM Fingerprints
color-pickershort-texticon-previewname="add-to-homescreen[type]"name="add-to-homescreen[value]"name="add-to-homescreen_theme-color"name="add-to-homescreen_icon[mime]"name="add-to-homescreen_icon[url]"wp.colorPickerwindow.send_to_editor