
App Display Page Security & Risk Analysis
wordpress.org/plugins/app-display-pageAdds a shortcode to display information about iOS apps from Apple's App Store.
Is App Display Page Safe to Use in 2026?
Generally Safe
Score 85/100App Display Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'app-display-page' plugin version 1.7.1 exhibits a mixed security posture. On the positive side, it has no recorded vulnerabilities (CVEs) and the static analysis shows no dangerous functions, no raw SQL queries, and no taint flows indicating critical or high severity issues. The absence of critical or high severity taint flows, coupled with the complete absence of known vulnerabilities, suggests a generally well-developed plugin from a defensive programming standpoint.
However, several significant concerns arise from the static analysis. The most alarming is the complete lack of output escaping for all 25 identified outputs. This leaves the plugin highly susceptible to Cross-Site Scripting (XSS) attacks, where malicious scripts could be injected and executed in the user's browser. Furthermore, the plugin lacks any nonce or capability checks for its entry points, including its two shortcodes. This means that any user, regardless of their privileges or if they are authenticated, could potentially trigger actions or display content intended for specific user roles or authenticated sessions, leading to information disclosure or unauthorized functionality execution. The presence of file operations and external HTTP requests without corresponding security checks further amplifies these risks.
While the vulnerability history is a strong positive, the critical weaknesses identified in the code analysis, particularly the complete lack of output escaping and the absence of authentication/authorization checks on its entry points, present immediate and substantial risks. The plugin's strengths in avoiding known vulnerable patterns are overshadowed by these fundamental security oversights that leave it exposed to common web attack vectors. Therefore, immediate attention is required to address these critical issues to improve its overall security.
Key Concerns
- All outputs unescaped
- No nonce checks on entry points
- No capability checks on entry points
- File operations without security checks
- External HTTP requests without security checks
App Display Page Security Vulnerabilities
App Display Page Release Timeline
App Display Page Code Analysis
Output Escaping
App Display Page Attack Surface
Shortcodes 2
WordPress Hooks 5
Maintenance & Trust
App Display Page Maintenance & Trust
Maintenance Signals
Community Trust
App Display Page Alternatives
AppStore Reviews Viewer
appstore-reviews-viewer
Adds a shortcode that displays reviews and ratings of an app from the iOS AppStore’s country you chose.
App Store Assistant
app-store-assistant
Lets you display the detail of an item or an RSS feed from Apple's App Store, iTunes Stores or Amazon.com. Affiliate ready.
AppStore Lookup for WordPress
appstore-lookup
Adds shortcodes that display data from iOS and Mac AppStore applications.
Itunes AppStore App Ranking
itunes-appstore-app-ranking
This plugin lets you add your app's position on the appstore to your blog. Simple add the Apple ID, select genre and range and your on the go.
WP App Store API
wp-app-store-landing-page
The WP App Store API allows you to search the App Store for any app information and use them to display on your site via shortcodes.
App Display Page Developer Profile
3 plugins · 30 total installs
How We Detect App Display Page
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/app-display-page/app-display-page-styles.cssHTML / DOM Fingerprints
app-screenshot<meta name="apple-itunes-app" content="app-id=