App Display Page Security & Risk Analysis

wordpress.org/plugins/app-display-page

Adds a shortcode to display information about iOS apps from Apple's App Store.

10 active installs v1.7.1 PHP + WP 2.7+ Updated Aug 23, 2013
app-storeappsappstoreiositunes
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is App Display Page Safe to Use in 2026?

Generally Safe

Score 85/100

App Display Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'app-display-page' plugin version 1.7.1 exhibits a mixed security posture. On the positive side, it has no recorded vulnerabilities (CVEs) and the static analysis shows no dangerous functions, no raw SQL queries, and no taint flows indicating critical or high severity issues. The absence of critical or high severity taint flows, coupled with the complete absence of known vulnerabilities, suggests a generally well-developed plugin from a defensive programming standpoint.

However, several significant concerns arise from the static analysis. The most alarming is the complete lack of output escaping for all 25 identified outputs. This leaves the plugin highly susceptible to Cross-Site Scripting (XSS) attacks, where malicious scripts could be injected and executed in the user's browser. Furthermore, the plugin lacks any nonce or capability checks for its entry points, including its two shortcodes. This means that any user, regardless of their privileges or if they are authenticated, could potentially trigger actions or display content intended for specific user roles or authenticated sessions, leading to information disclosure or unauthorized functionality execution. The presence of file operations and external HTTP requests without corresponding security checks further amplifies these risks.

While the vulnerability history is a strong positive, the critical weaknesses identified in the code analysis, particularly the complete lack of output escaping and the absence of authentication/authorization checks on its entry points, present immediate and substantial risks. The plugin's strengths in avoiding known vulnerable patterns are overshadowed by these fundamental security oversights that leave it exposed to common web attack vectors. Therefore, immediate attention is required to address these critical issues to improve its overall security.

Key Concerns

  • All outputs unescaped
  • No nonce checks on entry points
  • No capability checks on entry points
  • File operations without security checks
  • External HTTP requests without security checks
Vulnerabilities
None known

App Display Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

App Display Page Release Timeline

v1.7.1Current
v1.7
v1.6
v1.4.1
v1.4
v1.3.1
v1.3
Code Analysis
Analyzed Mar 17, 2026

App Display Page Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
25
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped25 total outputs
Attack Surface

App Display Page Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[ios-app] app-display-page.php:32
[ios_app] app-display-page.php:33
WordPress Hooks 5
actionadmin_initapp-display-page-admin.php:6
actionadmin_menuapp-display-page-admin.php:7
actionwp_print_stylesapp-display-page.php:34
actioninitapp-display-page.php:35
actionwp_headapp-display-page.php:39
Maintenance & Trust

App Display Page Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedAug 23, 2013
PHP min version
Downloads4K

Community Trust

Rating86/100
Number of ratings3
Active installs10
Developer Profile

App Display Page Developer Profile

mjar81

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect App Display Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/app-display-page/app-display-page-styles.css

HTML / DOM Fingerprints

CSS Classes
app-screenshot
Shortcode Output
<meta name="apple-itunes-app" content="app-id=
FAQ

Frequently Asked Questions about App Display Page