Apple Meta Tags Security & Risk Analysis

wordpress.org/plugins/apple-meta-tags

Helps inserts the Apple Meta Tags you require in the header of your site.

20 active installs v1.0.0 PHP + WP 3.3+ Updated Jan 16, 2014
applemeta-datasebs-studio
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Apple Meta Tags Safe to Use in 2026?

Generally Safe

Score 85/100

Apple Meta Tags has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "apple-meta-tags" plugin v1.0.0 exhibits a generally positive security posture with several strengths. The plugin has no known CVEs, a lack of detected dangerous functions, and all SQL queries are performed using prepared statements, which significantly reduces the risk of SQL injection vulnerabilities. Furthermore, the static analysis found no exploitable attack surface, including AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. Taint analysis also revealed no critical or high severity flows, indicating no obvious pathways for malicious data to be processed unsafely.

However, a significant concern arises from the complete lack of output escaping. With 96 outputs identified and 0% properly escaped, the plugin is highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed to users could potentially be manipulated to inject malicious scripts. Additionally, the absence of nonce and capability checks on potential entry points (though none were identified in this analysis) could leave the plugin vulnerable if its attack surface were to expand in future versions or if it interacted with other components in an unsecure manner. The complete absence of recorded vulnerabilities in its history is a positive sign but does not negate the identified XSS risk.

In conclusion, while the "apple-meta-tags" plugin v1.0.0 appears robust against common vulnerabilities like SQL injection and lacks an immediately exploitable attack surface, the critical lack of output escaping presents a substantial risk of XSS attacks. This single weakness significantly overshadows the otherwise clean analysis. Developers should prioritize addressing the output escaping issue to bring the plugin to a more secure state.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Apple Meta Tags Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Apple Meta Tags Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
96
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped96 total outputs
Attack Surface

Apple Meta Tags Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuapple-meta-tags.php:25
actionadmin_initapple-meta-tags.php:31
actionadmin_enqueue_scriptsapple-meta-tags.php:298
actionwp_headapple-meta-tags.php:383
Maintenance & Trust

Apple Meta Tags Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedJan 16, 2014
PHP min version
Downloads2K

Community Trust

Rating94/100
Number of ratings3
Active installs20
Developer Profile

Apple Meta Tags Developer Profile

Sébastien Dumont

15 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Apple Meta Tags

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="apple_meta_tags_web_app_mode"name="apple_meta_tags_web_app_status_bar_style"name="apple_meta_tags_web_app_title"name="apple_meta_tags_use_viewport"name="apple_meta_tags_viewport"name="apple_meta_tags_telephone"+20 more
JS Globals
wp.media.editor
FAQ

Frequently Asked Questions about Apple Meta Tags