
Application download banner Security & Risk Analysis
wordpress.org/plugins/application-download-bannerPlugin Description
Is Application download banner Safe to Use in 2026?
Generally Safe
Score 85/100Application download banner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'application-download-banner' plugin, version 1.0.0, exhibits a mixed security posture. On the positive side, the plugin has a zero-attack surface in terms of AJAX handlers, REST API routes, shortcodes, and cron events, indicating no direct points of entry that are typically exploited. Furthermore, it contains no dangerous functions, file operations, external HTTP requests, and has a clean vulnerability history with no recorded CVEs. All SQL queries are also correctly prepared, which is a significant strength.
However, a critical concern arises from the static analysis of code signals. While there are no reported dangerous functions, the lack of any output escaping for 100% of the 15 outputs is a major security weakness. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly rendered on the page. The taint analysis also reveals one flow with an unsanitized path, which, while not currently categorized as critical or high severity, still represents a potential risk that warrants investigation. The absence of nonce and capability checks further amplifies these risks, as there are no built-in mechanisms to prevent unauthorized actions or verify user permissions if an attacker can trigger these unsanitized paths.
In conclusion, the plugin's clean history and lack of direct entry points are commendable. However, the pervasive lack of output escaping and the presence of an unsanitized path, coupled with the absence of essential security checks like nonces and capability checks, present significant security risks. These weaknesses could be exploited, particularly through XSS, if user input is not handled with extreme care, despite the lack of recorded vulnerabilities to date.
Key Concerns
- 100% of outputs are not properly escaped
- Flow with unsanitized path found
- No nonce checks
- No capability checks
Application download banner Security Vulnerabilities
Application download banner Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Application download banner Attack Surface
WordPress Hooks 5
Maintenance & Trust
Application download banner Maintenance & Trust
Maintenance Signals
Community Trust
Application download banner Alternatives
Application Banner (Google PlayStore / AppleStore)
application-banner-google-playstore-applestore
Beschreibung
Add Smart App Banner
add-smart-app-banner
Add a Smart App Banner to your website to increase app installs
Mobile Smart App Banner
mobile-smart-app-banner
Transform your mobile website visitors into app users with intelligent smart app banners that boost downloads across iOS and Android devices.
MobiLoud – Smart App Banners
mobiloud-smart-app-banner
We created this plugin so that you can use Smart App Banners on your WordPress site to boost downloads for your iOS and Android app.
iOS Smart App Banner For Safari
ios-smart-app-banner-for-safari
iOS Smart App Banner For Safari plugin quickly and easily displays app banners for your web users who are using mobile Safari on iOS.
Application download banner Developer Profile
4 plugins · 10K total installs
How We Detect Application download banner
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/application-download-banner/assets/style.css/wp-content/plugins/application-download-banner/assets/script.js/wp-content/plugins/application-download-banner/assets/adminpanel.jsassets/adminpanel.jsassets/script.jsapplication-download-banner/assets/script.js?ver=1.0.0HTML / DOM Fingerprints
adb-top-banneradb-close-banneradb-banner-contentadb-banner-headlineadb-banner-descriptionadb-banner-logoadb-banner-logo-image@@@ START OF FRONT PAGE, IF NOT MOBILE OR MAYBE THIS IS NOT FIRST VISIT @@@@@@@ THEN LOAD USER DATA FROM SAVE THE PLUGIN WILL RETURN FOR EXITING @@@@@@@### JUST FOR TESTING, THIS REMOVE SESSION IF EXISTS ###data-adb_is_activedata-adb_link_googleplaydata-adb_link_appstoredata-adb_link_logodata-adb_link_titledata-adb_link_description+2 moreadb_is_activeadb_link_googleplayadb_link_appstoreadb_link_logoadb_link_titleadb_link_description+2 more