Application download banner Security & Risk Analysis

wordpress.org/plugins/application-download-banner

Plugin Description

0 active installs v1.0.0 PHP + WP 3.5+ Updated Feb 2, 2018
app-bannerapp-store-bannerapplication-bannergoogle-play-bannerios-android-banner
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Application download banner Safe to Use in 2026?

Generally Safe

Score 85/100

Application download banner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'application-download-banner' plugin, version 1.0.0, exhibits a mixed security posture. On the positive side, the plugin has a zero-attack surface in terms of AJAX handlers, REST API routes, shortcodes, and cron events, indicating no direct points of entry that are typically exploited. Furthermore, it contains no dangerous functions, file operations, external HTTP requests, and has a clean vulnerability history with no recorded CVEs. All SQL queries are also correctly prepared, which is a significant strength.

However, a critical concern arises from the static analysis of code signals. While there are no reported dangerous functions, the lack of any output escaping for 100% of the 15 outputs is a major security weakness. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly rendered on the page. The taint analysis also reveals one flow with an unsanitized path, which, while not currently categorized as critical or high severity, still represents a potential risk that warrants investigation. The absence of nonce and capability checks further amplifies these risks, as there are no built-in mechanisms to prevent unauthorized actions or verify user permissions if an attacker can trigger these unsanitized paths.

In conclusion, the plugin's clean history and lack of direct entry points are commendable. However, the pervasive lack of output escaping and the presence of an unsanitized path, coupled with the absence of essential security checks like nonces and capability checks, present significant security risks. These weaknesses could be exploited, particularly through XSS, if user input is not handled with extreme care, despite the lack of recorded vulnerabilities to date.

Key Concerns

  • 100% of outputs are not properly escaped
  • Flow with unsanitized path found
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Application download banner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Application download banner Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
15
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped15 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<admin_form> (admin_form.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Application download banner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuapp-download-banner.php:28
actionadmin_enqueue_scriptsapp-download-banner.php:44
actionwp_headapp-download-banner.php:83
actionwp_headapp-download-banner.php:200
actionwp_enqueue_scriptsapp-download-banner.php:211
Maintenance & Trust

Application download banner Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedFeb 2, 2018
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Application download banner Developer Profile

קידום ובניית אתרים

4 plugins · 10K total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Application download banner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/application-download-banner/assets/style.css/wp-content/plugins/application-download-banner/assets/script.js/wp-content/plugins/application-download-banner/assets/adminpanel.js
Script Paths
assets/adminpanel.jsassets/script.js
Version Parameters
application-download-banner/assets/script.js?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
adb-top-banneradb-close-banneradb-banner-contentadb-banner-headlineadb-banner-descriptionadb-banner-logoadb-banner-logo-image
HTML Comments
@@@ START OF FRONT PAGE, IF NOT MOBILE OR MAYBE THIS IS NOT FIRST VISIT @@@@@@@ THEN LOAD USER DATA FROM SAVE THE PLUGIN WILL RETURN FOR EXITING @@@@@@@### JUST FOR TESTING, THIS REMOVE SESSION IF EXISTS ###
Data Attributes
data-adb_is_activedata-adb_link_googleplaydata-adb_link_appstoredata-adb_link_logodata-adb_link_titledata-adb_link_description+2 more
JS Globals
adb_is_activeadb_link_googleplayadb_link_appstoreadb_link_logoadb_link_titleadb_link_description+2 more
FAQ

Frequently Asked Questions about Application download banner