AppStore Links Security & Risk Analysis

wordpress.org/plugins/appstore

Plugin for easy linking to (Mac) AppStore Apps. You can use the PGH-ID for automatically creating Affiliate-Links

10 active installs v4.5.2 PHP + WP 2.8.0+ Updated Feb 26, 2014
affiliateappstoreipadiphoneipod
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AppStore Links Safe to Use in 2026?

Generally Safe

Score 85/100

AppStore Links has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "appstore" plugin version 4.5.2 presents a mixed security posture. On the positive side, there are no reported vulnerabilities (CVEs) in its history, suggesting a generally stable and well-maintained codebase. Furthermore, the plugin does not rely on bundled libraries, which can often introduce security risks if outdated. The majority of SQL queries (86%) utilize prepared statements, indicating a good practice in database interaction to prevent SQL injection.

However, significant concerns arise from the static analysis. The most alarming finding is the complete lack of nonce checks and capability checks across all entry points. This means that any user, regardless of their privileges, can trigger actions through the plugin's shortcodes. Additionally, the output escaping is severely lacking, with only 3% of outputs being properly escaped. This opens the door to cross-site scripting (XSS) vulnerabilities, where malicious code could be injected and executed in the user's browser. The taint analysis also identified four flows with unsanitized paths, which, while not classified as critical or high severity, still represent potential security weaknesses in how file paths are handled.

In conclusion, while the absence of known vulnerabilities is a strong positive, the critical omissions of nonce and capability checks, coupled with poor output escaping and unsanitized path handling, create a substantial attack surface that is not adequately protected. The plugin's reliance on shortcodes as its sole entry point, without any authentication or authorization, is a particularly dangerous oversight that requires immediate attention.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
  • Low percentage of properly escaped output
  • Unsanitized paths found in taint analysis
  • SQL queries with potential for raw execution (14%)
Vulnerabilities
None known

AppStore Links Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AppStore Links Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
6 prepared
Unescaped Output
35
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
7
External Requests
1
Bundled Libraries
0

SQL Query Safety

86% prepared7 total queries

Output Escaping

3% escaped36 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
insertStatistik (AppFunctions.php:244)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AppStore Links Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[app] AppStore.php:712
[appext] AppStore.php:713
[appimg] AppStore.php:714
WordPress Hooks 13
actionadmin_menuAppStore.php:463
filtermce_external_pluginsAppStore.php:705
filtermce_buttonsAppStore.php:706
actionwp_print_scriptsAppStore.php:708
actionwp_headAppStore.php:709
actionadmin_headAppStore.php:710
filtercomment_textAppStore.php:716
filterthe_content_rssAppStore.php:717
filterrewrite_rules_arrayrewrite.php:2
filterquery_varsrewrite.php:3
filterinitrewrite.php:4
actionwp_headwidget.php:10
actioninitwidget.php:196
Maintenance & Trust

AppStore Links Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 26, 2014
PHP min version
Downloads19K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

AppStore Links Developer Profile

Ste-Bi

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AppStore Links

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/appstore/images/stars.png/wp-content/plugins/appstore/images/update.png/wp-content/plugins/appstore/AppStore.php

HTML / DOM Fingerprints

CSS Classes
apps
HTML Comments
// ToDo: Checken ob Thickbox installiert ist
Data Attributes
data-appstore-id
JS Globals
APPSTORE_DL_LINKNAMEPLUGIN_BASE_DIRECTORY
Shortcode Output
<a href="" rel="nofollow" target="_blank" ></a><img class="apps" src="
FAQ

Frequently Asked Questions about AppStore Links