iPhone Control Panel Security & Risk Analysis

wordpress.org/plugins/iphone-control-panel

Configure how iPhones and iPod touches see your site. Add custom css, a home screen bookmark icon, change the viewport, or redirect to another url.

10 active installs vv0.7 PHP + WP 2.0.2+ Updated Nov 2, 2013
iconsiphoneipod-touchphonetouch-devices
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is iPhone Control Panel Safe to Use in 2026?

Generally Safe

Score 85/100

iPhone Control Panel has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "iphone-control-panel" plugin version 0.7 presents a mixed security picture. On the positive side, the plugin boasts zero known vulnerabilities, a clean history with no recorded CVEs, and no identified dangerous functions or file operations. Its use of prepared statements for all SQL queries is a strong security practice. However, a significant concern lies in its output escaping. With 100% of its 18 outputs being unescaped, this plugin is highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. An attacker could inject malicious scripts into the WordPress dashboard or any frontend area where this plugin's output is displayed.

The lack of any identified taint flows or attack surface entry points suggests that, in its current form, the plugin might not have direct exploitable vulnerabilities. The presence of a single nonce check is a positive sign, though the absence of capability checks on any potential handlers (of which there are none listed) could be a blind spot if new entry points were to be introduced. Overall, while the plugin avoids common critical vulnerabilities like SQL injection and unpatched CVEs, the pervasive lack of output escaping makes it a significant XSS risk, necessitating immediate attention.

Key Concerns

  • All outputs are unescaped
  • No capability checks found
Vulnerabilities
None known

iPhone Control Panel Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

iPhone Control Panel Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped18 total outputs
Attack Surface

iPhone Control Panel Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuiphone_control_panel.php:94
actionwp_headiphone_control_panel.php:96
actionwp_headiphone_control_panel.php:97
actionwp_headiphone_control_panel.php:98
Maintenance & Trust

iPhone Control Panel Maintenance & Trust

Maintenance Signals

WordPress version tested2.85
Last updatedNov 2, 2013
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

iPhone Control Panel Developer Profile

Adrian Hanft

5 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect iPhone Control Panel

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/iphone-control-panel/icons/

HTML / DOM Fingerprints

HTML Comments
<!-- viewport --><!-- apple touch icon --><!-- iphone css -->
JS Globals
navigator.userAgent
FAQ

Frequently Asked Questions about iPhone Control Panel