Minimum Configuration WordPress PWA Security & Risk Analysis

wordpress.org/plugins/mcw-pwa

Add Progressive Web Apps (PWA) enhancement to your WordPress with minimum configuration. Preache your assets, and add offline page.

10 active installs v0.2.3 PHP + WP 4.6+ Updated Mar 11, 2019
lazy-loadingminimum-configperformancepwaworkbox
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Minimum Configuration WordPress PWA Safe to Use in 2026?

Generally Safe

Score 85/100

Minimum Configuration WordPress PWA has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The mcw-pwa plugin version 0.2.3 exhibits a generally good security posture regarding its attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no apparent direct entry points for attackers to exploit. The plugin also demonstrates a commitment to secure coding practices by using prepared statements for all SQL queries and implementing some nonce and capability checks.

However, the analysis reveals some areas of concern. The low percentage of properly escaped output (11%) indicates a significant risk of cross-site scripting (XSS) vulnerabilities. While the total number of outputs is moderate, any unescaped output can be exploited. The presence of file operations and external HTTP requests, while not explicitly flagged as dangerous, warrant further scrutiny to ensure they do not introduce vulnerabilities. The taint analysis identified one flow with unsanitized paths, which, although not classified as critical or high, still represents a potential security weakness that could be exploited if not properly handled. The plugin's history of zero known CVEs is positive, suggesting a mature and well-maintained codebase, or perhaps a lack of extensive security auditing.

In conclusion, the mcw-pwa plugin benefits from a very limited attack surface and good SQL practices. The main weaknesses lie in the insufficient output escaping and a potential taint flow issue. While the absence of a vulnerability history is encouraging, the output escaping concern is a significant and common vector for attacks and should be addressed.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flow with unsanitized paths
  • File operations present
  • External HTTP requests present
Vulnerabilities
None known

Minimum Configuration WordPress PWA Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Minimum Configuration WordPress PWA Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
2 escaped
Nonce Checks
2
Capability Checks
1
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

11% escaped19 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
scanAssets (includes\service_workers\MCW_PWA_Service_Worker.php:235)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Minimum Configuration WordPress PWA Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actionwp_headincludes\MCW_PWA_Assets.php:28
filterscript_loader_tagincludes\MCW_PWA_Assets.php:29
filtertiny_mce_pluginsincludes\MCW_PWA_Assets.php:145
filterwp_resource_hintsincludes\MCW_PWA_Assets.php:146
actionwp_headincludes\MCW_PWA_LazyLoad.php:24
filterthe_contentincludes\MCW_PWA_LazyLoad.php:101
filterpost_thumbnail_htmlincludes\MCW_PWA_LazyLoad.php:102
filterget_avatarincludes\MCW_PWA_LazyLoad.php:103
actionadmin_initincludes\MCW_PWA_Module.php:20
actionwp_headincludes\MCW_PWA_Monitor.php:30
actionwp_print_footer_scriptsincludes\MCW_PWA_Monitor.php:31
actionadmin_menuincludes\MCW_PWA_Settings.php:25
actionadmin_initincludes\MCW_PWA_Settings.php:26
actioninitincludes\service_workers\MCW_PWA_Service_Worker.php:37
actiontemplate_redirectincludes\service_workers\MCW_PWA_Service_Worker.php:38
filterquery_varsincludes\service_workers\MCW_PWA_Service_Worker.php:39
actionwp_print_footer_scriptsincludes\service_workers\MCW_PWA_Service_Worker.php:49
actionamp_post_template_headincludes\service_workers\MCW_PWA_Service_Worker.php:51
actionamp_post_template_footerincludes\service_workers\MCW_PWA_Service_Worker.php:52
actionparse_queryMCW_PWA.php:97
Maintenance & Trust

Minimum Configuration WordPress PWA Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.0
Last updatedMar 11, 2019
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Minimum Configuration WordPress PWA Developer Profile

Yohan Totting

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Minimum Configuration WordPress PWA

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mcw-pwa/scripts/lazyload.js/wp-content/plugins/mcw-pwa/scripts/intersection-observer.js/wp-content/plugins/mcw-pwa/scripts/node_modules/tti-polyfill/tti-polyfill.js/wp-content/plugins/mcw-pwa/scripts/performance.js
Version Parameters
mcw_lazyloadintersection-observer.js?ver=tti_polyfilltti_performance

HTML / DOM Fingerprints

CSS Classes
lazylazy-hidden
Data Attributes
data-lazy-typedata-lazy-srcdata-lazy-srcsetdata-lazy-sizes
JS Globals
IntersectionObserver
FAQ

Frequently Asked Questions about Minimum Configuration WordPress PWA