Mobile WP Security Security & Risk Analysis

wordpress.org/plugins/mobile-wp-security

This plugin exposes the rest APIs to be able to control some aspects of wordpress security via the mobile app "Mobile Security for Wordpress&quot …

0 active installs v1.2.0 PHP 5.6+ WP 4.5+ Updated Jun 30, 2020
mobilesecuritysmartphone
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mobile WP Security Safe to Use in 2026?

Generally Safe

Score 85/100

Mobile WP Security has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "mobile-wp-security" v1.2.0 plugin presents a generally positive security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points indicates a limited attack surface. Furthermore, the lack of critical or high severity taint flows is a strong indicator that sensitive data is likely being handled with caution. The vulnerability history being clear of any known CVEs also contributes to a perception of low risk.

However, several areas warrant attention and slightly temper the otherwise positive outlook. The moderate percentage of SQL queries not using prepared statements (69% not prepared) is a concern, as this could lead to SQL injection vulnerabilities if the inputs are not meticulously sanitized. Similarly, the low percentage of properly escaped output (57% not escaped) raises red flags for potential Cross-Site Scripting (XSS) vulnerabilities. The complete absence of nonce checks and capability checks on any entry points, although the entry points themselves are currently listed as zero, is a systemic weakness. If any entry points were to be introduced or discovered, they would likely be unprotected. The presence of file operations and external HTTP requests without explicit checks also suggests potential areas for further review.

In conclusion, while "mobile-wp-security" v1.2.0 benefits from a small attack surface and no known historical vulnerabilities, the static analysis reveals concerning practices regarding SQL query preparation and output escaping. The lack of fundamental security checks like nonces and capabilities is a significant weakness that should be addressed to ensure robust security against potential future threats.

Key Concerns

  • SQL queries not using prepared statements
  • Output escaping not properly handled
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Mobile WP Security Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mobile WP Security Code Analysis

Dangerous Functions
0
Raw SQL Queries
11
5 prepared
Unescaped Output
4
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
1
Bundled Libraries
0

SQL Query Safety

31% prepared16 total queries

Output Escaping

43% escaped7 total outputs
Attack Surface

Mobile WP Security Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionplugins_loadedincludes\Hooks\Hooks.php:42
actioninitincludes\Hooks\Hooks.php:46
actioninitincludes\Hooks\Hooks.php:47
actionadmin_initincludes\Hooks\Hooks.php:49
actionadmin_initincludes\Hooks\Hooks.php:50
actionadmin_menuincludes\Hooks\Hooks.php:51
actionwp_login_failedincludes\Hooks\Hooks.php:55
actionwp_loginincludes\Hooks\Hooks.php:56
actionsave_postincludes\Hooks\Hooks.php:57
actionwp_logoutincludes\Hooks\Hooks.php:58
actionwp_mail_failedincludes\Hooks\Hooks.php:59
actioncomment_postincludes\Hooks\Hooks.php:60
actionrest_api_initincludes\Hooks\Hooks.php:63
filterxmlrpc_enabledincludes\Repository\DataRepository.php:48
actionwpmu_new_blogmobile-wp-security.php:56
Maintenance & Trust

Mobile WP Security Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJun 30, 2020
PHP min version5.6
Downloads936

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Mobile WP Security Developer Profile

dacalleg

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mobile WP Security

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mobile-wp-security/includes/css/mobile-wp-security.css/wp-content/plugins/mobile-wp-security/includes/js/mobile-wp-security.js
Script Paths
/wp-content/plugins/mobile-wp-security/includes/js/mobile-wp-security.js
Version Parameters
mobile-wp-security/includes/css/mobile-wp-security.css?ver=mobile-wp-security/includes/js/mobile-wp-security.js?ver=

HTML / DOM Fingerprints

CSS Classes
mobile-wp-security-settings-page
HTML Comments
mobile-wp-security plugin
REST Endpoints
/wp-json/mobile-wp-security/v1/add-permanent-ban-ip/wp-json/mobile-wp-security/v1/remove-permanent-ban-ip/wp-json/mobile-wp-security/v1/add-temporary-ban-ip/wp-json/mobile-wp-security/v1/remove-temporary-ban-ip/wp-json/mobile-wp-security/v1/enable-ban/wp-json/mobile-wp-security/v1/get-ip-log/wp-json/mobile-wp-security/v1/website-data/wp-json/mobile-wp-security/v1/get-ip-rules/wp-json/mobile-wp-security/v1/get-ip-names/wp-json/mobile-wp-security/v1/set-ip-name/wp-json/mobile-wp-security/v1/remove-ip-name/wp-json/mobile-wp-security/v1/get-users/wp-json/mobile-wp-security/v1/get-roles/wp-json/mobile-wp-security/v1/create-user
FAQ

Frequently Asked Questions about Mobile WP Security