
Web Manifest Security & Risk Analysis
wordpress.org/plugins/web-manifestAllows to create and configure a web-app manifest file (manifest.json).
Is Web Manifest Safe to Use in 2026?
Generally Safe
Score 85/100Web Manifest has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The web-manifest plugin v1.1.0 presents a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface, and all identified entry points are implicitly protected due to their lack of existence. The code signals are also positive, with no dangerous functions, all SQL queries using prepared statements, and a good rate of output escaping (83%). The presence of capability checks further bolsters security, ensuring proper authorization for any operations that might require it. The vulnerability history being entirely clear with no recorded CVEs, regardless of severity, is an excellent indicator of the plugin's past stability and the developer's diligence.
However, there are minor points to consider. While the overall output escaping rate is good, the 17% of outputs that are not properly escaped could, in certain complex scenarios or with specific data inputs, theoretically lead to cross-site scripting (XSS) vulnerabilities. Although no taint flows were identified, which is a significant strength, the limited number of flows analyzed (0) means this analysis might not cover all potential data manipulation paths. Similarly, the plugin performs file operations, and while no specific risks are highlighted, these operations always carry a baseline risk if not handled with extreme care.
In conclusion, the web-manifest plugin v1.1.0 appears to be a secure and well-developed option. Its minimal attack surface, positive code signals, and clean vulnerability history are commendable. The only areas of slight concern are the unescaped outputs and the general caution required around file operations. These are minor weaknesses in an otherwise robust security profile, and the overall risk is assessed as low.
Key Concerns
- Unescaped output detected
- File operations present
Web Manifest Security Vulnerabilities
Web Manifest Code Analysis
Output Escaping
Web Manifest Attack Surface
WordPress Hooks 11
Maintenance & Trust
Web Manifest Maintenance & Trust
Maintenance Signals
Community Trust
Web Manifest Alternatives
MobStac WordPress Mobile
mobstac-blogger
Renders for mobile visitors a mobile version of your WordPress site, with blazing-fast page loads, multiple themes, support for over 5000 mobile devi …
Progressive Web Apps
progressive-web-apps
Use a Progressive Web App implemented with React JS to enhance the experience of your mobile users.
Super Progressive Web Apps
super-progressive-web-apps
SuperPWA helps you convert your WordPress website into a Progressive Web App instantly.
WPtouch – Make your WordPress Website Mobile-Friendly
wptouch
With just a few clicks, make your WordPress website mobile-friendly (iPhone, Android, and more). Recommended by Google, it will instantly enable a mob …
AppMySite – WordPress & WooCommerce Mobile App Builder (No-Code Android & iOS App Maker)
appmysite
Turn your WordPress or WooCommerce site into a native Android & iOS app in minutes — no coding required.
Web Manifest Developer Profile
1 plugin · 100 total installs
How We Detect Web Manifest
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/web-manifest/web-manifest.js/wp-content/plugins/web-manifest/style.css/wp-content/plugins/web-manifest/web-manifest.jsweb-manifest/style.css?ver=web-manifest.js?ver=HTML / DOM Fingerprints
<!-- Web Manifest: Preview -->fwm_data/wp-json/web-manifest/v1/data