WP App Enabler Security & Risk Analysis

wordpress.org/plugins/wp-app-enabler

Enables your WordPress site to run in App mode in Android and iOS.

10 active installs v0.2 PHP + WP 3.0.1+ Updated Sep 13, 2014
androidhomescreeniosnative-appweb-app
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP App Enabler Safe to Use in 2026?

Generally Safe

Score 85/100

WP App Enabler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The static analysis of wp-app-enabler v0.2 reveals a plugin with an exceptionally small attack surface, reporting zero entry points for AJAX handlers, REST API routes, shortcodes, and cron events. The code also demonstrates good practices by not utilizing dangerous functions, performing no file operations or external HTTP requests, and using prepared statements for all SQL queries. Furthermore, all output is properly escaped, and the absence of vulnerability history suggests a history of secure development or limited exposure. This indicates a generally strong security posture based on the provided static analysis data.

However, the complete absence of nonce checks and capability checks is a significant concern. While the attack surface is currently reported as zero, this could be misleading. The lack of authentication and authorization mechanisms means that any future functionality added to the plugin, or any unintended exposure of existing code, could be exploited without any built-in safeguards. The zero taint flows are positive but could be a result of the limited scope of analysis or the minimal code present. Therefore, while the current state appears secure, the foundation for future security is lacking.

In conclusion, wp-app-enabler v0.2 presents a paradox of apparent security and underlying risk. Its current lack of exploitable entry points and adherence to basic secure coding principles are strengths. Conversely, the complete omission of nonce and capability checks represents a critical weakness that could lead to vulnerabilities if the plugin's functionality expands or is inadvertently exposed. The absence of past vulnerabilities is a positive indicator, but it doesn't mitigate the inherent risk of missing fundamental security controls.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

WP App Enabler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP App Enabler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP App Enabler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionwp_headbootstrap.php:15
actionadmin_headbootstrap.php:16
actionwp_headbootstrap.php:27
actionadmin_headbootstrap.php:28
actionwp_headbootstrap.php:39
actionadmin_headbootstrap.php:40
Maintenance & Trust

WP App Enabler Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.0
Last updatedSep 13, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

WP App Enabler Developer Profile

mrpaplu

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP App Enabler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP App Enabler