
wp2phone Security & Risk Analysis
wordpress.org/plugins/wp2phonewp2phone plugin allows you to create, design and manage the content of a native iPhone & iPad app, directly in WordPress dashboard.
Is wp2phone Safe to Use in 2026?
Generally Safe
Score 85/100wp2phone has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The wp2phone plugin v0.1.6 exhibits a concerning security posture due to several critical code-level vulnerabilities. The most significant issue is the presence of an unprotected AJAX handler, which represents a direct attack vector. Furthermore, the plugin extensively uses SQL queries without prepared statements, increasing the risk of SQL injection vulnerabilities. The lack of output escaping for a substantial number of outputs is another major red flag, potentially leading to cross-site scripting (XSS) attacks. While the plugin has no recorded vulnerability history (CVEs), this lack of historical issues does not negate the immediate risks identified in the static analysis. The high number of unsanitized taint flows with critical and high severity ratings further amplifies these concerns, suggesting that untrusted data is not being properly validated or sanitized before being used in sensitive operations.
Despite the identified issues, the plugin does have some positive aspects, such as a relatively small attack surface and the absence of bundled libraries that might be outdated. However, these strengths are heavily outweighed by the critical vulnerabilities found in the code analysis. The unprotected AJAX endpoint, raw SQL queries, and unescaped output present immediate and severe security risks that require urgent attention. The absence of known CVEs is not a reliable indicator of current security given the significant findings in the static analysis. Overall, this plugin should be considered high-risk until these identified vulnerabilities are addressed.
Key Concerns
- Unprotected AJAX handler
- All SQL queries use raw execution
- No output escaping for 219 outputs
- 2 High severity taint flows
- 4 Flows with unsanitized paths
- No nonce checks on AJAX handlers
wp2phone Security Vulnerabilities
wp2phone Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
wp2phone Attack Surface
AJAX Handlers 1
WordPress Hooks 5
Maintenance & Trust
wp2phone Maintenance & Trust
Maintenance Signals
Community Trust
wp2phone Alternatives
iPad Rubberneck Disrupter
ipad-rubberneck-disrupter
Hides the WordPress login password as it is typed on your iPad or other IOS device.
Push Notification iOS
push-notifications-ios
This plugin allows you to send Push Notifications directly from your WordPress site to your iOS app.
Retina @2x
retina-2x
A plugin that looks for retina images automatically based on the @2x naming convention.
Smart App Banner
smart-app-banner
This is a WordPress plugin that allows you to use Smart App Banners, introduced in iOS 6, with your WordPress blog.
iOS Smart App Banner For Safari
ios-smart-app-banner-for-safari
iOS Smart App Banner For Safari plugin quickly and easily displays app banners for your web users who are using mobile Safari on iOS.
wp2phone Developer Profile
1 plugin · 10 total installs
How We Detect wp2phone
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp2phone/images/icon16.png/wp-content/plugins/wp2phone/js/script.jswp2phone/style.css?ver=wp2phone/js/script.js?ver=HTML / DOM Fingerprints
<!-- wp2phone --><!-- (c) 2011, 2012 wp2phone --><!-- http://wp2phone.com -->app-id=MyAjax