wp2phone Security & Risk Analysis

wordpress.org/plugins/wp2phone

wp2phone plugin allows you to create, design and manage the content of a native iPhone & iPad app, directly in WordPress dashboard.

10 active installs v0.1.6 PHP + WP 2.9+ Updated Oct 13, 2012
iosios4ipadiphoneipod
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is wp2phone Safe to Use in 2026?

Generally Safe

Score 85/100

wp2phone has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The wp2phone plugin v0.1.6 exhibits a concerning security posture due to several critical code-level vulnerabilities. The most significant issue is the presence of an unprotected AJAX handler, which represents a direct attack vector. Furthermore, the plugin extensively uses SQL queries without prepared statements, increasing the risk of SQL injection vulnerabilities. The lack of output escaping for a substantial number of outputs is another major red flag, potentially leading to cross-site scripting (XSS) attacks. While the plugin has no recorded vulnerability history (CVEs), this lack of historical issues does not negate the immediate risks identified in the static analysis. The high number of unsanitized taint flows with critical and high severity ratings further amplifies these concerns, suggesting that untrusted data is not being properly validated or sanitized before being used in sensitive operations.

Despite the identified issues, the plugin does have some positive aspects, such as a relatively small attack surface and the absence of bundled libraries that might be outdated. However, these strengths are heavily outweighed by the critical vulnerabilities found in the code analysis. The unprotected AJAX endpoint, raw SQL queries, and unescaped output present immediate and severe security risks that require urgent attention. The absence of known CVEs is not a reliable indicator of current security given the significant findings in the static analysis. Overall, this plugin should be considered high-risk until these identified vulnerabilities are addressed.

Key Concerns

  • Unprotected AJAX handler
  • All SQL queries use raw execution
  • No output escaping for 219 outputs
  • 2 High severity taint flows
  • 4 Flows with unsanitized paths
  • No nonce checks on AJAX handlers
Vulnerabilities
None known

wp2phone Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

wp2phone Code Analysis

Dangerous Functions
0
Raw SQL Queries
9
0 prepared
Unescaped Output
218
1 escaped
Nonce Checks
0
Capability Checks
4
File Operations
8
External Requests
2
Bundled Libraries
0

SQL Query Safety

0% prepared9 total queries

Output Escaping

0% escaped219 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

7 flows4 with unsanitized paths
wp2p_add_edit_tab (includes\content_page.php:19)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

wp2phone Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_wp2p_actionplugin.php:48
WordPress Hooks 5
actionadmin_menuplugin.php:46
actionadmin_initplugin.php:47
actionwp_json_wp2p_jsonplugin.php:49
actionpublish_postplugin.php:50
actionwp_headplugin.php:51
Maintenance & Trust

wp2phone Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedOct 13, 2012
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

wp2phone Developer Profile

wp2phone

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect wp2phone

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp2phone/images/icon16.png
Script Paths
/wp-content/plugins/wp2phone/js/script.js
Version Parameters
wp2phone/style.css?ver=wp2phone/js/script.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- wp2phone --><!-- (c) 2011, 2012 wp2phone --><!-- http://wp2phone.com -->
Data Attributes
app-id=
JS Globals
MyAjax
FAQ

Frequently Asked Questions about wp2phone