ACF For Gridsome Security & Risk Analysis

wordpress.org/plugins/acf-for-gridsome

Using with gridsome source worpdress https://gridsome.org/plugins/@gridsome/source-wordpress Use for custom acf fields get to rest api neccessery pl …

0 active installs v0.5 PHP 7.2+ WP 5.1+ Updated Jun 10, 2020
acfacf-rest-apigridsome
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ACF For Gridsome Safe to Use in 2026?

Generally Safe

Score 85/100

ACF For Gridsome has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The acf-for-gridsome plugin v0.5 exhibits a concerning security posture due to several critical weaknesses identified in the static analysis. While the plugin shows strength in avoiding dangerous functions and utilizing prepared statements for its SQL queries (though none are present), its handling of entry points is a significant drawback. The presence of a single unprotected REST API route represents a direct attack vector that could be exploited by unauthenticated users.

Furthermore, the complete lack of output escaping is a major red flag. This means that any data processed or displayed by the plugin could potentially be vulnerable to Cross-Site Scripting (XSS) attacks, allowing malicious actors to inject arbitrary code into web pages. The absence of nonce and capability checks further exacerbates these risks, as there are no built-in mechanisms to verify user permissions or prevent Cross-Site Request Forgery (CSRF) attacks. The plugin's vulnerability history being clean is a positive sign, but it does not mitigate the immediate risks presented by the current code's insecure practices.

In conclusion, while the plugin's SQL hygiene and lack of bundled libraries are commendable, the unprotected REST API route and universal lack of output escaping pose substantial security risks. These issues significantly outweigh the positive aspects, making the plugin vulnerable to common web attacks.

Key Concerns

  • Unprotected REST API route
  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

ACF For Gridsome Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

ACF For Gridsome Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

ACF For Gridsome Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface
1 unprotected

ACF For Gridsome Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/acf-gridsome/v1/gridsomeindex.php:150
WordPress Hooks 6
filteracf/format_valueindex.php:10
filteracf/format_value/type=selectindex.php:27
filteracf/format_value/type=relationshipindex.php:35
filterrest_prepare_akillisaatindex.php:98
actionrest_api_initindex.php:100
actionrest_api_initindex.php:149
Maintenance & Trust

ACF For Gridsome Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJun 10, 2020
PHP min version7.2
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

ACF For Gridsome Developer Profile

Fuat POYRAZ

3 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF For Gridsome

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
/acf-for-gridsome/style.css?ver=0.5/acf-for-gridsome/script.js?ver=0.5

HTML / DOM Fingerprints

REST Endpoints
/wp-json/acf-gridsome/v1/gridsome
FAQ

Frequently Asked Questions about ACF For Gridsome