
API REST Post Security & Risk Analysis
wordpress.org/plugins/api-rest-postsPermite mostrar los ultimos posts y posts por categoria
Is API REST Post Safe to Use in 2026?
Generally Safe
Score 85/100API REST Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "api-rest-posts" plugin, version 1.1, exhibits a concerning security posture despite a lack of recorded vulnerabilities. The static analysis reveals a significant attack surface consisting of two REST API routes, both of which completely lack permission callbacks. This means any authenticated user, regardless of their role or capabilities, can potentially access and interact with these endpoints. Furthermore, all identified output operations (7 in total) are not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. This lack of output sanitization is a critical weakness that could be exploited by attackers to inject malicious scripts, leading to session hijacking, defacement, or other harmful actions.
The absence of dangerous functions, SQL injection risks (all queries use prepared statements), file operations, external HTTP requests, and taint flows with unsanitized paths are positive indicators. The plugin also demonstrates a lack of bundled libraries, which can sometimes introduce outdated components. However, these strengths are overshadowed by the critical issues of unprotected REST API endpoints and the pervasive lack of output escaping. The vulnerability history shows no known CVEs, which might suggest it hasn't been a target or previous versions were less exposed. Nevertheless, the inherent weaknesses in the current version create a substantial risk profile.
In conclusion, while the plugin avoids common pitfalls like raw SQL or bundled vulnerable libraries, the unprotected REST API endpoints and widespread unescaped output present immediate and serious security risks. The lack of authentication and sanitization on critical entry points makes it a prime target for attackers. Users of this plugin should be aware of these significant security flaws and consider mitigating them or avoiding the plugin altogether.
Key Concerns
- REST API routes without permission callbacks
- No output escaping
- No nonce checks
- No capability checks
API REST Post Security Vulnerabilities
API REST Post Release Timeline
API REST Post Code Analysis
Output Escaping
API REST Post Attack Surface
REST API Routes 2
WordPress Hooks 3
Maintenance & Trust
API REST Post Maintenance & Trust
Maintenance Signals
Community Trust
API REST Post Alternatives
API Stats
wp-api-stats
View and filter API calls to your website with details about Method, Path, Response time, and Count.
WooCommerce Legacy REST API
woocommerce-legacy-rest-api
The WooCommerce Legacy REST API, which is now part of WooCommerce itself but will be removed in WooCommerce 9.0.
Disable REST API
disable-json-api
Disable the use of the REST API on your website to site users. Now with User Role support!
Make Connector
integromat-connector
Make Connector. Make lets you design, build, and automate by connecting with WordPress in just a few clicks.
JWT Authentication for WP REST API
jwt-authentication-for-wp-rest-api
Extends the WP REST API using JSON Web Tokens Authentication as an authentication method.
API REST Post Developer Profile
6 plugins · 1K total installs
How We Detect API REST Post
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
/wp-json/last-post/v2/category/(?P<id>\d+)/numberposts/(?P<number>\d+)/wp-json/last-post/v2/numberposts/(?P<number>\d+)