BlogWired Gateway Security & Risk Analysis

wordpress.org/plugins/blogwired-gateway

The official gateway plugin for the BlogWired application. Enables secure remote publishing from BlogWired to your WordPress site.

0 active installs v1.5.2 PHP 7.4+ WP 5.8+ Updated Apr 13, 2026
bloggingblogwiredcontent-managementremote-publishingrest-api
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BlogWired Gateway Safe to Use in 2026?

Generally Safe

Score 100/100

BlogWired Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The blogwired-gateway plugin v1.5.2 exhibits a generally strong security posture, with several positive indicators. The absence of dangerous functions, reliance on prepared statements for SQL queries, and proper output escaping for all identified outputs are commendable practices. The lack of file operations, external HTTP requests, and bundled libraries further reduces the potential attack surface. However, the analysis highlights a significant concern: one of the three REST API routes lacks a permission callback. This creates an unprotected entry point that could be exploited by unauthenticated users if sensitive functionality is exposed through this route.

The static analysis found no critical taint flows, indicating that user-supplied data is likely handled safely within the existing code. Furthermore, the plugin's vulnerability history is clean, with no recorded CVEs. This suggests a history of secure development or effective patching by the developers. Despite the clean history, the unprotected REST API endpoint is a notable weakness that needs to be addressed to fully secure the plugin. The absence of nonce checks and capability checks on the identified entry points is also a concern, though the impact is mitigated by the fact that only one REST API route is unprotected.

Key Concerns

  • REST API route without permission callback
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

BlogWired Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

BlogWired Gateway Release Timeline

v1.5.2Current
Code Analysis
Analyzed Apr 16, 2026

BlogWired Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
30 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped30 total outputs
Attack Surface
1 unprotected

BlogWired Gateway Attack Surface

Entry Points3
Unprotected1

REST API Routes 3

GET/wp-json/blogwired/v1/datablogwired-gateway.php:40
POST/wp-json/blogwired/v1/postblogwired-gateway.php:50
GET/wp-json/blogwired/v1/post/(?P<id>\d+)blogwired-gateway.php:60
WordPress Hooks 3
actionrest_api_initblogwired-gateway.php:30
actionadmin_menublogwired-gateway.php:31
actionadmin_initblogwired-gateway.php:32
Maintenance & Trust

BlogWired Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested7.0
Last updatedApr 13, 2026
PHP min version7.4
Downloads37

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

BlogWired Gateway Developer Profile

wiredcoyotedigital

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BlogWired Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/blogwired/v1/data/blogwired/v1/post/blogwired/v1/post/(?P<id>\d+)
FAQ

Frequently Asked Questions about BlogWired Gateway