
Custom API for WP Security & Risk Analysis
wordpress.org/plugins/custom-api-for-wpConnect WordPress with External APIs and create no-code custom WordPress REST API endpoints to interact with the WordPress database to perform SQL ope …
Is Custom API for WP Safe to Use in 2026?
Generally Safe
Score 95/100Custom API for WP has a strong security track record. Known vulnerabilities have been patched promptly.
The "custom-api-for-wp" plugin v4.5.0 exhibits a mixed security posture. On the positive side, the code shows strong adherence to output escaping best practices, with 100% of outputs being properly escaped, and a significant majority of SQL queries utilizing prepared statements. The presence of 22 nonce checks and 2 capability checks also indicates an awareness of WordPress security mechanisms. However, a significant concern arises from the attack surface, with 4 out of 5 entry points lacking authentication checks. This creates a substantial risk for unauthorized access and potential exploitation.
The plugin's vulnerability history is also a point of concern, with 2 known high-severity CVEs. While currently unpatched CVEs are zero, the past occurrence of "Incorrect Privilege Assignment" and "SQL Injection" vulnerabilities, particularly the latter which is often associated with unsanitized input, reinforces the risk posed by the unprotected AJAX handlers. The absence of taint analysis results is neutral, as it may indicate the tool used did not find any, or that the analysis was not performed. The bundled jQuery library, while common, could be a potential vector if it's an outdated version, though this is not explicitly stated.
In conclusion, while the plugin demonstrates good practices in output handling and SQL query preparation, the significant number of unprotected entry points and the history of high-severity vulnerabilities, especially those related to SQL injection, create a considerable security risk. Developers should prioritize securing all AJAX handlers and address the root causes of past vulnerabilities.
Key Concerns
- 4 AJAX handlers without auth checks
- 2 high severity CVEs historically
- Past SQL Injection vulnerability
- Past Incorrect Privilege Assignment vulnerability
Custom API for WP Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Custom API for WP <= 4.2.2 - Authenticated (Subscriber+) Privilege Escalation
Custom API for WP <= 4.2.2 - Unauthenticated SQL Injection
Custom API for WP Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Custom API for WP Attack Surface
AJAX Handlers 4
Shortcodes 1
WordPress Hooks 3
Maintenance & Trust
Custom API for WP Maintenance & Trust
Maintenance Signals
Community Trust
Custom API for WP Alternatives
MultiManager WP – Manage All Your WordPress Sites Easily
multimanager-wp
Helps to automatically connect a WordPress site to the ICDSoft WordPress MultiManager tool which allows users to manage multiple WordPress sites from …
Custom API Creator
custom-api-creator
Custom API Creator is a WordPress plugin that lets developers create flexible, customize data, and control access with role restrictions.
SapientSEO
sapientseo
Adds secured custom REST API endpoints to integrate WordPress with the SapientSEO app.
WooCommerce Legacy REST API
woocommerce-legacy-rest-api
The WooCommerce Legacy REST API, which is now part of WooCommerce itself but will be removed in WooCommerce 9.0.
Disable REST API
disable-json-api
Disable the use of the REST API on your website to site users. Now with User Role support!
Custom API for WP Developer Profile
38 plugins · 83K total installs
How We Detect Custom API for WP
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/custom-api-for-wp/classes/Common/Resources/CSS/Bootstrap/bootstrap.min.css/wp-content/plugins/custom-api-for-wp/classes/Common/Resources/CSS/FontAwesome/all.min.css/wp-content/plugins/custom-api-for-wp/classes/Common/Resources/CSS/Lib/phone.min.css/wp-content/plugins/custom-api-for-wp/classes/Common/Resources/CSS/mo-caw-style.min.css/wp-content/plugins/custom-api-for-wp/classes/Common/Resources/JS/Lib/jquery.min.js/wp-content/plugins/custom-api-for-wp/classes/Common/Resources/JS/Lib/Sortable.min.js/wp-content/plugins/custom-api-for-wp/classes/Common/Resources/JS/Lib/phone.min.js/wp-content/plugins/custom-api-for-wp/classes/Common/Resources/JS/Bootstrap/bootstrap.bundle.min.js+2 moreclasses/Common/Resources/JS/mo-caw-script.min.jsclasses/Common/Resources/JS/Lib/jquery.min.jsclasses/Common/Resources/JS/Lib/Sortable.min.jsclasses/Common/Resources/JS/Lib/phone.min.jsclasses/Common/Resources/JS/Bootstrap/bootstrap.bundle.min.jscustom-api-for-wp/classes/Common/Resources/CSS/Lib/phone.min.css?ver=custom-api-for-wp/classes/Common/Resources/CSS/mo-caw-style.min.css?ver=custom-api-for-wp/classes/Common/Resources/JS/Lib/phone.min.js?ver=custom-api-for-wp/classes/Common/Resources/JS/mo-caw-script.min.js?ver=HTML / DOM Fingerprints
mo-caw-feedbackdata-bs-toggledata-bs-targetmoCawData