User Data Fields For JWT Authentication Security & Risk Analysis

wordpress.org/plugins/custom-fields-for-jwt-authentication-for-wp-rest-api

Wordpress is a good content mangement system for building websites, but it will be better if you build like mobile apps,

40 active installs v1.2.1 PHP + WP + Updated Aug 1, 2022
json-web-authenticationjwtwp-apiwp-json
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Data Fields For JWT Authentication Safe to Use in 2026?

Generally Safe

Score 85/100

User Data Fields For JWT Authentication has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of "custom-fields-for-jwt-authentication-for-wp-rest-api" v1.2.1 reveals a strong adherence to secure coding practices. The plugin has no identified attack surface through AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks. Furthermore, the code signals indicate a complete absence of dangerous functions, file operations, external HTTP requests, and external HTTP requests. All SQL queries are prepared, and all outputs are properly escaped, which significantly mitigates common vulnerabilities like SQL injection and Cross-Site Scripting (XSS). The taint analysis also found no critical or high-severity issues, suggesting no pathways for malicious data to be processed unsafely.

The plugin's vulnerability history is remarkably clean, with zero recorded CVEs of any severity. This indicates a consistent track record of security and maintenance. While the absence of nonce and capability checks is noted in the code signals, the fact that there are no exposed entry points means these checks are not currently exploitable. The overall security posture appears excellent, demonstrating robust development practices. The primary strength lies in its minimal and well-secured attack surface. The lack of historical vulnerabilities further reinforces its secure reputation. However, the absence of nonce and capability checks, even without an apparent attack surface, could be a potential weakness if future updates introduce new functionalities or modify existing ones without addressing these checks.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

User Data Fields For JWT Authentication Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

User Data Fields For JWT Authentication Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

User Data Fields For JWT Authentication Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterjwt_auth_token_before_dispatchuser-data-fields-for-jwt-authentication.php:14
filterjwt_auth_validate_tokenuser-data-fields-for-jwt-authentication.php:30
Maintenance & Trust

User Data Fields For JWT Authentication Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedAug 1, 2022
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs40
Developer Profile

User Data Fields For JWT Authentication Developer Profile

Ahmed Hnewa

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Data Fields For JWT Authentication

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/jwt-authentication/token
FAQ

Frequently Asked Questions about User Data Fields For JWT Authentication