Disable REST API and Require JWT / OAuth Authentication Security & Risk Analysis

wordpress.org/plugins/disable-rest-api-and-require-jwt-oauth-authentication

Disables all REST API endpoints and requires JWT or OAuth Authentication.

60 active installs v1.0 PHP 5.2+ WP 4.4+ Updated Sep 26, 2017
apijsonrestrest-apiweb
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable REST API and Require JWT / OAuth Authentication Safe to Use in 2026?

Generally Safe

Score 85/100

Disable REST API and Require JWT / OAuth Authentication has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "disable-rest-api-and-require-jwt-oauth-authentication" plugin v1.0 demonstrates a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code analysis reveals no dangerous functions, file operations, or external HTTP requests, and all SQL queries are properly prepared. The lack of any identified taint flows or outputting unescaped data further reinforces the impression of secure coding practices.

The plugin's vulnerability history is also clean, with no known CVEs. This indicates a mature and well-maintained codebase, or at least one that has not yet been targeted or discovered to have exploitable flaws. The strength of this plugin lies in its minimal attack surface and adherence to fundamental security principles like prepared statements and output escaping, coupled with a clean vulnerability record.

While the static analysis results are overwhelmingly positive, the most significant concern is the complete absence of nonce checks and capability checks. For a plugin focused on authentication and security, these are fundamental security mechanisms that should ideally be present to protect against various attack vectors. However, given the extremely limited attack surface reported (zero entry points), the immediate risk associated with these missing checks is currently mitigated. The overall security is good, but the omission of standard security checks warrants attention for future development.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Disable REST API and Require JWT / OAuth Authentication Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable REST API and Require JWT / OAuth Authentication Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable REST API and Require JWT / OAuth Authentication Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterrest_pre_dispatchplugin.php:18
Maintenance & Trust

Disable REST API and Require JWT / OAuth Authentication Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedSep 26, 2017
PHP min version5.2
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Disable REST API and Require JWT / OAuth Authentication Developer Profile

Benjamin Intal

10 plugins · 110K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
21 days
View full developer profile
Detection Fingerprints

How We Detect Disable REST API and Require JWT / OAuth Authentication

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/jwt-auth/v1/token/validate/jwt-auth/v1/token/oauth/authorize/oauth/token/oauth/me
FAQ

Frequently Asked Questions about Disable REST API and Require JWT / OAuth Authentication