Disable WP REST API Security & Risk Analysis

wordpress.org/plugins/disable-wp-rest-api

Disables the WP REST API for visitors not logged into WordPress.

30K active installs v2.6.7 PHP 5.6.20+ WP 4.7+ Updated Jan 29, 2026
apidisablejsonrestrest-api
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable WP REST API Safe to Use in 2026?

Generally Safe

Score 100/100

Disable WP REST API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'disable-wp-rest-api' plugin version 2.6.7 demonstrates a strong security posture based on the provided static analysis. The code analysis reveals no AJAX handlers, REST API routes, shortcodes, cron events, or file operations, indicating a minimal attack surface. Furthermore, the absence of dangerous functions, SQL queries requiring sanitization (all use prepared statements), and unescaped output are positive indicators of secure coding practices. The plugin also lacks external HTTP requests and does not rely on bundled libraries, reducing potential risks from third-party code.

The vulnerability history is also clean, with no recorded CVEs, suggesting a history of secure development or diligent patching. The complete lack of any security findings in the static analysis, including taint flows, is a significant strength.

However, it's important to note that the absence of nonce checks and capability checks is a direct consequence of the plugin's design to disable functionality rather than expose it. While this may not introduce direct vulnerabilities in this specific plugin's implementation, it represents a deviation from best practices for plugins that *do* expose entry points. The overall conclusion is that this plugin, in its current state and version, appears to be very secure and poses minimal risk. Its strengths lie in its extremely limited attack surface and adherence to secure coding principles for the functions it does (or rather, doesn't) expose.

Vulnerabilities
None known

Disable WP REST API Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable WP REST API Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable WP REST API Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterrest_authentication_errorsdisable-wp-rest-api.php:57
filterjson_enableddisable-wp-rest-api.php:127
filterjson_jsonp_enableddisable-wp-rest-api.php:128
filterrest_enableddisable-wp-rest-api.php:131
filterrest_jsonp_enableddisable-wp-rest-api.php:132
filterplugin_row_metadisable-wp-rest-api.php:157
Maintenance & Trust

Disable WP REST API Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 29, 2026
PHP min version5.6.20
Downloads366K

Community Trust

Rating96/100
Number of ratings36
Active installs30K
Developer Profile

Disable WP REST API Developer Profile

Jeff Starr

30 plugins · 1.2M total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
345 days
View full developer profile
Detection Fingerprints

How We Detect Disable WP REST API

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- REST API restricted to authenticated users. -->
FAQ

Frequently Asked Questions about Disable WP REST API