EDC REST API Security & Risk Analysis

wordpress.org/plugins/edc-rest-api

Fetch the content of the sections and articles and search them through the API

40 active installs v1.0.6 PHP 7.4+ WP 5.2+ Updated Apr 29, 2024
apijsonrest
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EDC REST API Safe to Use in 2026?

Generally Safe

Score 92/100

EDC REST API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "edc-rest-api" plugin v1.0.6 exhibits a remarkably secure posture. The static analysis reveals no identified attack surface points, meaning there are no AJAX handlers, REST API routes, shortcodes, or cron events exposed that could be directly accessed by an attacker. Furthermore, the code demonstrates strong security practices with no dangerous functions, 100% of SQL queries using prepared statements, and all output being properly escaped. The absence of file operations and external HTTP requests also reduces potential risks. The taint analysis shows zero flows with unsanitized paths, indicating no obvious data injection vulnerabilities within the analyzed code paths.

The vulnerability history further reinforces this positive assessment. With zero known CVEs, no currently unpatched vulnerabilities, and no historical records of any vulnerability types, this plugin appears to have a clean track record. This suggests a commitment to secure coding practices and thorough testing by its developers. The combination of a minimal attack surface, robust internal coding security measures, and a lack of historical vulnerabilities points towards a high level of security for this plugin. However, it's important to note that the complete absence of nonce checks and capability checks, while not directly leading to identified vulnerabilities in this analysis, represents a potential area where future vulnerabilities could emerge if new entry points are introduced without proper authorization mechanisms.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

EDC REST API Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

EDC REST API Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped17 total outputs
Attack Surface

EDC REST API Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitedc-api-json.php:18
filterquery_varsedc-api-json.php:22
actionwpedc-api-json.php:294
Maintenance & Trust

EDC REST API Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedApr 29, 2024
PHP min version7.4
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

EDC REST API Developer Profile

edckwt

13 plugins · 520 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EDC REST API

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/edc-rest-api/v1/recent-posts/wp-json/edc-rest-api/v1/posts/wp-json/edc-rest-api/v1/search-results/wp-json/edc-rest-api/v1/category-index/wp-json/edc-rest-api/v1/category-posts
FAQ

Frequently Asked Questions about EDC REST API