EndPointy Menus Security & Risk Analysis

wordpress.org/plugins/endpointy-menus

Expose WordPress menus via a custom REST API endpoint for headless and external applications.

0 active installs v1.1.0 PHP + WP 5.0+ Updated Dec 16, 2025
headlessjsonmenusnavigationrest-api
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EndPointy Menus Safe to Use in 2026?

Generally Safe

Score 100/100

EndPointy Menus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The 'endpointy-menus' plugin version 1.1.0 exhibits a concerning security posture due to a significant portion of its attack surface being exposed without proper authorization checks. Specifically, all four identified REST API routes lack permission callbacks, meaning any authenticated user could potentially interact with these endpoints, leading to unauthorized actions or data exposure depending on their implementation. While the static analysis does not reveal dangerous functions, raw SQL, or unescaped output, the absence of nonce checks and capability checks on these REST API routes is a critical oversight that creates a wide opening for potential exploits.

The plugin's vulnerability history is clean, showing no recorded CVEs. This, combined with the absence of dangerous code signals and taint flows, suggests that the core code might be well-written in terms of preventing common vulnerabilities like SQL injection or cross-site scripting (XSS). However, this positive aspect is heavily overshadowed by the identified attack surface issues. The plugin's strength lies in its apparent lack of overtly malicious code patterns, but its weakness is the fundamental security gap in its REST API implementation.

In conclusion, while 'endpointy-menus' v1.1.0 does not appear to contain intentionally malicious code or known vulnerabilities, the direct exposure of its REST API routes without any form of authorization check presents a significant and immediate risk. This flaw could allow authenticated users to perform unintended actions. Robust permission checks are essential for all API endpoints to ensure data integrity and prevent unauthorized access.

Key Concerns

  • REST API routes without permission callbacks
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

EndPointy Menus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EndPointy Menus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface
4 unprotected

EndPointy Menus Attack Surface

Entry Points4
Unprotected4

REST API Routes 4

GET/wp-json/endpointy-menus/v1/menusendpointy-menus.php:50
GET/wp-json/endpointy-menus/v1/menus/(?P<id>[0-9]+)endpointy-menus.php:66
GET/wp-json/endpointy-menus/v1/locationsendpointy-menus.php:82
GET/wp-json/endpointy-menus/v1/locations/(?P<location>[a-zA-Z0-9_-]+)endpointy-menus.php:92
WordPress Hooks 2
actionrest_api_initendpointy-menus.php:25
filterplugin_row_metaendpointy-menus.php:26
Maintenance & Trust

EndPointy Menus Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 16, 2025
PHP min version
Downloads134

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

EndPointy Menus Developer Profile

Gunjan Jaswal

6 plugins · 150 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EndPointy Menus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/endpointy-menus/v1/locations/endpointy-menus/v1/locations/(?P<location>[a-zA-Z0-9_-]+)/endpointy-menus/v1/menus/endpointy-menus/v1/menus/(?P<id>[0-9]+)
FAQ

Frequently Asked Questions about EndPointy Menus