Extends ACF to save json-file in plugin directory Security & Risk Analysis

wordpress.org/plugins/extend-acf-acf-json-directory

ACF will save the field groups as JSON files, if you have created a directory with the name acf-json. Then, the ACF plugin will get the fields informa …

10 active installs v1.0.1 PHP 5.6+ WP 4.8+ Updated Sep 23, 2022
acfacf-jsonjson
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Extends ACF to save json-file in plugin directory Safe to Use in 2026?

Generally Safe

Score 85/100

Extends ACF to save json-file in plugin directory has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'extend-acf-acf-json-directory' plugin v1.0.1 demonstrates a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events suggests a minimal attack surface, which is further bolstered by the lack of unprotected entry points. The code signals also indicate good practices, with no dangerous functions, all SQL queries using prepared statements, and no file operations or external HTTP requests. The plugin also avoids bundling external libraries, reducing potential supply chain risks.

However, the analysis does highlight some areas for improvement. The plugin has 0 capability checks and 0 nonce checks, which are crucial for preventing unauthorized actions and cross-site request forgery, especially if functionality is added in the future that interacts with user actions or sensitive data. While there are only 3 output operations and 67% are properly escaped, this still leaves one output potentially unescaped, which could lead to cross-site scripting (XSS) vulnerabilities if that output is user-controlled. The lack of any taint analysis flows analyzed is positive, but it's important to note that this may be due to the limited entry points and interaction points, rather than a deliberate secure coding practice for all potential future interactions.

The plugin has no known vulnerabilities or CVEs, which is an excellent sign. This pattern suggests a history of stable and secure development. In conclusion, the plugin is currently in a good security state due to its small attack surface and lack of known vulnerabilities. The primary concerns lie in the absence of explicit capability and nonce checks, and the potential for unescaped output, which should be addressed to maintain a robust security profile, especially if the plugin evolves.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
  • Unescaped output detected
Vulnerabilities
None known

Extends ACF to save json-file in plugin directory Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Extends ACF to save json-file in plugin directory Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface

Extends ACF to save json-file in plugin directory Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedextend-acf-acf-json-directory.php:37
actionadmin_noticesextend-acf-acf-json-directory.php:54
filteracf/settings/save_jsonextend-acf-acf-json-directory.php:74
filteracf/settings/load_jsonextend-acf-acf-json-directory.php:96
Maintenance & Trust

Extends ACF to save json-file in plugin directory Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedSep 23, 2022
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Extends ACF to save json-file in plugin directory Developer Profile

polyres

5 plugins · 3K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Extends ACF to save json-file in plugin directory

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Extends ACF to save json-file in plugin directory