Feed JSON Security & Risk Analysis

wordpress.org/plugins/feed-json

Adds a new type of feed you can subscribe to.

500 active installs v1.0.10 PHP + WP 3.0+ Updated Jan 18, 2017
feedfeedsjsonjsonp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Feed JSON Safe to Use in 2026?

Generally Safe

Score 85/100

Feed JSON has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'feed-json' plugin v1.0.10 demonstrates a strong security posture based on the provided static analysis. The absence of any identifiable attack surface points, dangerous functions, raw SQL queries, file operations, external HTTP requests, or known vulnerabilities in its history is highly commendable. This suggests the developers have prioritized secure coding practices and have maintained a clean track record.

However, there are a few areas that warrant attention. The low percentage of properly escaped outputs (33%) indicates a potential risk of cross-site scripting (XSS) vulnerabilities if the unescaped outputs are rendered in a user's browser. While the static analysis did not identify specific taint flows or vulnerabilities, this output escaping issue remains a significant concern. Additionally, the complete lack of nonce and capability checks, while not directly leading to identified issues in this scan, could be a concern in larger or more complex plugins where such checks are crucial for preventing CSRF and unauthorized actions.

In conclusion, the plugin is in a generally good security state due to its limited attack surface and lack of known vulnerabilities. The primary weakness lies in output escaping, which should be addressed to mitigate potential XSS risks. The absence of critical or high severity issues in the taint analysis and vulnerability history are positive indicators. Addressing the output escaping would significantly enhance its overall security.

Key Concerns

  • Low percentage of properly escaped outputs
  • Lack of nonce checks
  • Lack of capability checks
Vulnerabilities
None known

Feed JSON Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Feed JSON Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

Feed JSON Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitfeed-json.php:52
actiondo_feed_jsonfeed-json.php:53
filtertemplate_includefeed-json.php:54
filterquery_varsfeed-json.php:55
Maintenance & Trust

Feed JSON Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 18, 2017
PHP min version
Downloads22K

Community Trust

Rating80/100
Number of ratings4
Active installs500
Developer Profile

Feed JSON Developer Profile

wokamoto

7 plugins · 12K total installs

81
trust score
Avg Security Score
82/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Feed JSON

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/feed-json/template/feed-json.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Feed JSON