Headless REST API Security Security & Risk Analysis

wordpress.org/plugins/headless-rest-api-security

Manage access to the WordPress REST API by restricting public endpoints, enabling specific route allow-listing, and handling API key authentication.

20 active installs v2.2 PHP 7.4+ WP 5.8+ Updated Feb 22, 2026
access-controlauthenticationheadlesspermissionsrest-api
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Headless REST API Security Safe to Use in 2026?

Generally Safe

Score 100/100

Headless REST API Security has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "headless-rest-api-security" v2.2 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points like AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's potential exposure to external threats. Furthermore, the code signals indicate robust security practices, including no dangerous functions, all SQL queries utilizing prepared statements, and a very high percentage of properly escaped output. The lack of file operations and external HTTP requests also reduces common attack vectors. The vulnerability history is clean, with no recorded CVEs, which suggests a well-maintained and secure codebase over time.

However, the static analysis reveals a complete absence of nonce checks and a low number of capability checks (2), which could be a concern depending on the plugin's intended functionality. If the plugin handles sensitive data or performs critical actions, the lack of these common WordPress security mechanisms leaves it vulnerable to certain types of attacks, such as Cross-Site Request Forgery (CSRF) if not properly handled by the frontend application. The taint analysis showing zero flows, while positive, might be due to the limited scope of analysis or the plugin's minimal functionality. Overall, the plugin is well-written regarding common vulnerabilities, but the lack of explicit nonce and robust capability checks warrants attention, especially if it's intended for more than basic utility.

Key Concerns

  • Missing nonce checks
  • Limited capability checks
Vulnerabilities
None known

Headless REST API Security Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Headless REST API Security Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
26 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

96% escaped27 total outputs
Attack Surface

Headless REST API Security Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menuincludes\admin-menu.php:5
filterrest_authentication_errorsincludes\api-auth.php:6
actiontemplate_redirectincludes\headless-redirect.php:6
filterallowed_redirect_hostsincludes\headless-redirect.php:40
actionadmin_enqueue_scriptsincludes\settings.php:46
actionadmin_initincludes\settings.php:51
Maintenance & Trust

Headless REST API Security Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 22, 2026
PHP min version7.4
Downloads243

Community Trust

Rating100/100
Number of ratings2
Active installs20
Developer Profile

Headless REST API Security Developer Profile

Md. Rakib Ullah

2 plugins · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Headless REST API Security

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/headless-rest-api-security/includes/admin.css
Version Parameters
headless-rest-api-security/includes/admin.css?ver=2.2

HTML / DOM Fingerprints

CSS Classes
hras-rowrow-master-togglemethod-checkactive-rowhras-table-wrapperhras-tableroute-headerallow-header+1 more
Data Attributes
name="hras_enabled"name="hras_headless_redirect"name="hras_api_key"name="hras_allowed_domain"name="hras_whitelisted_routes"
JS Globals
window.addEventListenerdocument.addEventListener
REST Endpoints
/wp/v2/posts/wp/v2/pages/wp/v2/users/wp/v2
FAQ

Frequently Asked Questions about Headless REST API Security