Josie API Security & Risk Analysis

wordpress.org/plugins/josie-api

Adds endpoints for menus & tax-queries, as well as a server-side cache and CORS headers for the WordPress REST API.

10 active installs v0.1.3 PHP + WP 4.0+ Updated Nov 7, 2014
cachedogejsonrest-apiwp-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Josie API Safe to Use in 2026?

Generally Safe

Score 85/100

Josie API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "josie-api" plugin v0.1.3 exhibits an excellent security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, SQL queries, output operations, file operations, external HTTP requests, or taint flows is highly commendable. The code demonstrates rigorous adherence to security best practices by using prepared statements for all SQL queries and ensuring all output is properly escaped. Furthermore, the plugin has no known vulnerabilities, including CVEs, which suggests a well-maintained and secure codebase.

However, the analysis also reveals a complete lack of any functional entry points (AJAX handlers, REST API routes, shortcodes, cron events). This could indicate that the plugin is either not yet fully developed, serves a very niche and non-interactive purpose, or its functionality is accessed through means not covered by this static analysis. While this zero attack surface minimizes immediate risk, it also means the plugin's actual security impact in a real-world scenario is difficult to assess. The lack of nonce and capability checks, while not a direct risk given the absence of entry points, would become a significant concern if any entry points were to be introduced in future versions without proper authorization checks.

In conclusion, based purely on the provided data, "josie-api" v0.1.3 appears to be exceptionally secure. Its strengths lie in its clean code and lack of historical vulnerabilities. The primary weakness is the absence of discernible functionality and thus, a potential lack of real-world security testing or validation. The security of the plugin would need to be re-evaluated if any functional components are added.

Vulnerabilities
None known

Josie API Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Josie API Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Josie API Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Josie API Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Josie API Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedNov 7, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Josie API Developer Profile

Josh Pollock

8 plugins · 560 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Josie API

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/josie-api/build/index.asset.php
Script Paths
/wp-content/plugins/josie-api/build/index.js
Version Parameters
josie-api/build/index.asset.php?ver=josie-api/build/index.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Josie API