JournalAi Security & Risk Analysis

wordpress.org/plugins/journalai

JournalAi provides a custom REST API for WordPress, enabling advanced functionality for blog automation and AI integration.

10 active installs v1.0 PHP 7.2+ WP 4.7+ Updated Jan 22, 2025
aicontent-automationcustom-pluginopenairest-api
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is JournalAi Safe to Use in 2026?

Generally Safe

Score 92/100

JournalAi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "journalai" v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, and external HTTP requests is a significant positive. The fact that all SQL queries utilize prepared statements and all output is properly escaped demonstrates good development practices for preventing common injection and cross-site scripting vulnerabilities. Furthermore, the plugin has no recorded vulnerabilities (CVEs), indicating a clean history.

However, there are specific areas of concern that reduce its overall security. The most significant is the presence of one REST API route that lacks a permission callback. This creates a direct entry point into the plugin's functionality that is not protected by WordPress's authentication and authorization mechanisms, potentially allowing unauthenticated users to interact with sensitive features. The lack of nonce checks across all AJAX handlers is another notable weakness, as it means these handlers are not protected against Cross-Site Request Forgery (CSRF) attacks.

In conclusion, while "journalai" v1.0 demonstrates a good understanding of core security principles like prepared statements and output escaping, the unprotected REST API route and the absence of nonce checks on AJAX handlers represent significant security weaknesses that need to be addressed. The clean vulnerability history is a positive but does not mitigate the risks posed by the current static analysis findings. Addressing these specific entry points will significantly improve the plugin's security.

Key Concerns

  • REST API route without permission callback
  • 0 Nonce checks on AJAX handlers
Vulnerabilities
None known

JournalAi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

JournalAi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

100% escaped11 total outputs
Attack Surface
1 unprotected

JournalAi Attack Surface

Entry Points8
Unprotected1

REST API Routes 8

POST/wp-json/journalai/v1/loginjournalai.php:46
DELETE/wp-json/journalai/v1/delete-tokenjournalai.php:53
GET/wp-json/journalai/v1/user-datajournalai.php:60
GET/wp-json/journalai/v1/get-categoriesjournalai.php:67
GET/wp-json/journalai/v1/get-media-idjournalai.php:74
POST/wp-json/journalai/v1/create-postjournalai.php:90
GET/wp-json/journalai/v1/get-usersjournalai.php:97
POST/wp-json/journalai/v1/upload-imagejournalai.php:104
WordPress Hooks 2
actionrest_pre_serve_requestjournalai.php:23
actionrest_api_initjournalai.php:44
Maintenance & Trust

JournalAi Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 22, 2025
PHP min version7.2
Downloads586

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

JournalAi Developer Profile

matiasbarrera90

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JournalAi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/journalai/v1/login/journalai/v1/delete-token/journalai/v1/user-data/journalai/v1/get-categories/journalai/v1/get-media-id/journalai/v1/create-post/journalai/v1/get-users/journalai/v1/upload-image
FAQ

Frequently Asked Questions about JournalAi