JSON API Delete User Security & Risk Analysis

wordpress.org/plugins/json-api-delete-user

Delete User with meta details add-ons for JSON API

10 active installs v1.0 PHP + WP 3.0.1+ Updated Unknown
delete-user-apidelete-usermetajson-apijson-api-delete-userrestful-delete-user
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JSON API Delete User Safe to Use in 2026?

Generally Safe

Score 100/100

JSON API Delete User has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "json-api-delete-user" v1.0 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of identified dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and unescaped output are significant strengths. The plugin also correctly implements a nonce check, which is crucial for protecting against certain types of attacks. The zero recorded CVEs and lack of historical vulnerabilities further suggest a well-maintained or less-targeted plugin.

However, a notable concern is the complete lack of capability checks for any of its entry points. While the static analysis shows zero unprotected entry points, the absence of explicit capability checks means that access control is likely relying solely on WordPress's default behavior or is implicitly handled by other plugin components not detailed here. This could be a potential weakness if the plugin's functionality is sensitive and not adequately protected by the core WordPress roles and capabilities system. The presence of two external HTTP requests without explicit mention of their security context also warrants careful review, though without further detail, a specific risk cannot be quantified.

In conclusion, the plugin demonstrates good adherence to fundamental security practices like prepared statements and output escaping. The primary area for improvement and potential risk lies in the explicit absence of capability checks, which could inadvertently expose sensitive functionality if not properly managed by the WordPress environment or other plugins. The lack of historical vulnerabilities is a positive indicator, but it does not negate the need for robust access control within the plugin itself.

Key Concerns

  • Missing capability checks
Vulnerabilities
None known

JSON API Delete User Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

JSON API Delete User Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

JSON API Delete User Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_noticesjson-api-delete-user.php:17
filterjson_api_controllersjson-api-delete-user.php:21
filterjson_api_user_controller_pathjson-api-delete-user.php:22
actioninitjson-api-delete-user.php:23
Maintenance & Trust

JSON API Delete User Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

JSON API Delete User Developer Profile

Faiyaz Vaid

6 plugins · 5K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JSON API Delete User

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/user/delete_user_with_meta
FAQ

Frequently Asked Questions about JSON API Delete User