JSON Feeder Security & Risk Analysis

wordpress.org/plugins/json-feeder

Adds a feed based on the jsonfeed.org standard that one can subscribe to or parse.

10 active installs v1.0.6 PHP + WP 4.0+ Updated Unknown
feedfeedsjsonjsonfeed
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JSON Feeder Safe to Use in 2026?

Generally Safe

Score 100/100

JSON Feeder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'json-feeder' v1.0.6 plugin exhibits a strong security posture based on the provided static analysis. The absence of identifiable entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code signals indicate a conscientious approach to security, with no dangerous functions, all SQL queries using prepared statements, and no file operations or external HTTP requests being made. This suggests a well-contained and carefully developed plugin.

However, the analysis does reveal a critical concern regarding output escaping. With only 17% of the outputs properly escaped, there is a high risk of cross-site scripting (XSS) vulnerabilities. Any data displayed to users that originates from untrusted sources and is not properly escaped could be exploited by attackers to inject malicious scripts. The lack of capability checks and nonce checks, while less concerning given the limited attack surface, still represents missed opportunities for robust security.

The plugin's vulnerability history is entirely clear, with no known CVEs or past issues. This, combined with the static analysis findings, indicates that the plugin has likely been developed with security in mind. Despite the strong history, the significant issue with output escaping warrants attention. The overall security is good due to the minimal attack surface and good practices in critical areas like SQL, but the unescaped output remains a notable weakness.

Key Concerns

  • Unescaped output is prevalent
  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

JSON Feeder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

JSON Feeder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

17% escaped6 total outputs
Attack Surface

JSON Feeder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitjson-feeder.php:51
actiondo_feed_jsonjson-feeder.php:52
filtertemplate_includejson-feeder.php:53
filterquery_varsjson-feeder.php:54
actionwp_headjson-feeder.php:55
Maintenance & Trust

JSON Feeder Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

JSON Feeder Developer Profile

Signalfade

3 plugins · 30 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JSON Feeder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/json-feeder/json-feeder.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about JSON Feeder