JSON Options Security & Risk Analysis

wordpress.org/plugins/json-options

Import and Export Wordpress Options to/from JSON with filters.

10 active installs v0.0.4 PHP + WP 3.1+ Updated Jun 21, 2013
developerdevelopmentexportimportoptions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JSON Options Safe to Use in 2026?

Generally Safe

Score 85/100

JSON Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "json-options" plugin v0.0.4 exhibits a concerning security posture despite a lack of recorded vulnerabilities. The static analysis reveals significant security weaknesses, most notably the presence of the `unserialize` function, which is inherently risky when dealing with user-controlled input due to potential deserialization vulnerabilities. Furthermore, the plugin has no output escaping implemented, meaning any data output by the plugin is not protected from cross-site scripting (XSS) attacks. The taint analysis also indicates two flows with unsanitized paths, which, while not classified as critical or high severity in this analysis, are potential indicators of where vulnerabilities could arise if user input is not properly handled. The complete absence of nonce and capability checks on any potential entry points, although the entry point count is zero, suggests a lack of fundamental security practices if any entry points were to be introduced or if the current analysis is incomplete.

While the plugin has no documented vulnerability history, this is not a strong indicator of its current security. The lack of external HTTP requests and the absence of critical or high severity taint flows are positive signals. However, the identified code signals, particularly the use of `unserialize` and the complete lack of output escaping, present significant risks that could be exploited. The absence of SQL prepared statements on its single SQL query also adds to the risk of SQL injection. The plugin needs substantial security improvements to mitigate these risks before it can be considered safe.

Key Concerns

  • Dangerous function 'unserialize' found
  • 0% output escaping
  • 2 unsanitized taint flows
  • 0 capability checks
  • 0 nonce checks
  • SQL query not using prepared statements
Vulnerabilities
None known

JSON Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

JSON Options Code Analysis

Dangerous Functions
2
Raw SQL Queries
1
0 prepared
Unescaped Output
16
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$field['options'] = unserialize($field['options']);json-options.php:441
unserialize$v = unserialize($v);json-options.php:595

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped16 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
save_fields (json-options.php:554)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

JSON Options Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionnetwork_admin_menujson-options.php:236
actionadmin_menujson-options.php:238
actionadmin_menujson-options.php:240
actioninitjson-options.php:772
Maintenance & Trust

JSON Options Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJun 21, 2013
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

JSON Options Developer Profile

Jeremy Bradbury

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JSON Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/json-options/json-options.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about JSON Options