Json Reader Security & Risk Analysis

wordpress.org/plugins/json-reader

Fetches data from a Json file and displays it via shortcode, you can use the key parameter to filter the data

10 active installs v1.0 PHP + WP 4.6+ Updated Jul 24, 2017
jsonson-reader
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Json Reader Safe to Use in 2026?

Generally Safe

Score 85/100

Json Reader has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "json-reader" v1.0 plugin exhibits a generally strong security posture based on the static analysis. There are no identified vulnerabilities in its history, and the static analysis reveals a remarkably small attack surface with zero identified entry points. Furthermore, the plugin uses prepared statements for all SQL queries, which is a significant security strength. However, a notable concern arises from the low percentage of properly escaped output, indicating a potential risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without adequate sanitization.

The absence of identified dangerous functions, critical taint flows, and file operations is positive. The single external HTTP request, while not inherently a vulnerability, warrants further investigation to understand its purpose and whether it performs any validation or sanitization on the data it retrieves. The lack of nonce and capability checks on any potential entry points (even though none were identified) is a missed opportunity for defense-in-depth.

Given the lack of historical vulnerabilities and the minimal attack surface, the immediate risk appears low. However, the weak output escaping is a significant area of concern that could lead to vulnerabilities if the plugin evolves or its usage context changes. The plugin's creator appears to have a good understanding of secure coding for database interactions, but this is undermined by the inadequate handling of output.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce or capability checks implemented
Vulnerabilities
None known

Json Reader Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Json Reader Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Json Reader Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

Json Reader Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_initjson-reader.php:38
Maintenance & Trust

Json Reader Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedJul 24, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Json Reader Developer Profile

dessainsaraiva

4 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Json Reader

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/json-reader/style.css
Version Parameters
json-reader/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
jsonReader
FAQ

Frequently Asked Questions about Json Reader