JSONPress Security & Risk Analysis

wordpress.org/plugins/jsonpress

JSONPress - Allows you to request WordPress site via JSON/JSONP output.

10 active installs v0.3 PHP + WP 3.5.1+ Updated Aug 28, 2013
apijsonjsonprestrestful
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is JSONPress Safe to Use in 2026?

Generally Safe

Score 85/100

JSONPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'jsonpress' plugin version 0.3 exhibits a mixed security posture. On the positive side, the plugin has no recorded historical vulnerabilities, suggesting a generally well-maintained codebase or a lack of prior scrutiny. The static analysis reveals a commendably small attack surface with no apparent entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication or permission checks. Furthermore, it uses prepared statements for all SQL queries and avoids file operations and external HTTP requests, which are common vectors for exploits.

However, significant concerns arise from the output escaping. A low percentage (18%) of outputs are properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. If any of the 17 outputs are user-controlled or reflect data that could be manipulated by an attacker, this presents a clear and present danger. The taint analysis also flags two flows with unsanitized paths, though currently classified as no critical or high severity. This, combined with the lack of capability checks and nonce checks, means that any discovered vulnerability could potentially be exploited more easily. The absence of these fundamental security checks is a notable weakness, especially given the poor output escaping.

In conclusion, while 'jsonpress' v0.3 demonstrates strengths in limiting its attack surface and secure database interactions, the severe lack of proper output escaping and the absence of nonce and capability checks represent critical security weaknesses. The absence of historical vulnerabilities is a positive indicator, but it does not negate the immediate risks identified in the current code analysis. Users should be highly cautious and ensure that all outputs are properly sanitized before this plugin is used in a production environment.

Key Concerns

  • Poor output escaping (18% properly escaped)
  • Unsanitized paths in taint analysis
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

JSONPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

JSONPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

18% escaped17 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
jsonpress_json_output (jsonpress.php:297)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

JSONPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actioninitjsonpress.php:25
filtersite_urljsonpress.php:27
filterhome_urljsonpress.php:28
filtertemplate_includejsonpress.php:29
actionpre_get_postsjsonpress.php:30
filterrewrite_rules_arrayjsonpress.php:33
filterquery_varsjsonpress.php:34
actiontemplate_redirectjsonpress.php:37
actionadmin_noticesjsonpress.php:45
actionadmin_initoptions\easy-options.php:44
actionadmin_menuoptions\easy-options.php:45
Maintenance & Trust

JSONPress Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedAug 28, 2013
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

JSONPress Developer Profile

takien

6 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JSONPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jsonpress/options/images/icon-setting-small.png/wp-content/plugins/jsonpress/options/images/icon-setting-large.png/wp-content/plugins/jsonpress/options/images/about-small.png/wp-content/plugins/jsonpress/options/images/about-large.png

HTML / DOM Fingerprints

Data Attributes
data-setting-group="jsonpress-settings"data-setting-name="site_domain"data-setting-name="api_domain"data-setting-name="exclude_columns"data-setting-name="exclude_query"
REST Endpoints
/wp-json/jsonpress/wp-json/jsonpress/v1/wp-json/jsonpress/v1/posts
FAQ

Frequently Asked Questions about JSONPress