
JSONPress Security & Risk Analysis
wordpress.org/plugins/jsonpressJSONPress - Allows you to request WordPress site via JSON/JSONP output.
Is JSONPress Safe to Use in 2026?
Generally Safe
Score 85/100JSONPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'jsonpress' plugin version 0.3 exhibits a mixed security posture. On the positive side, the plugin has no recorded historical vulnerabilities, suggesting a generally well-maintained codebase or a lack of prior scrutiny. The static analysis reveals a commendably small attack surface with no apparent entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication or permission checks. Furthermore, it uses prepared statements for all SQL queries and avoids file operations and external HTTP requests, which are common vectors for exploits.
However, significant concerns arise from the output escaping. A low percentage (18%) of outputs are properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. If any of the 17 outputs are user-controlled or reflect data that could be manipulated by an attacker, this presents a clear and present danger. The taint analysis also flags two flows with unsanitized paths, though currently classified as no critical or high severity. This, combined with the lack of capability checks and nonce checks, means that any discovered vulnerability could potentially be exploited more easily. The absence of these fundamental security checks is a notable weakness, especially given the poor output escaping.
In conclusion, while 'jsonpress' v0.3 demonstrates strengths in limiting its attack surface and secure database interactions, the severe lack of proper output escaping and the absence of nonce and capability checks represent critical security weaknesses. The absence of historical vulnerabilities is a positive indicator, but it does not negate the immediate risks identified in the current code analysis. Users should be highly cautious and ensure that all outputs are properly sanitized before this plugin is used in a production environment.
Key Concerns
- Poor output escaping (18% properly escaped)
- Unsanitized paths in taint analysis
- No nonce checks
- No capability checks
JSONPress Security Vulnerabilities
JSONPress Code Analysis
Output Escaping
Data Flow Analysis
JSONPress Attack Surface
WordPress Hooks 11
Maintenance & Trust
JSONPress Maintenance & Trust
Maintenance Signals
Community Trust
JSONPress Alternatives
JSON API User
json-api-user
Extends the JSON API Plugin to allow RESTful user registration, authentication & many other User Meta, BP functions. A Pro version is also available.
CAFEHAUS API
cafe-api
兼容小程序、APP和H5的多端 API 插件,提供更加优雅的路由、入参和出参,开箱即用零依赖零设置,让前端用着更省心
JSON API Cincopa
json-api-cincopa
Extends the JSON API Plugin to allow RESTful Cincopa Easy Albums Listing for any user
JSON API Delete User
json-api-delete-user
Delete User with meta details add-ons for JSON API
Moby Blog
moby-blog
Moby Blog - One APP for All Your Wordpress Blog! FREE! Are you a Blogger? Have a WordPress Blog? Turn it for free into a user friendly app for smartph …
JSONPress Developer Profile
6 plugins · 1K total installs
How We Detect JSONPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/jsonpress/options/images/icon-setting-small.png/wp-content/plugins/jsonpress/options/images/icon-setting-large.png/wp-content/plugins/jsonpress/options/images/about-small.png/wp-content/plugins/jsonpress/options/images/about-large.pngHTML / DOM Fingerprints
data-setting-group="jsonpress-settings"data-setting-name="site_domain"data-setting-name="api_domain"data-setting-name="exclude_columns"data-setting-name="exclude_query"/wp-json/jsonpress/wp-json/jsonpress/v1/wp-json/jsonpress/v1/posts