NexMind Security & Risk Analysis

wordpress.org/plugins/nexmind

A WordPress plugin that brings your generated content into WordPress Posts.

10 active installs v1.0.3 PHP 7.0+ WP 4.7+ Updated Jun 7, 2024
ai-content-generatornexmindnexmind-aiseo-automation
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is NexMind Safe to Use in 2026?

Generally Safe

Score 92/100

NexMind has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The Nexmind plugin v1.0.3 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for all SQL queries, has a high rate of output escaping, and includes a nonce check and a capability check, indicating an awareness of some security fundamentals. It also reports no known historical vulnerabilities, which is a positive sign. However, a significant concern lies in its attack surface. All three identified REST API routes lack permission callbacks, meaning they are accessible to any user, including unauthenticated ones. Furthermore, the taint analysis reveals one flow with unsanitized paths of high severity, which is a critical weakness that could lead to various injection attacks if exploited.

While the absence of known CVEs and dangerous functions is encouraging, the exposed REST API endpoints and the high-severity unsanitized taint flow present a clear and present danger. The plugin's strengths in SQL handling and output escaping are overshadowed by these critical vulnerabilities in its entry points and data handling. The lack of historical vulnerabilities could be attributed to its relatively new status or perhaps a lack of thorough security auditing to date. It is crucial to address the unprotected REST API routes and the identified taint flow immediately to mitigate potential exploitation.

Key Concerns

  • Unprotected REST API routes
  • High severity taint flow with unsanitized path
Vulnerabilities
None known

NexMind Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

NexMind Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
3
37 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

93% escaped40 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
nxmind_custom_plugin_users_page_callback (wl-api.php:282)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

NexMind Attack Surface

Entry Points3
Unprotected3

REST API Routes 3

POST/wp-json/wp/v2/postswl-api.php:463
GET/wp-json/wp/v2/posts/(?P<page_id>\d+)wl-api.php:471
GET/wp-json/wp/v2/posts/(?P<page_id>\d+)wl-api.php:479
WordPress Hooks 7
actionadmin_menuwl-api.php:252
actionadmin_menuwl-api.php:280
filterrest_pre_dispatchwl-api.php:436
filterkses_allowed_protocolswl-api.php:456
actionrest_api_initwl-api.php:462
actionrest_api_initwl-api.php:470
actionrest_api_initwl-api.php:478
Maintenance & Trust

NexMind Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 7, 2024
PHP min version7.0
Downloads839

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

NexMind Developer Profile

techteamnexmind

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect NexMind

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/nexmind/v1/posts/wp-json/nexmind/v1/posts/delete/wp-json/nexmind/v1/posts/update
FAQ

Frequently Asked Questions about NexMind