Op Custom API Security & Risk Analysis

wordpress.org/plugins/op-custom-api

The most powerful user, role, and capability management plugin for WordPress.

10 active installs v5.1.7 PHP 5.6+ WP 5.0+ Updated Aug 8, 2019
capabilitiesmembersrolesusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Op Custom API Safe to Use in 2026?

Generally Safe

Score 85/100

Op Custom API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'op-custom-api' plugin v5.1.7 exhibits a very low attack surface based on the provided static analysis. There are no exposed AJAX handlers, REST API routes, shortcodes, or cron events, and all detected SQL queries utilize prepared statements, indicating good practices in these areas. The absence of file operations, external HTTP requests, and bundled libraries further contributes to a seemingly secure baseline. However, a significant concern arises from the lack of output escaping, as 100% of identified outputs are not properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if any data displayed to users originates from an untrusted source and is not sanitized before output.

The vulnerability history for this plugin is entirely clean, with no recorded CVEs of any severity. This is a positive indicator, suggesting a history of secure development or a lack of targeting. However, the lack of observed taint flows and the minimal code signals analyzed also means there might be undiscovered vulnerabilities, especially considering the unescaped output. While the plugin demonstrates strengths in its limited attack surface and SQL handling, the unescaped output presents a clear and present risk that needs immediate attention. The absence of any recorded vulnerabilities, while positive, should be viewed cautiously alongside the identified code signal concerning output escaping.

Key Concerns

  • 100% of outputs are not properly escaped
Vulnerabilities
None known

Op Custom API Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Op Custom API Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Op Custom API Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuop-custom-api.php:49
actionoca_main_menuop-custom-api.php:73
filterwoocommerce_rest_prepare_shop_order_objectop-custom-api.php:101
Maintenance & Trust

Op Custom API Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedAug 8, 2019
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Op Custom API Developer Profile

maiuoc

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Op Custom API

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
This is custom Api in wp akakakakaDay la 0Day la 1Day la 2
FAQ

Frequently Asked Questions about Op Custom API