Puti Content Core Security & Risk Analysis

wordpress.org/plugins/puti-content-core

A simple REST API plugin to embed content snippets from WordPress onto any external static website using JavaScript.

0 active installs v1.1.0 PHP 7.4+ WP 5.8+ Updated Feb 9, 2026
contentexternal-contentheadlessrest-apisimple
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Puti Content Core Safe to Use in 2026?

Generally Safe

Score 100/100

Puti Content Core has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The puti-content-core plugin version 1.1.0 exhibits a generally good security posture due to the absence of known vulnerabilities and critical taint analysis findings. The plugin also demonstrates good practices by using prepared statements for all SQL queries and performing capability checks. However, there are notable concerns regarding its attack surface and output escaping. Specifically, one of the three REST API routes lacks a permission callback, creating a potential entry point for unauthenticated access. Additionally, a significant portion (33%) of output operations are not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully. While the plugin has no recorded vulnerability history, this doesn't guarantee future safety, especially given the identified weaknesses. In conclusion, the plugin shows promise with its secure SQL handling and lack of past major flaws, but the presence of an unprotected REST API route and insufficient output escaping warrants attention and improvement to solidify its security.

Key Concerns

  • REST API route without permission callback
  • Significant percentage of unescaped output
Vulnerabilities
None known

Puti Content Core Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Puti Content Core Release Timeline

v1.1.0Current
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Puti Content Core Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
18 escaped
Nonce Checks
1
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped27 total outputs
Attack Surface
1 unprotected

Puti Content Core Attack Surface

Entry Points3
Unprotected1

REST API Routes 3

GET/wp-json/puti-content-core/v1/article/(?P<code>[a-zA-Z0-9-]+)includes\class-rest-api.php:25
GET/wp-json/puti-content-core/v1/script.jsincludes\class-rest-api.php:32
GET/wp-json/puti-content-core/v1/preview/(?P<id>[\d]+)includes\class-rest-api.php:39
WordPress Hooks 17
filtermanage_puticoco_article_posts_columnsincludes\class-admin-list.php:17
filtermanage_edit-puticoco_article_sortable_columnsincludes\class-admin-list.php:18
actionpre_get_postsincludes\class-admin-list.php:19
actionmanage_puticoco_article_posts_custom_columnincludes\class-admin-list.php:20
actionadmin_menuincludes\class-admin-settings.php:19
actionadmin_initincludes\class-admin-settings.php:20
actionadd_meta_boxesincludes\class-admin-ui.php:17
actionadd_meta_boxesincludes\class-admin-ui.php:18
actionsave_postincludes\class-admin-ui.php:19
actionadmin_enqueue_scriptsincludes\class-admin-ui.php:20
filtermce_cssincludes\class-admin-ui.php:21
actioninitincludes\class-post-type.php:17
actioninitincludes\class-post-type.php:18
actionwp_enqueue_scriptsincludes\class-post-type.php:19
actionwp_headincludes\class-post-type.php:20
filtertemplate_includeincludes\class-post-type.php:21
actionrest_api_initincludes\class-rest-api.php:17
Maintenance & Trust

Puti Content Core Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 9, 2026
PHP min version7.4
Downloads258

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Puti Content Core Developer Profile

KSI Inc. (sakakibara)

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Puti Content Core

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/puti-content-core/assets/admin-script.js
Script Paths
/wp-content/plugins/puti-content-core/assets/admin-script.js
Version Parameters
puti-content-core/assets/admin-script.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-code
JS Globals
puticoco_PluginData
REST Endpoints
/wp-json/puti-content-core/v1/script.js
Shortcode Output
<puti-content
FAQ

Frequently Asked Questions about Puti Content Core