Require Auth Users REST Endpoint Security & Risk Analysis

wordpress.org/plugins/require-auth-users-rest-endpoint

Require authentication when accessing the /wp-json/wp/v2/users REST API endpoint.

30 active installs v1.0.0 PHP 7.2+ WP 6.5+ Updated Jan 13, 2026
apiauthenticationendpointrestusers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Require Auth Users REST Endpoint Safe to Use in 2026?

Generally Safe

Score 100/100

Require Auth Users REST Endpoint has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'require-auth-users-rest-endpoint' plugin, version 1.0.0, exhibits a very strong security posture based on the provided static analysis. The absence of any identified dangerous functions, SQL injection vulnerabilities, unescaped output, file operations, or external HTTP requests is a significant positive. The fact that all SQL queries utilize prepared statements and that the single capability check is present further reinforces this good practice. The plugin also has a clean vulnerability history with no known CVEs, indicating a history of secure development or effective patching.

The analysis shows zero entry points from AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. The taint analysis also reveals no identified flows with unsanitized paths, suggesting that user input, if processed, is being handled securely. The complete lack of any identified vulnerabilities in the history further strengthens the assessment of its current security.

Overall, this plugin appears to be developed with security as a high priority. The strengths far outweigh any potential concerns, and the absence of any identified vulnerabilities or exploitable code signals suggests a low risk of compromise. The plugin's limited attack surface and robust coding practices contribute to its secure profile.

Vulnerabilities
None known

Require Auth Users REST Endpoint Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Require Auth Users REST Endpoint Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Require Auth Users REST Endpoint Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterrest_pre_dispatchrequire-auth-users-rest-endpoint.php:63
Maintenance & Trust

Require Auth Users REST Endpoint Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 13, 2026
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Require Auth Users REST Endpoint Developer Profile

Sal Ferrarello

4 plugins · 5K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Require Auth Users REST Endpoint

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp/v2/users
FAQ

Frequently Asked Questions about Require Auth Users REST Endpoint