WordPress REST API – Authentication Broker Security & Risk Analysis

wordpress.org/plugins/rest-api-broker

Used together with the WP REST API OAuth 1.0a Server plugin, this allows the WP RET API Authentication Broker

10 active installs v0.1.0 PHP + WP 4.4+ Updated Oct 6, 2016
apijsonoauthrestrest-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WordPress REST API – Authentication Broker Safe to Use in 2026?

Generally Safe

Score 85/100

WordPress REST API – Authentication Broker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The rest-api-broker plugin version 0.1.0 exhibits a mixed security posture. While the code demonstrates good practices such as using prepared statements for all SQL queries and properly escaping all output, a significant concern arises from its attack surface. There is one unprotected REST API route, presenting a clear entry point for potential attackers. The lack of nonce and capability checks on this route is a critical oversight, leaving it vulnerable to unauthorized access and manipulation.

The static analysis reveals no dangerous functions, file operations, or critical taint flows, which are positive indicators. However, the presence of an external HTTP request without any explicit security context in the provided data warrants further investigation, though it is not a deduction without more information. The plugin's vulnerability history is clean, with no recorded CVEs. This absence of historical issues is encouraging but does not mitigate the immediate risks identified in the current code analysis, particularly the unprotected REST API route.

In conclusion, the plugin benefits from secure coding practices in data handling. The primary weakness is the exposed REST API route, which requires immediate attention. Until this is secured, the plugin carries a notable risk of unauthorized access and potential compromise through this entry point. The lack of historical vulnerabilities suggests diligent development, but this latest version has introduced a significant security gap.

Key Concerns

  • Unprotected REST API route
  • Missing capability checks on REST API
  • Missing nonce checks on REST API
Vulnerabilities
None known

WordPress REST API – Authentication Broker Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WordPress REST API – Authentication Broker Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0
Attack Surface
1 unprotected

WordPress REST API – Authentication Broker Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/broker/v1/connectplugin.php:21
WordPress Hooks 3
actionshutdowninc\class-wp-rest-authbroker.php:90
actionrest_api_initplugin.php:10
actionrest_indexplugin.php:46
Maintenance & Trust

WordPress REST API – Authentication Broker Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedOct 6, 2016
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WordPress REST API – Authentication Broker Developer Profile

Joe Hoyle

4 plugins · 10K total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WordPress REST API – Authentication Broker

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rest-api-broker/inc/class-wp-rest-authbroker.php

HTML / DOM Fingerprints

HTML Comments
<!-- TODO: move to arg validation -->
REST Endpoints
broker/v1/connect
FAQ

Frequently Asked Questions about WordPress REST API – Authentication Broker