
WordPress REST API – Authentication Broker Security & Risk Analysis
wordpress.org/plugins/rest-api-brokerUsed together with the WP REST API OAuth 1.0a Server plugin, this allows the WP RET API Authentication Broker
Is WordPress REST API – Authentication Broker Safe to Use in 2026?
Generally Safe
Score 85/100WordPress REST API – Authentication Broker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The rest-api-broker plugin version 0.1.0 exhibits a mixed security posture. While the code demonstrates good practices such as using prepared statements for all SQL queries and properly escaping all output, a significant concern arises from its attack surface. There is one unprotected REST API route, presenting a clear entry point for potential attackers. The lack of nonce and capability checks on this route is a critical oversight, leaving it vulnerable to unauthorized access and manipulation.
The static analysis reveals no dangerous functions, file operations, or critical taint flows, which are positive indicators. However, the presence of an external HTTP request without any explicit security context in the provided data warrants further investigation, though it is not a deduction without more information. The plugin's vulnerability history is clean, with no recorded CVEs. This absence of historical issues is encouraging but does not mitigate the immediate risks identified in the current code analysis, particularly the unprotected REST API route.
In conclusion, the plugin benefits from secure coding practices in data handling. The primary weakness is the exposed REST API route, which requires immediate attention. Until this is secured, the plugin carries a notable risk of unauthorized access and potential compromise through this entry point. The lack of historical vulnerabilities suggests diligent development, but this latest version has introduced a significant security gap.
Key Concerns
- Unprotected REST API route
- Missing capability checks on REST API
- Missing nonce checks on REST API
WordPress REST API – Authentication Broker Security Vulnerabilities
WordPress REST API – Authentication Broker Code Analysis
WordPress REST API – Authentication Broker Attack Surface
REST API Routes 1
WordPress Hooks 3
Maintenance & Trust
WordPress REST API – Authentication Broker Maintenance & Trust
Maintenance Signals
Community Trust
WordPress REST API – Authentication Broker Alternatives
JWT Authentication for WP REST API
jwt-authentication-for-wp-rest-api
Extends the WP REST API using JSON Web Tokens Authentication as an authentication method.
Disable REST API
disable-json-api
Disable the use of the REST API on your website to site users. Now with User Role support!
Disable WP REST API
disable-wp-rest-api
Disables the WP REST API for visitors not logged into WordPress.
WordPress REST API (Version 2)
rest-api
Access your site's data through an easy-to-use HTTP REST API. (Version 2)
WP REST API – OAuth 1.0a Server
rest-api-oauth1
Connect applications to your WordPress site without ever giving away your password.
WordPress REST API – Authentication Broker Developer Profile
4 plugins · 10K total installs
How We Detect WordPress REST API – Authentication Broker
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/rest-api-broker/inc/class-wp-rest-authbroker.phpHTML / DOM Fingerprints
<!-- TODO: move to arg validation -->broker/v1/connect