
REST API Custom Fields Security & Risk Analysis
wordpress.org/plugins/rest-api-custom-fieldsThis plugin enhances Wordpress REST API v2 responses about metadata
Is REST API Custom Fields Safe to Use in 2026?
Generally Safe
Score 85/100REST API Custom Fields has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the provided static analysis and vulnerability history, the "rest-api-custom-fields" plugin v1.3 exhibits a generally strong security posture. The absence of any identified dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, or external HTTP requests is commendable. Furthermore, the plugin has no recorded vulnerabilities (CVEs), indicating a history of stable and secure operation. The limited attack surface and the presence of capability checks, even if only one is noted, are positive signs.
However, there are areas that warrant attention. The static analysis reports 17 total output operations with 71% properly escaped, meaning 29% of outputs (approximately 5 outputs) are not properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly reflected in these unescaped outputs. Additionally, the complete lack of nonce checks is concerning, especially if any of the identified entry points, though stated as zero without auth checks, could potentially be exploited in certain configurations or future updates. While the current attack surface appears protected, the absence of these common security mechanisms presents a potential weakness.
In conclusion, the plugin has a solid foundation with no critical or high-risk issues identified in the code or its history. The use of prepared statements for SQL and the absence of major code flaws are significant strengths. The primary concerns are the unescaped outputs and the lack of nonce checks, which represent potential entry points for common web vulnerabilities like XSS. Addressing these specific areas would further enhance the plugin's overall security.
Key Concerns
- Unescaped output found
- Missing nonce checks
REST API Custom Fields Security Vulnerabilities
REST API Custom Fields Code Analysis
SQL Query Safety
Output Escaping
REST API Custom Fields Attack Surface
WordPress Hooks 4
Maintenance & Trust
REST API Custom Fields Maintenance & Trust
Maintenance Signals
Community Trust
REST API Custom Fields Alternatives
SMNTCS Disable REST API User Endpoints
smntcs-disable-rest-api-user-endpoints
Disable the REST API user endpoints due to obscure user slugs.
Custom API for WP
custom-api-for-wp
Connect WordPress with External APIs and create no-code custom WordPress REST API endpoints to interact with the WordPress database to perform SQL ope …
Ajax Load More: REST API
ajax-load-more-rest-api
An Ajax Load More extension that adds compatibility for the WP REST API.
SapientSEO
sapientseo
Adds secured custom REST API endpoints to integrate WordPress with the SapientSEO app.
Ultimate Endpoints With Rest Api
custom-wp-rest-api
The WordPress REST API is more than just a set of default routes.But you want to add your Custom Endpoints/routes to the WP REST API ? Fantastic! Let’ …
REST API Custom Fields Developer Profile
2 plugins · 81K total installs
How We Detect REST API Custom Fields
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/rest-api-custom-fields/assets/imapie.css/wp-content/plugins/rest-api-custom-fields/assets/imapie.js/wp-content/plugins/rest-api-custom-fields/assets/imapie.jsHTML / DOM Fingerprints
uncheck_alldata-statusintegromat_api_options_postintegromat_api_options_commentIMAPIE_FIELD_PREFIXIMAPIE_MENUITEM_IDENTIFIER/wp-json/integromatapi/