REST API for Relevanssi Security & Risk Analysis

wordpress.org/plugins/rest-api-for-relevanssi

The plugin provides a REST API endpoint for the Relevanssi search plugin.

200 active installs v1.18 PHP 5.6+ WP 4.6+ Updated May 14, 2023
apirelevanssirest-apisearch
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is REST API for Relevanssi Safe to Use in 2026?

Generally Safe

Score 85/100

REST API for Relevanssi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "rest-api-for-relevanssi" plugin, version 1.18, exhibits a mixed security posture. On the positive side, the plugin demonstrates good coding practices by utilizing prepared statements for all SQL queries and properly escaping all identified output. There are no recorded vulnerabilities (CVEs) for this plugin, nor have there been any in its history, suggesting a generally well-maintained and secure codebase. However, a significant concern arises from the static analysis, which reveals one unprotected REST API route. This represents a potential entry point for attackers that lacks any form of authentication or capability check, making it susceptible to unauthorized access and manipulation.

The lack of any dangerous function usage and zero taint analysis findings are positive indicators of security. The single identified capability check is applied to the plugin's entry points in general, but it's critically missing for the specific REST API route identified as unprotected. The absence of AJAX handlers, shortcodes, cron events, file operations, external HTTP requests, and bundled libraries further reduces the overall attack surface. Despite the strong practices in other areas, the unprotected REST API route is a notable weakness that needs immediate attention, as it bypasses standard WordPress security measures.

In conclusion, while the plugin has a clean vulnerability history and employs good practices for SQL and output handling, the presence of an unprotected REST API route presents a clear and immediate security risk. This single vulnerability significantly undermines the plugin's overall security. Addressing this unprotected route is paramount to improving its security posture and mitigating potential exploitation.

Key Concerns

  • Unprotected REST API route
Vulnerabilities
None known

REST API for Relevanssi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

REST API for Relevanssi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
11 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped11 total outputs
Attack Surface
1 unprotected

REST API for Relevanssi Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GETPOST/wp-json/relevanssi/v1searchrest-api-for-relevanssi.php:51
WordPress Hooks 1
actionrest_api_initrest-api-for-relevanssi.php:41
Maintenance & Trust

REST API for Relevanssi Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedMay 14, 2023
PHP min version5.6
Downloads7K

Community Trust

Rating100/100
Number of ratings3
Active installs200
Developer Profile

REST API for Relevanssi Developer Profile

Sergiy Dzysyak

4 plugins · 200 total installs

80
trust score
Avg Security Score
80/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect REST API for Relevanssi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/relevanssi/v1/search
FAQ

Frequently Asked Questions about REST API for Relevanssi