
REST API for Relevanssi Security & Risk Analysis
wordpress.org/plugins/rest-api-for-relevanssiThe plugin provides a REST API endpoint for the Relevanssi search plugin.
Is REST API for Relevanssi Safe to Use in 2026?
Generally Safe
Score 85/100REST API for Relevanssi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "rest-api-for-relevanssi" plugin, version 1.18, exhibits a mixed security posture. On the positive side, the plugin demonstrates good coding practices by utilizing prepared statements for all SQL queries and properly escaping all identified output. There are no recorded vulnerabilities (CVEs) for this plugin, nor have there been any in its history, suggesting a generally well-maintained and secure codebase. However, a significant concern arises from the static analysis, which reveals one unprotected REST API route. This represents a potential entry point for attackers that lacks any form of authentication or capability check, making it susceptible to unauthorized access and manipulation.
The lack of any dangerous function usage and zero taint analysis findings are positive indicators of security. The single identified capability check is applied to the plugin's entry points in general, but it's critically missing for the specific REST API route identified as unprotected. The absence of AJAX handlers, shortcodes, cron events, file operations, external HTTP requests, and bundled libraries further reduces the overall attack surface. Despite the strong practices in other areas, the unprotected REST API route is a notable weakness that needs immediate attention, as it bypasses standard WordPress security measures.
In conclusion, while the plugin has a clean vulnerability history and employs good practices for SQL and output handling, the presence of an unprotected REST API route presents a clear and immediate security risk. This single vulnerability significantly undermines the plugin's overall security. Addressing this unprotected route is paramount to improving its security posture and mitigating potential exploitation.
Key Concerns
- Unprotected REST API route
REST API for Relevanssi Security Vulnerabilities
REST API for Relevanssi Code Analysis
Output Escaping
REST API for Relevanssi Attack Surface
REST API Routes 1
WordPress Hooks 1
Maintenance & Trust
REST API for Relevanssi Maintenance & Trust
Maintenance Signals
Community Trust
REST API for Relevanssi Alternatives
SearchWP API
searchwp-api
Run advanced searches via the WordPress REST API and SearchWP.
WooCommerce Legacy REST API
woocommerce-legacy-rest-api
The WooCommerce Legacy REST API, which is now part of WooCommerce itself but will be removed in WooCommerce 9.0.
Disable REST API
disable-json-api
Disable the use of the REST API on your website to site users. Now with User Role support!
Make Connector
integromat-connector
Make Connector. Make lets you design, build, and automate by connecting with WordPress in just a few clicks.
JWT Authentication for WP REST API
jwt-authentication-for-wp-rest-api
Extends the WP REST API using JSON Web Tokens Authentication as an authentication method.
REST API for Relevanssi Developer Profile
4 plugins · 200 total installs
How We Detect REST API for Relevanssi
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
/relevanssi/v1/search