REST WP Security & Risk Analysis

wordpress.org/plugins/rest-wp

Say goodbye to juggling multiple tools - REST WP allows you to test and utilize APIs with ease, all from within your WordPress dashboard! Effortlessly …

10 active installs v1.0.0 PHP 5.6+ WP 3.9+ Updated Jan 2, 2023
api-testingrest-apiwp-rest-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is REST WP Safe to Use in 2026?

Generally Safe

Score 85/100

REST WP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'rest-wp' plugin version 1.0.0 exhibits a generally strong security posture based on the static analysis. It demonstrates excellent adherence to secure coding practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and properly escaping a high percentage of its output. The absence of file operations and external HTTP requests further reduces potential attack vectors. The plugin also has no recorded vulnerability history, which is a positive indicator of its stability and security over time.

However, two areas raise concerns. The presence of two taint flows with unsanitized paths, even though they are not flagged as critical or high severity, warrants attention. This suggests that there might be paths within the code where user-supplied data could be processed in an insecure manner. Additionally, the complete lack of nonce checks and capability checks across all identified entry points (though there are none in this version) is a significant weakness. If any entry points were to be introduced in future versions without proper authentication or authorization, the plugin would be immediately vulnerable.

In conclusion, while 'rest-wp' v1.0.0 is built on a foundation of good security practices, the identified unsanitized taint flows and the complete absence of authentication/authorization mechanisms are potential risks that should be addressed to ensure a more robust security profile, especially as the plugin evolves.

Key Concerns

  • Taint flows with unsanitized paths (2)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

REST WP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

REST WP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
58 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

95% escaped61 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
rest_wp_page_content (admin\functions.php:7)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

REST WP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuadmin\view.php:20
actionactivated_pluginrest-api-checker.php:20
Maintenance & Trust

REST WP Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedJan 2, 2023
PHP min version5.6
Downloads933

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

REST WP Developer Profile

Rajin Sharwar

7 plugins · 340 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect REST WP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about REST WP