RNWP App template config Security & Risk Analysis

wordpress.org/plugins/rnwp-app-template-config

This plugin adds search functionality through REST API over all enabled post types and adjust the maximum numbers of posts to fetch through the REST A …

10 active installs v1.0.1 PHP 7.0+ WP 1.0.0+ Updated Apr 24, 2022
androidiosmobile-appreact-nativerest-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is RNWP App template config Safe to Use in 2026?

Generally Safe

Score 85/100

RNWP App template config has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "rnwp-app-template-config" plugin, version 1.0.1, presents a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and implementing a good percentage of output escaping. There are no recorded vulnerabilities in its history, suggesting a generally stable codebase. However, a significant concern arises from its attack surface. The plugin exposes one REST API route without any permission callbacks, making it accessible to unauthenticated users. Furthermore, all 13 taint analysis flows analyzed involve unsanitized paths, which is a critical indicator of potential vulnerabilities, even though no specific high or critical severities were reported in the taint analysis itself. The presence of 13 unsanitized path flows is particularly worrying as it suggests that user-supplied input could potentially be used to manipulate file operations or access sensitive data, despite the lack of direct file operations or external HTTP requests reported.

While the plugin's vulnerability history is clean and it avoids common pitfalls like raw SQL queries and dangerous functions, the combination of an unprotected REST API endpoint and a high number of unsanitized path flows in taint analysis creates a substantial risk. The lack of authentication on a REST API endpoint means any user can interact with it, and if that interaction is not properly validated, it could lead to security issues. The 13 unsanitized path flows are a strong signal that input validation and sanitization are likely insufficient. A balanced conclusion would highlight the strengths in SQL handling and output escaping but emphasize the critical need to address the unprotected REST API and the pervasive unsanitized path flows before this plugin can be considered secure.

Key Concerns

  • REST API route without permission callback
  • 13 unsanitized path flows in taint analysis
Vulnerabilities
None known

RNWP App template config Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

RNWP App template config Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
33
105 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

76% escaped138 total outputs
Data Flows
13 unsanitized

Data Flow Analysis

13 flows13 with unsanitized paths
mkrnwp_offline_per_page (inc\appearance-settings.php:402)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

RNWP App template config Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/search/v1searchinc\search-api.php:9
WordPress Hooks 8
filteradmin_initinc\appearance-settings.php:21
actioninitinc\appearance-settings.php:22
actioninitinc\appearance-settings.php:23
actioninitinc\appearance-settings.php:24
actionadmin_enqueue_scriptsinc\appearance-settings.php:25
actionadmin_initinc\rnwp-settings.php:15
actionadmin_menuinc\rnwp-settings.php:17
actionrest_api_initinc\search-api.php:2
Maintenance & Trust

RNWP App template config Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedApr 24, 2022
PHP min version7.0
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

RNWP App template config Developer Profile

mkhaledche

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RNWP App template config

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rnwp-app-template-config/css/w3.css/wp-content/plugins/rnwp-app-template-config/css/style.css/wp-content/plugins/rnwp-app-template-config/js/custom.js
Version Parameters
rnwp-app-template-config/css/w3.css?ver=rnwp-app-template-config/css/style.css?ver=rnwp-app-template-config/js/custom.js?ver=

HTML / DOM Fingerprints

REST Endpoints
/wp-json/wp/v2/product_cat/wp-json/wp/v2/product_tag
FAQ

Frequently Asked Questions about RNWP App template config