Simple JWT Auth Security & Risk Analysis

wordpress.org/plugins/simple-jwt-auth

Extends the WP REST API using JSON Web Tokens for robust authentication, providing a secure and reliable way to access and manage WordPress data.

0 active installs v1.0.2 PHP 7.4+ WP 5.2+ Updated Nov 17, 2024
authenticationjson-web-tokenjwtjwt-authrest-api
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple JWT Auth Safe to Use in 2026?

Generally Safe

Score 92/100

Simple JWT Auth has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The simple-jwt-auth plugin, version 1.0.2, exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, including AJAX handlers, REST API routes, shortcodes, or cron events, is a significant strength, indicating a minimal entry point for attackers. Furthermore, the code analysis reveals excellent practices regarding output escaping (100% properly escaped) and the avoidance of dangerous functions and file operations. The taint analysis also shows no high or critical severity issues related to unsanitized data flows.

However, a notable area for improvement is the complete lack of capability checks. While nonce checks are present in two instances, the absence of capability checks means that even authenticated users might be able to perform actions they are not authorized for, depending on how the JWT authentication is implemented and what actions the plugin facilitates. The fact that 80% of SQL queries use prepared statements is good, but the remaining 20% (which translates to 2 raw SQL queries) could still be a potential vector for SQL injection if not carefully managed. The vulnerability history is clean, with no recorded CVEs, which is a positive indicator of the plugin's past security performance.

Key Concerns

  • No capability checks found
  • Unprotected SQL queries (20%)
Vulnerabilities
None known

Simple JWT Auth Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Simple JWT Auth Release Timeline

v1.0.2Current
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Simple JWT Auth Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
8 prepared
Unescaped Output
0
81 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

80% prepared10 total queries

Output Escaping

100% escaped81 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
simplejwt_options_callback (admin\class-simple-jwt-auth-admin.php:346)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple JWT Auth Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionplugins_loadedincludes\class-simple-jwt-auth.php:176
actionadmin_enqueue_scriptsincludes\class-simple-jwt-auth.php:189
actionadmin_enqueue_scriptsincludes\class-simple-jwt-auth.php:190
actionadmin_menuincludes\class-simple-jwt-auth.php:191
actionsimplejwt_admin_alertincludes\class-simple-jwt-auth.php:192
actionadmin_post_simplejwt_settings_actionincludes\class-simple-jwt-auth.php:193
actionadmin_post_simplejwt_options_actionincludes\class-simple-jwt-auth.php:194
filterxmlrpc_enabledincludes\class-simple-jwt-auth.php:195
filteradmin_body_classincludes\class-simple-jwt-auth.php:196
actionrest_api_initincludes\class-simple-jwt-auth.php:212
filterrest_api_initincludes\class-simple-jwt-auth.php:213
filterrest_pre_dispatchincludes\class-simple-jwt-auth.php:214
filterdetermine_current_userincludes\class-simple-jwt-auth.php:215
Maintenance & Trust

Simple JWT Auth Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 17, 2024
PHP min version7.4
Downloads783

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Simple JWT Auth Developer Profile

Sayan Dey

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple JWT Auth

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-jwt-auth/admin/css/simple-jwt-auth-admin.css/wp-content/plugins/simple-jwt-auth/admin/js/simple-jwt-auth-admin.js
Script Paths
/wp-content/plugins/simple-jwt-auth/admin/js/simple-jwt-auth-admin.js
Version Parameters
simple-jwt-auth/admin/css/simple-jwt-auth-admin.css?ver=simple-jwt-auth/admin/js/simple-jwt-auth-admin.js?ver=

HTML / DOM Fingerprints

REST Endpoints
/wp-json/simple-jwt-auth/v1/token
FAQ

Frequently Asked Questions about Simple JWT Auth