SSO JumpCloud – Enterprise SAML & SCIM Security & Risk Analysis

wordpress.org/plugins/sso-connector-for-jumpcloud

Securely connect WordPress with JumpCloud for Enterprise SSO via SAML 2.0 and automated user provisioning via SCIM.

0 active installs v1.1.6 PHP 7.2+ WP 5.0+ Updated Unknown
authenticationjumpcloudsamlsecuritysso
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SSO JumpCloud – Enterprise SAML & SCIM Safe to Use in 2026?

Generally Safe

Score 100/100

SSO JumpCloud – Enterprise SAML & SCIM has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'sso-connector-for-jumpcloud' plugin v1.1.6 exhibits a generally strong security posture, with several positive indicators. Notably, it utilizes prepared statements for all SQL queries and implements nonce and capability checks for all identified entry points, demonstrating a commitment to secure coding practices. The absence of known CVEs and no recorded critical or high-severity vulnerabilities in its history further suggest a well-maintained and relatively secure plugin. The taint analysis showing no unsanitized paths is also a very positive sign, indicating that the plugin is likely not susceptible to common injection-style attacks through its analyzed flows.

However, there are areas of concern that warrant attention. The plugin exposes two REST API routes without proper permission callbacks, creating a potential attack surface for unauthenticated users. While the static analysis doesn't reveal any explicitly dangerous functions or raw SQL queries, the lack of permission checks on these REST API endpoints is a significant risk. This could allow unauthorized users to interact with the API, potentially leading to information disclosure or unintended actions, depending on the functionality of these routes. The output escaping, while at 78%, could be improved to further mitigate Cross-Site Scripting (XSS) risks.

In conclusion, 'sso-connector-for-jumpcloud' v1.1.6 has a solid foundation with its use of prepared statements and comprehensive checks on most entry points. The lack of historical vulnerabilities is encouraging. Nevertheless, the two unprotected REST API routes represent a clear and present risk that should be addressed promptly to strengthen the plugin's overall security. Improving the output escaping would further enhance its resilience against potential XSS attacks.

Key Concerns

  • REST API routes without permission callbacks
  • Output escaping at 78% could be improved
Vulnerabilities
None known

SSO JumpCloud – Enterprise SAML & SCIM Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SSO JumpCloud – Enterprise SAML & SCIM Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
29
105 escaped
Nonce Checks
5
Capability Checks
5
File Operations
1
External Requests
5
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

78% escaped134 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<sso-connector-for-jumpcloud> (sso-connector-for-jumpcloud.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

SSO JumpCloud – Enterprise SAML & SCIM Attack Surface

Entry Points5
Unprotected2

AJAX Handlers 3

authwp_ajax_jumpssco_test_sso_configsso-connector-for-jumpcloud.php:57
authwp_ajax_jumpssco_check_subscriptionsso-connector-for-jumpcloud.php:62
authwp_ajax_jumpssco_revalidate_licensesso-connector-for-jumpcloud.php:63

REST API Routes 2

GET/wp-json/jumpssco/v1/scim/v2/Userssso-connector-for-jumpcloud.php:1779
GET/wp-json/jumpssco/v1/scim/v2/Users/(?P<id>[\d]+)sso-connector-for-jumpcloud.php:1792
WordPress Hooks 14
actionadmin_menusso-connector-for-jumpcloud.php:47
actionadmin_initsso-connector-for-jumpcloud.php:48
filterlogin_messagesso-connector-for-jumpcloud.php:49
filterauthenticatesso-connector-for-jumpcloud.php:51
filterlogin_redirectsso-connector-for-jumpcloud.php:53
actionlogin_initsso-connector-for-jumpcloud.php:54
actioninitsso-connector-for-jumpcloud.php:55
actionlogin_enqueue_scriptssso-connector-for-jumpcloud.php:56
actionadmin_enqueue_scriptssso-connector-for-jumpcloud.php:58
filterplugin_row_metasso-connector-for-jumpcloud.php:60
actionadmin_initsso-connector-for-jumpcloud.php:61
actionrest_api_initsso-connector-for-jumpcloud.php:64
filterwp_authenticate_usersso-connector-for-jumpcloud.php:65
actionadmin_initsso-connector-for-jumpcloud.php:1113
Maintenance & Trust

SSO JumpCloud – Enterprise SAML & SCIM Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.2
Downloads332

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SSO JumpCloud – Enterprise SAML & SCIM Developer Profile

Airton Vancin Junior

5 plugins · 40 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SSO JumpCloud – Enterprise SAML & SCIM

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sso-connector-for-jumpcloud/assets/css/admin.css/wp-content/plugins/sso-connector-for-jumpcloud/assets/js/admin.js
Script Paths
/wp-content/plugins/sso-connector-for-jumpcloud/assets/js/admin.js
Version Parameters
sso-connector-for-jumpcloud/assets/css/admin.css?ver=sso-connector-for-jumpcloud/assets/js/admin.js?ver=

HTML / DOM Fingerprints

JS Globals
jumpssco_admin
REST Endpoints
/wp-json/jumpssco/v1/scim
FAQ

Frequently Asked Questions about SSO JumpCloud – Enterprise SAML & SCIM