Stionic Users – WordPress Users API Security & Risk Analysis

wordpress.org/plugins/stionic-users

Expanded the WordPress REST API for manager Users

30 active installs v1.0.2 PHP 5.2.4+ WP 4.7+ Updated Unknown
apicreate-appmobile-app-wordpresswordpress-users
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Stionic Users – WordPress Users API Safe to Use in 2026?

Generally Safe

Score 100/100

Stionic Users – WordPress Users API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The stionic-users v1.0.2 plugin exhibits a strong initial security posture based on the static analysis provided. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, significantly limiting the potential attack surface. Furthermore, the plugin demonstrates good coding practices by exclusively using prepared statements for its SQL queries and properly escaping all outputs. The absence of taint analysis findings and zero recorded historical vulnerabilities further contribute to a positive security outlook.

However, a critical concern arises from the complete lack of nonce checks and capability checks. This absence means that even if entry points existed, they would be entirely unprotected against unauthorized access and privilege escalation. While the current attack surface is zero, any future addition of functionality without implementing these fundamental security measures would introduce significant risk. The bundling of the Guzzle library also warrants attention; while not inherently a vulnerability, ensuring this library is kept up-to-date and free from known exploits is crucial for overall plugin security.

In conclusion, stionic-users v1.0.2 appears to be built with security awareness regarding SQL injection and output sanitization. The lack of historical vulnerabilities is a positive indicator. The primary weakness is the complete omission of nonce and capability checks, which, if not addressed, could expose future functionalities to serious security threats. Vigilance in updating bundled libraries is also advised.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
  • Bundled Guzzle library
Vulnerabilities
None known

Stionic Users – WordPress Users API Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Stionic Users – WordPress Users API Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
5
External Requests
1
Bundled Libraries
1

Bundled Libraries

Guzzle

SQL Query Safety

100% prepared4 total queries
Attack Surface

Stionic Users – WordPress Users API Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionrest_api_initendpoints\class-stionic-facebook.php:13
actionrest_api_initendpoints\class-stionic-users.php:8
filterrest_pre_dispatchhooks\class-stionic-jwt.php:9
filterjwt_auth_expirehooks\class-stionic-jwt.php:10
filterjwt_auth_token_before_dispatchhooks\class-stionic-jwt.php:11
actionrest_api_initincludes\class-stionic-users.php:8
Maintenance & Trust

Stionic Users – WordPress Users API Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedUnknown
PHP min version5.2.4
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

Stionic Users – WordPress Users API Developer Profile

Noncheat

2 plugins · 130 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stionic Users – WordPress Users API

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp/v2/m_facebook/login
FAQ

Frequently Asked Questions about Stionic Users – WordPress Users API