
Stionic Users – WordPress Users API Security & Risk Analysis
wordpress.org/plugins/stionic-usersExpanded the WordPress REST API for manager Users
Is Stionic Users – WordPress Users API Safe to Use in 2026?
Generally Safe
Score 100/100Stionic Users – WordPress Users API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The stionic-users v1.0.2 plugin exhibits a strong initial security posture based on the static analysis provided. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, significantly limiting the potential attack surface. Furthermore, the plugin demonstrates good coding practices by exclusively using prepared statements for its SQL queries and properly escaping all outputs. The absence of taint analysis findings and zero recorded historical vulnerabilities further contribute to a positive security outlook.
However, a critical concern arises from the complete lack of nonce checks and capability checks. This absence means that even if entry points existed, they would be entirely unprotected against unauthorized access and privilege escalation. While the current attack surface is zero, any future addition of functionality without implementing these fundamental security measures would introduce significant risk. The bundling of the Guzzle library also warrants attention; while not inherently a vulnerability, ensuring this library is kept up-to-date and free from known exploits is crucial for overall plugin security.
In conclusion, stionic-users v1.0.2 appears to be built with security awareness regarding SQL injection and output sanitization. The lack of historical vulnerabilities is a positive indicator. The primary weakness is the complete omission of nonce and capability checks, which, if not addressed, could expose future functionalities to serious security threats. Vigilance in updating bundled libraries is also advised.
Key Concerns
- Missing Nonce Checks
- Missing Capability Checks
- Bundled Guzzle library
Stionic Users – WordPress Users API Security Vulnerabilities
Stionic Users – WordPress Users API Code Analysis
Bundled Libraries
SQL Query Safety
Stionic Users – WordPress Users API Attack Surface
WordPress Hooks 6
Maintenance & Trust
Stionic Users – WordPress Users API Maintenance & Trust
Maintenance Signals
Community Trust
Stionic Users – WordPress Users API Alternatives
Stionic Core – Create Mobile app for WordPress news
stionic-core
Create mobile app for WordPress
Meta for WooCommerce
facebook-for-woocommerce
Get the Official Meta for WooCommerce plugin for powerful ways to help grow your business.
PixelYourSite – Your smart PIXEL (TAG) & API Manager
pixelyoursite
Add Meta Pixel with Conversion API, Google Analytics (GA4) + Consent Mode, Google Tag Manager, and Head & Footer scripts.
Meta pixel for WordPress
official-facebook-pixel
Grow your business with Meta for WordPress!
WooCommerce Legacy REST API
woocommerce-legacy-rest-api
The WooCommerce Legacy REST API, which is now part of WooCommerce itself but will be removed in WooCommerce 9.0.
Stionic Users – WordPress Users API Developer Profile
2 plugins · 130 total installs
How We Detect Stionic Users – WordPress Users API
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
/wp/v2/m_facebook/login