
WP API JSON READER Security & Risk Analysis
wordpress.org/plugins/wp-api-json-readerGet and show posts from an other WP website which have installed the WP REST API and provide json feeds via the API
Is WP API JSON READER Safe to Use in 2026?
Generally Safe
Score 85/100WP API JSON READER has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-api-json-reader" v1.1 plugin exhibits a generally good security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the lack of dangerous functions, file operations, and the exclusive use of prepared statements for SQL queries are strong indicators of secure coding practices.
However, there are a few areas that warrant attention. The most significant concern is the low percentage of properly escaped output (41%), suggesting a potential for Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully before being displayed. The presence of external HTTP requests also introduces a dependency on external services, which could be a vector for further attacks if those services are compromised. The absence of nonce checks and capability checks on potential entry points, although the analysis found zero entry points, is a general best practice that is not demonstrated here.
The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the positive static analysis findings, indicates that the plugin has not historically been a source of widespread security issues. Overall, the plugin demonstrates a strong foundation in secure coding, but the unescaped output and reliance on external requests represent areas where developers should focus for improvement to further harden its security.
Key Concerns
- Low percentage of properly escaped output
- Presence of external HTTP requests
- Absence of nonce checks
- Absence of capability checks
WP API JSON READER Security Vulnerabilities
WP API JSON READER Code Analysis
Output Escaping
WP API JSON READER Attack Surface
WordPress Hooks 2
Maintenance & Trust
WP API JSON READER Maintenance & Trust
Maintenance Signals
Community Trust
WP API JSON READER Alternatives
JWT Authentication for WP REST API
jwt-authentication-for-wp-rest-api
Extends the WP REST API using JSON Web Tokens Authentication as an authentication method.
REST API Log
wp-rest-api-log
WordPress plugin to log REST API requests and responses
WP API Menus
wp-api-menus
Extends WordPress WP REST API with new routes pointing to WordPress menus.
JSON Feed (jsonfeed.org)
jsonfeed
Adds feeds in JSON Feed format.
Feed JSON
feed-json
Adds a new type of feed you can subscribe to.
WP API JSON READER Developer Profile
3 plugins · 100 total installs
How We Detect WP API JSON READER
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-api-json-reader/styles.csswp-api-json-reader/styles.css?ver=HTML / DOM Fingerprints
wpapijsonreader_widgetjsonlistsid="WP_Api_Json_Feeds"name="WP_Api_Json_Feeds"id="wpapijsonreader_widget"id="wpapi-json-reader"/wp-json/posts?filter[cat]=