WP API JSON READER Security & Risk Analysis

wordpress.org/plugins/wp-api-json-reader

Get and show posts from an other WP website which have installed the WP REST API and provide json feeds via the API

10 active installs v1.1 PHP + WP 4.0.0+ Updated May 28, 2015
feedsjsonwp-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP API JSON READER Safe to Use in 2026?

Generally Safe

Score 85/100

WP API JSON READER has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "wp-api-json-reader" v1.1 plugin exhibits a generally good security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the lack of dangerous functions, file operations, and the exclusive use of prepared statements for SQL queries are strong indicators of secure coding practices.

However, there are a few areas that warrant attention. The most significant concern is the low percentage of properly escaped output (41%), suggesting a potential for Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully before being displayed. The presence of external HTTP requests also introduces a dependency on external services, which could be a vector for further attacks if those services are compromised. The absence of nonce checks and capability checks on potential entry points, although the analysis found zero entry points, is a general best practice that is not demonstrated here.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the positive static analysis findings, indicates that the plugin has not historically been a source of widespread security issues. Overall, the plugin demonstrates a strong foundation in secure coding, but the unescaped output and reliance on external requests represent areas where developers should focus for improvement to further harden its security.

Key Concerns

  • Low percentage of properly escaped output
  • Presence of external HTTP requests
  • Absence of nonce checks
  • Absence of capability checks
Vulnerabilities
None known

WP API JSON READER Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP API JSON READER Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

41% escaped29 total outputs
Attack Surface

WP API JSON READER Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_scriptswpapi-json-reader.php:47
actionwidgets_initwpapi-json-reader.php:227
Maintenance & Trust

WP API JSON READER Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMay 28, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WP API JSON READER Developer Profile

elsteno

3 plugins · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP API JSON READER

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-api-json-reader/styles.css
Version Parameters
wp-api-json-reader/styles.css?ver=

HTML / DOM Fingerprints

CSS Classes
wpapijsonreader_widgetjsonlists
Data Attributes
id="WP_Api_Json_Feeds"name="WP_Api_Json_Feeds"id="wpapijsonreader_widget"id="wpapi-json-reader"
REST Endpoints
/wp-json/posts?filter[cat]=
FAQ

Frequently Asked Questions about WP API JSON READER