
WP-CORS Security & Risk Analysis
wordpress.org/plugins/wp-corsAllows AJAX requests from other sites to integrate content from your site using the CORS standard.
Is WP-CORS Safe to Use in 2026?
Use With Caution
Score 61/100WP-CORS has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The wp-cors plugin v0.2.2 presents a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries and properly escaping all identified outputs. There are no file operations or external HTTP requests, and no bundled libraries to worry about outdated versions. However, significant concerns arise from the identified attack surface. A single AJAX handler lacks authentication checks, making it a potential entry point for unauthorized actions. The taint analysis revealed one flow with an unsanitized path, which, while not classified as critical or high severity, still represents a potential risk that needs attention.
The plugin's vulnerability history is a major red flag. With two known CVEs, one of which is currently unpatched, the plugin has a documented history of security flaws. The common vulnerability types, Missing Authorization and Cross-site Scripting, align with the static analysis findings of an unprotected AJAX handler and an unsanitized path. The fact that the last vulnerability was recorded on 2026-01-28, and is still unpatched, suggests a lack of ongoing maintenance and timely security updates, which is a critical concern for any WordPress plugin.
In conclusion, while the plugin has some positive coding practices, the presence of an unprotected AJAX endpoint, a taint flow with an unsanitized path, and a history of unpatched vulnerabilities make it a security risk. The unpatched medium severity vulnerability, coupled with the unprotected entry point, strongly suggests that this plugin should be treated with caution and ideally replaced or updated by its developers.
Key Concerns
- Unprotected AJAX handler
- Taint flow with unsanitized path
- Unpatched CVE (medium severity)
- History of Missing Authorization vulnerabilities
- History of XSS vulnerabilities
WP-CORS Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
WP-CORS <= 0.2.2 - Missing Authorization
WP-CORS <= 0.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting
WP-CORS Code Analysis
Output Escaping
Data Flow Analysis
WP-CORS Attack Surface
AJAX Handlers 1
WordPress Hooks 3
Maintenance & Trust
WP-CORS Maintenance & Trust
Maintenance Signals
Community Trust
WP-CORS Alternatives
LH Multisite CORS
lh-multisite-cors
Allows AJAX requests from other sites in your multisite network even if they are on another domain or subdomain
Enable CORS
enable-cors
Please read the plugin description before installing to ensure compatibility and avoid potential issues. This plugin will be free forever.
CoCart CORS Support
cocart-cors
Enables support for CORS to allow CoCart to work across multiple domains.
Ajax Load More: REST API
ajax-load-more-rest-api
An Ajax Load More extension that adds compatibility for the WP REST API.
ajax Post Comment
hina-ajax-comment
Post comment form on frontend tobe ajax using WP REST API Version.2
WP-CORS Developer Profile
1 plugin · 1K total installs
How We Detect WP-CORS
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-cors/wp-cors.php