WP-REST-API Menus Security & Risk Analysis

wordpress.org/plugins/wp-rest-api-menus

Adds menu endpoints to core WP REST API.

70 active installs v1.0 PHP 5.6+ WP 4.7.0+ Updated Mar 26, 2018
jsonjson-rest-apimenuswp-apiwp-rest-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-REST-API Menus Safe to Use in 2026?

Generally Safe

Score 85/100

WP-REST-API Menus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the wp-rest-api-menus v1.0 plugin exhibits a strong security posture. The code analysis indicates an absence of dangerous functions, file operations, external HTTP requests, and critical taint flows. All SQL queries utilize prepared statements, and all output is properly escaped. The plugin also has a clean vulnerability history with no recorded CVEs, suggesting a proactive approach to security or a lack of past exploitable issues.

However, the analysis reveals a complete lack of any security checks, including AJAX handlers, REST API routes, nonce checks, and capability checks. While the current version has a small attack surface and no identified vulnerabilities, this absence of fundamental security mechanisms presents a significant concern. Should any new functionality be added or if an attacker finds a way to introduce data into the system that can be processed without these checks, it could lead to immediate and severe vulnerabilities. The plugin's strengths lie in its clean code and lack of known vulnerabilities, but its weakness is the complete oversight of essential security controls.

In conclusion, while the plugin appears secure for its current functionality and version due to the lack of exploitable code patterns and no known vulnerabilities, the complete absence of any authentication or authorization checks on potential entry points is a critical architectural flaw. This makes it highly susceptible to future security breaches if new features are added or if the attack surface expands without implementing proper security measures. The plugin's current "security" relies more on its limited scope than on robust security design.

Key Concerns

  • No capability checks on entry points
  • No nonce checks on entry points
  • No permission callbacks on REST API routes
  • No auth checks on AJAX handlers
Vulnerabilities
None known

WP-REST-API Menus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP-REST-API Menus Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

WP-REST-API Menus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP-REST-API Menus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionrest_api_initwp-rest-api-menus.php:35
Maintenance & Trust

WP-REST-API Menus Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 26, 2018
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

WP-REST-API Menus Developer Profile

jcdev518

1 plugin · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-REST-API Menus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/wp-menus/v1/menus/wp-json/wp-menus/v1/menus/(?P<id>[a-zA-Z(-]+)
FAQ

Frequently Asked Questions about WP-REST-API Menus