
WP-REST-API Menus Security & Risk Analysis
wordpress.org/plugins/wp-rest-api-menusAdds menu endpoints to core WP REST API.
Is WP-REST-API Menus Safe to Use in 2026?
Generally Safe
Score 85/100WP-REST-API Menus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the provided static analysis and vulnerability history, the wp-rest-api-menus v1.0 plugin exhibits a strong security posture. The code analysis indicates an absence of dangerous functions, file operations, external HTTP requests, and critical taint flows. All SQL queries utilize prepared statements, and all output is properly escaped. The plugin also has a clean vulnerability history with no recorded CVEs, suggesting a proactive approach to security or a lack of past exploitable issues.
However, the analysis reveals a complete lack of any security checks, including AJAX handlers, REST API routes, nonce checks, and capability checks. While the current version has a small attack surface and no identified vulnerabilities, this absence of fundamental security mechanisms presents a significant concern. Should any new functionality be added or if an attacker finds a way to introduce data into the system that can be processed without these checks, it could lead to immediate and severe vulnerabilities. The plugin's strengths lie in its clean code and lack of known vulnerabilities, but its weakness is the complete oversight of essential security controls.
In conclusion, while the plugin appears secure for its current functionality and version due to the lack of exploitable code patterns and no known vulnerabilities, the complete absence of any authentication or authorization checks on potential entry points is a critical architectural flaw. This makes it highly susceptible to future security breaches if new features are added or if the attack surface expands without implementing proper security measures. The plugin's current "security" relies more on its limited scope than on robust security design.
Key Concerns
- No capability checks on entry points
- No nonce checks on entry points
- No permission callbacks on REST API routes
- No auth checks on AJAX handlers
WP-REST-API Menus Security Vulnerabilities
WP-REST-API Menus Release Timeline
WP-REST-API Menus Code Analysis
WP-REST-API Menus Attack Surface
WordPress Hooks 1
Maintenance & Trust
WP-REST-API Menus Maintenance & Trust
Maintenance Signals
Community Trust
WP-REST-API Menus Alternatives
WP API Menus
wp-api-menus
Extends WordPress WP REST API with new routes pointing to WordPress menus.
WP API (V2) WooCommerce endpoints
wp-api-v2-woocommerce-endpoints
Extends WordPress WP REST API (V2) with new endpoints pointing to WooCommerce page functions (is_shop, is_cart, is_checkout, is_account_page).
WP API Options
wp-rest-api-options
Extends WordPress WP REST API with new routes pointing to WordPress options.
WP API (V2) isFront
wp-rest-api-v2-isfront
Extends WordPress WP REST API (V2) with new endpoints pointing to WordPress isFront function.
REST API Log
wp-rest-api-log
WordPress plugin to log REST API requests and responses
WP-REST-API Menus Developer Profile
1 plugin · 70 total installs
How We Detect WP-REST-API Menus
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
/wp-json/wp-menus/v1/menus/wp-json/wp-menus/v1/menus/(?P<id>[a-zA-Z(-]+)