WP API Options Security & Risk Analysis

wordpress.org/plugins/wp-rest-api-options

Extends WordPress WP REST API with new routes pointing to WordPress options.

10 active installs v1.0.1 PHP + WP 3.6.0+ Updated May 9, 2016
jsonjson-rest-apioptionswp-apiwp-rest-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP API Options Safe to Use in 2026?

Generally Safe

Score 85/100

WP API Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "wp-rest-api-options" v1.0.1 plugin exhibits an excellent security posture based on the provided static analysis. The absence of any identified dangerous functions, SQL queries (with 100% prepared statement usage), file operations, or external HTTP requests is a strong indicator of secure coding practices. Furthermore, the lack of any reported vulnerabilities in its history, including critical or high severity ones, suggests a mature and well-maintained codebase. The plugin also scores highly by implementing proper output escaping for all its outputs and demonstrating a complete absence of taint analysis findings, indicating no unsanitized data flows.

While the plugin has a remarkably clean bill of health, the analysis does highlight a complete lack of capability checks and nonce checks for its entry points. Although currently, there are no unprotected entry points (AJAX handlers, REST API routes, shortcodes, or cron events) and the attack surface is zero, this absence of built-in security mechanisms for potential future additions or if new entry points are introduced is a theoretical concern. If any entry points were to be added without proper authentication and authorization, the plugin would be immediately vulnerable.

In conclusion, "wp-rest-api-options" v1.0.1 demonstrates exceptional code quality and a robust security foundation. The absence of any actual vulnerabilities or exploitable code signals is highly commendable. The only minor area for improvement, albeit a theoretical one given the current zero attack surface, would be to incorporate capability checks and nonce validation as a proactive security measure should the plugin evolve.

Key Concerns

  • No capability checks
  • No nonce checks
Vulnerabilities
None known

WP API Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP API Options Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

WP API Options Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP API Options Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterrest_api_initwp-api-options.php:34
filterjson_endpointswp-api-options.php:37
actioninitwp-api-options.php:41
Maintenance & Trust

WP API Options Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMay 9, 2016
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WP API Options Developer Profile

Oleg Kostin

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP API Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp/v2/options/wp/v2/options/(?P<id>\w+)
FAQ

Frequently Asked Questions about WP API Options