WP REST API – User Meta Security & Risk Analysis

wordpress.org/plugins/wp-rest-api-user-meta

Enhance WordPress REST API by including configurable user meta fields in post responses without additional API requests.

40 active installs v1.0.0 PHP + WP 4.4+ Updated Mar 24, 2025
apijsonrest-apiuser-meta
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP REST API – User Meta Safe to Use in 2026?

Generally Safe

Score 92/100

WP REST API – User Meta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin 'wp-rest-api-user-meta' v1.0.0 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, cron events, and dangerous functions significantly limits its attack surface. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, all of which are excellent security practices.

However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, there is a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The presence of a capability check without any identified entry points that require it is unusual and could indicate misconfiguration or an incomplete security implementation. The lack of nonce checks and the fact that the single capability check is not associated with any identified entry points are also points of concern.

The vulnerability history is clean, with no known CVEs. This, combined with the limited attack surface and good practices in SQL and file operations, suggests that the plugin has historically been secure. However, the unescaped output represents a critical, immediate risk that overshadows the positive aspects. The plugin's strengths lie in its minimal attack surface and proper database interaction, but its weakness in output sanitization requires urgent attention.

Key Concerns

  • 100% of outputs are not properly escaped
  • Capability check exists, but no protected entry points found
  • No nonce checks on potential entry points
Vulnerabilities
None known

WP REST API – User Meta Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP REST API – User Meta Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

WP REST API – User Meta Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitwp_rest_api_usermeta.php:45
actionadmin_menuwp_rest_api_usermeta.php:49
actionadmin_initwp_rest_api_usermeta.php:50
actionplugins_loadedwp_rest_api_usermeta.php:186
Maintenance & Trust

WP REST API – User Meta Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 24, 2025
PHP min version
Downloads3K

Community Trust

Rating80/100
Number of ratings4
Active installs40
Developer Profile

WP REST API – User Meta Developer Profile

Ruhul Amin

2 plugins · 50 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP REST API – User Meta

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/wp/v2/posts
FAQ

Frequently Asked Questions about WP REST API – User Meta