
WP REST API – User Meta Security & Risk Analysis
wordpress.org/plugins/wp-rest-api-user-metaEnhance WordPress REST API by including configurable user meta fields in post responses without additional API requests.
Is WP REST API – User Meta Safe to Use in 2026?
Generally Safe
Score 92/100WP REST API – User Meta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'wp-rest-api-user-meta' v1.0.0 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, cron events, and dangerous functions significantly limits its attack surface. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, all of which are excellent security practices.
However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, there is a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The presence of a capability check without any identified entry points that require it is unusual and could indicate misconfiguration or an incomplete security implementation. The lack of nonce checks and the fact that the single capability check is not associated with any identified entry points are also points of concern.
The vulnerability history is clean, with no known CVEs. This, combined with the limited attack surface and good practices in SQL and file operations, suggests that the plugin has historically been secure. However, the unescaped output represents a critical, immediate risk that overshadows the positive aspects. The plugin's strengths lie in its minimal attack surface and proper database interaction, but its weakness in output sanitization requires urgent attention.
Key Concerns
- 100% of outputs are not properly escaped
- Capability check exists, but no protected entry points found
- No nonce checks on potential entry points
WP REST API – User Meta Security Vulnerabilities
WP REST API – User Meta Code Analysis
Output Escaping
WP REST API – User Meta Attack Surface
WordPress Hooks 4
Maintenance & Trust
WP REST API – User Meta Maintenance & Trust
Maintenance Signals
Community Trust
WP REST API – User Meta Alternatives
Disable REST API
disable-json-api
Disable the use of the REST API on your website to site users. Now with User Role support!
JWT Authentication for WP REST API
jwt-authentication-for-wp-rest-api
Extends the WP REST API using JSON Web Tokens Authentication as an authentication method.
Disable WP REST API
disable-wp-rest-api
Disables the WP REST API for visitors not logged into WordPress.
WordPress REST API (Version 2)
rest-api
Access your site's data through an easy-to-use HTTP REST API. (Version 2)
WP REST API – OAuth 1.0a Server
rest-api-oauth1
Connect applications to your WordPress site without ever giving away your password.
WP REST API – User Meta Developer Profile
2 plugins · 50 total installs
How We Detect WP REST API – User Meta
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
/wp-json/wp/v2/posts