
WP-REST-API V2 Menus Security & Risk Analysis
wordpress.org/plugins/wp-rest-api-v2-menusAdding menus endpoints on WP REST API v2
Is WP-REST-API V2 Menus Safe to Use in 2026?
Generally Safe
Score 85/100WP-REST-API V2 Menus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'wp-rest-api-v2-menus' plugin version 0.12.1 exhibits a concerning security posture primarily due to its exposed attack surface. The static analysis reveals a significant number of REST API routes that lack any permission callbacks, meaning they are accessible without proper authentication or authorization checks. This creates a direct pathway for potential attackers to interact with plugin functionalities, even if the plugin itself doesn't handle dangerous functions or SQL queries directly. The absence of nonce checks and capability checks further exacerbates this risk, leaving these endpoints vulnerable to various attacks like unauthorized data access or manipulation if the endpoints themselves perform sensitive operations.
Despite the identified issues with the attack surface, the plugin demonstrates good practices in other areas. There are no dangerous functions being used, all SQL queries are prepared statements, and output escaping is handled correctly, indicating a degree of care in preventing common code execution and injection vulnerabilities. The vulnerability history is also clean, with no recorded CVEs, suggesting that this specific version (and potentially previous ones) has not been publicly exploited or found to have critical flaws. However, the lack of historical vulnerabilities could also be attributed to the plugin not having a large user base or being extensively tested for security. The primary weakness remains the open REST API endpoints, which, without further context on what these endpoints do, represent a significant potential risk.
Key Concerns
- REST API routes without permission callbacks
- Total unprotected entry points
- No nonce checks on entry points
- No capability checks on entry points
WP-REST-API V2 Menus Security Vulnerabilities
WP-REST-API V2 Menus Code Analysis
Output Escaping
WP-REST-API V2 Menus Attack Surface
REST API Routes 4
WordPress Hooks 1
Maintenance & Trust
WP-REST-API V2 Menus Maintenance & Trust
Maintenance Signals
Community Trust
WP-REST-API V2 Menus Alternatives
Tutexp Rest Api Menu
tutexp-rest-api-menu
Adding menus endpoints on WP REST API v2
WP API Menus
wp-api-menus
Extends WordPress WP REST API with new routes pointing to WordPress menus.
WP-REST-API Menus
wp-rest-api-menus
Adds menu endpoints to core WP REST API.
JSON REST API Subscriptions
json-rest-api-subscriptions
Enable subscriptions to posts, pages, and custom post types. Users can securely subscribe via simple API routes to created/updated/deleted content.
WP API (V2) WooCommerce endpoints
wp-api-v2-woocommerce-endpoints
Extends WordPress WP REST API (V2) with new endpoints pointing to WooCommerce page functions (is_shop, is_cart, is_checkout, is_account_page).
WP-REST-API V2 Menus Developer Profile
1 plugin · 3K total installs
How We Detect WP-REST-API V2 Menus
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-rest-api-v2-menus/wp-rest-api-v2-menus.phpHTML / DOM Fingerprints
/wp-json/menus/v1/menus/wp-json/menus/v1/menus/(?P<id>[a-zA-Z0-9_-]+)/wp-json/menus/v1/locations/(?P<id>[a-zA-Z0-9_-]+)