
WP Simple Web Services Security & Risk Analysis
wordpress.org/plugins/wp-simple-web-servicesSimple WordPress Rest Web Services. Add JSON REST web services to your WordPress website with a few clicks.
Is WP Simple Web Services Safe to Use in 2026?
Generally Safe
Score 85/100WP Simple Web Services has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'wp-simple-web-services' v1.1.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries, implementing nonce and capability checks for its single AJAX entry point, and having no known vulnerabilities in its history. The lack of an extensive attack surface with only one AJAX handler and no REST API routes, shortcodes, or cron events also contributes to a relatively secure baseline.
However, several critical concerns are raised by the static analysis. The presence of the `create_function` dangerous function is a significant red flag, as it can be a vector for code injection if not handled with extreme care, especially if any user-supplied data influences its execution. Furthermore, the complete lack of output escaping for all 12 identified output points is a major vulnerability. This indicates a high risk of Cross-Site Scripting (XSS) attacks, allowing attackers to inject malicious scripts into the website's output that are then executed in the user's browser.
The plugin's vulnerability history being empty is a positive indicator, suggesting it has not been a target for known exploits or has a history of being developed securely. However, this should not overshadow the immediate risks identified in the code. The combination of unescaped output and the use of `create_function` presents immediate and serious security flaws that require urgent attention.
Key Concerns
- Unescaped output for all outputs
- Use of dangerous function: create_function
WP Simple Web Services Security Vulnerabilities
WP Simple Web Services Code Analysis
Dangerous Functions Found
Output Escaping
WP Simple Web Services Attack Surface
AJAX Handlers 1
WordPress Hooks 9
Maintenance & Trust
WP Simple Web Services Maintenance & Trust
Maintenance Signals
Community Trust
WP Simple Web Services Alternatives
Disable REST API
disable-json-api
Disable the use of the REST API on your website to site users. Now with User Role support!
JWT Authentication for WP REST API
jwt-authentication-for-wp-rest-api
Extends the WP REST API using JSON Web Tokens Authentication as an authentication method.
Disable WP REST API
disable-wp-rest-api
Disables the WP REST API for visitors not logged into WordPress.
WordPress REST API (Version 2)
rest-api
Access your site's data through an easy-to-use HTTP REST API. (Version 2)
WPGet API – Connect to any external REST API
wpgetapi
Connect any REST API to WordPress. WPGet API enables easy API integration, allowing you to display API data without any code.
WP Simple Web Services Developer Profile
8 plugins · 62K total installs
How We Detect WP Simple Web Services
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-simple-web-services/assets/js/wpw-admin.js/wp-content/plugins/wp-simple-web-services/assets/js/wpw-admin.orig.js/wp-content/plugins/wp-simple-web-services/assets/js/wpw-admin.js/wp-content/plugins/wp-simple-web-services/assets/js/wpw-admin.orig.jswpw-admin.js?ver=wpw-admin.orig.js?ver=HTML / DOM Fingerprints
wpw-wrap