
wp_wpcat_json_rest Security & Risk Analysis
wordpress.org/plugins/wp-wpcat-json-restExtend the REST-API to work with Wordpress Media-Library. Organize images in Folders. Add and Update images including Metadata and Posts using the ima …
Is wp_wpcat_json_rest Safe to Use in 2026?
Generally Safe
Score 100/100wp_wpcat_json_rest has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-wpcat-json-rest" v1.2.0 plugin demonstrates a strong security posture based on the provided static analysis. It features no identified dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. Furthermore, the absence of external HTTP requests and a minimal attack surface with no REST API routes or AJAX handlers lacking permission callbacks are significant strengths. The plugin also shows no history of known vulnerabilities, including critical or high severity issues, suggesting a history of secure development practices.
While the static analysis reveals no critical security flaws such as unescaped output or unsanitized taint flows, and the vulnerability history is clean, there are a couple of areas for consideration. The plugin performs 13 file operations, which, while not inherently insecure, warrants attention as file operations can sometimes be a vector for vulnerabilities if not handled with extreme care, especially concerning user-supplied input. Additionally, the plugin has 0 nonce checks, which, in conjunction with the lack of other explicit entry points and permission checks, might indicate a very limited functionality where nonce checks are not strictly necessary for its current scope. However, in a broader context of WordPress security, a complete absence of nonce checks across any component could be a concern if the plugin's functionality were to expand or interact more dynamically with user input in the future.
Overall, the plugin appears to be developed with security in mind, exhibiting good coding practices. The lack of any known CVEs further reinforces this positive assessment. The primary points to note are the file operations and the complete absence of nonce checks, which, given the current data, do not point to immediate exploitable vulnerabilities but are worth keeping in mind for future development and auditing.
Key Concerns
- 13 file operations without explicit security context
- 0 nonce checks across all entry points
wp_wpcat_json_rest Security Vulnerabilities
wp_wpcat_json_rest Release Timeline
wp_wpcat_json_rest Code Analysis
SQL Query Safety
Output Escaping
wp_wpcat_json_rest Attack Surface
WordPress Hooks 7
Maintenance & Trust
wp_wpcat_json_rest Maintenance & Trust
Maintenance Signals
Community Trust
wp_wpcat_json_rest Alternatives
Disable REST API
disable-json-api
Disable the use of the REST API on your website to site users. Now with User Role support!
JWT Authentication for WP REST API
jwt-authentication-for-wp-rest-api
Extends the WP REST API using JSON Web Tokens Authentication as an authentication method.
Disable WP REST API
disable-wp-rest-api
Disables the WP REST API for visitors not logged into WordPress.
WordPress REST API (Version 2)
rest-api
Access your site's data through an easy-to-use HTTP REST API. (Version 2)
WPGet API – Connect to any external REST API
wpgetapi
Connect any REST API to WordPress. WPGet API enables easy API integration, allowing you to display API data without any code.
wp_wpcat_json_rest Developer Profile
3 plugins · 620 total installs
How We Detect wp_wpcat_json_rest
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-wpcat-json-rest/images//wp-content/plugins/wp-wpcat-json-rest/css//wp-content/plugins/wp-wpcat-json-rest/js//wp-content/plugins/wp-wpcat-json-rest/js/wp-wpcat-json-rest.jswp-wpcat-json-rest/style.css?ver=wp-wpcat-json-rest/js/wp-wpcat-json-rest.js?ver=HTML / DOM Fingerprints
data-wpcat-json-rest-gallerydata-wpcat-json-rest-gallery-sortwpcat_json_rest_settings/wp-json/extmedialib/v1/update/(?P<id>[\d]+)/wp-json/extmedialib/v1/update_meta/(?P<id>[\d]+)/wp-json/extmedialib/v1/addtofolder/(?P<folder>[a-zA-Z0-9\/\-_]*)/wp-json/extmedialib/v1/addfromfolder/(?P<folder>[a-zA-Z0-9\/\-_]*)/wp-json/extmedialib/v1/imagesubsizes/wp-json/extmedialib/v1/filetofolder/(?P<folder>[a-zA-Z0-9\/\-_]*)