Writesonic Security & Risk Analysis

wordpress.org/plugins/writesonic

Writesonic is an AI writing tool that generates high-quality articles, blog posts, landing pages, Google & Facebook ads, emails, and more in seconds.

1K active installs v1.0.6 PHP 7.4+ WP 6.0+ Updated Feb 23, 2026
ai-copywritingai-writerai-writingwritesonic
99
A · Safe
CVEs total1
Unpatched0
Last CVEJun 27, 2025
Download
Safety Verdict

Is Writesonic Safe to Use in 2026?

Generally Safe

Score 99/100

Writesonic has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jun 27, 2025Updated 2mo ago
Risk Assessment

The Writesonic plugin v1.0.6 exhibits a generally positive security posture based on static analysis. The absence of dangerous functions, raw SQL queries, and improperly escaped output are strong indicators of good development practices. File operations are also absent, further reducing the potential for file-based vulnerabilities. The presence of external HTTP requests is noted but not inherently a security risk without further context on its implementation.

However, the plugin presents a significant concern due to its attack surface. Out of nine total REST API routes, four lack proper permission callbacks. This means that potentially sensitive operations exposed via the REST API could be accessed by unauthenticated or low-privileged users, creating a considerable risk of unauthorized actions or data exposure. The taint analysis showing zero flows is reassuring, but the large number of unprotected REST API endpoints overshadows this.

The vulnerability history shows one known CVE, a Cross-Site Request Forgery (CSRF), which was patched. While it's good that this is no longer an active issue, the presence of a past CSRF vulnerability indicates a potential for this type of attack if not carefully mitigated in future updates. In conclusion, the plugin has strengths in secure coding practices but suffers from a notable weakness in exposed REST API endpoints, which poses a real security risk that should be addressed.

Key Concerns

  • Unprotected REST API routes
  • Past CSRF vulnerability
Vulnerabilities
1 published

Writesonic Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-53262medium · 4.3Cross-Site Request Forgery (CSRF)

Writesonic <= 1.0.5 - Cross-Site Request Forgery

Jun 27, 2025 Patched in 1.0.6 (244d)
Version History

Writesonic Release Timeline

v1.0.6Current
v1.0.51 CVE
v1.0.31 CVE
v1.0.21 CVE
v1.0.11 CVE
v1.0.01 CVE
Code Analysis
Analyzed Mar 16, 2026

Writesonic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
30 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped30 total outputs
Attack Surface
4 unprotected

Writesonic Attack Surface

Entry Points9
Unprotected4

REST API Routes 9

GET/wp-json/writesonic/v2/categorieswritesonic.php:126
GET/wp-json/writesonic/v2/tagswritesonic.php:134
GET/wp-json/writesonic/v2/postswritesonic.php:145
GET/wp-json/writesonic/v2/posts/(?P<id>\d+)writesonic.php:196
GET/wp-json/writesonic/v2/mediawritesonic.php:251
GET/wp-json/writesonic/v2/commentswritesonic.php:272
GET/wp-json/writesonic/v2/userswritesonic.php:293
GET/wp-json/writesonic/v2/passwordwritesonic.php:300
GET/wp-json/writesonic/v2/authorswritesonic.php:313
WordPress Hooks 5
actionadmin_menuwritesonic.php:41
actionrest_api_initwritesonic.php:42
actionadmin_initwritesonic.php:44
filterrest_user_querywritesonic.php:47
filterregister_post_type_argswritesonic.php:50
Maintenance & Trust

Writesonic Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 23, 2026
PHP min version7.4
Downloads28K

Community Trust

Rating0/100
Number of ratings0
Active installs1K
Developer Profile

Writesonic Developer Profile

Writesonic

2 plugins · 1K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
244 days
View full developer profile
Detection Fingerprints

How We Detect Writesonic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/writesonic/assets/css/settings.css/wp-content/plugins/writesonic/assets/js/settings.js
Script Paths
/wp-content/plugins/writesonic/assets/js/settings.js

HTML / DOM Fingerprints

CSS Classes
writesonic-settings-pagewritesonic-api-key-inputwritesonic-submit-button
Data Attributes
data-writesonic-api-key-option
REST Endpoints
/wp-json/writesonic/v2/categories/wp-json/writesonic/v2/tags/wp-json/writesonic/v2/posts/wp-json/writesonic/v2/posts/\d+
FAQ

Frequently Asked Questions about Writesonic