Writio Security & Risk Analysis

wordpress.org/plugins/writio

Writio is a GPT-based writer that creates new content each day so you can focus on the content that is most profitable.

200 active installs v1.3.2 PHP 7.0+ WP 5.2.0+ Updated Mar 9, 2024
aicontent-generationwritio
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Writio Safe to Use in 2026?

Generally Safe

Score 85/100

Writio has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "writio" v1.3.2 plugin exhibits a generally strong security posture based on the provided static analysis. It demonstrates good practices by using prepared statements for all SQL queries and properly escaping all output. The absence of dangerous functions, file operations, and critical taint analysis findings is also a positive indicator. Furthermore, the plugin has no known historical vulnerabilities, suggesting a commitment to security or a lack of past exploitable issues.

However, several areas present potential concerns. The complete lack of nonce checks and capability checks across all identified entry points (AJAX handlers, REST API routes, and cron events) is a significant weakness. This means that any user, regardless of their role or privileges, could potentially trigger actions or access data through these routes, leading to authorization bypass vulnerabilities. While the attack surface is relatively small and all identified entry points appear to have some form of authorization (based on the 'Unprotected: 0' count), the *type* of authorization is not specified and the absence of explicit nonces and capability checks is a critical omission for any sensitive operations.

In conclusion, while the plugin uses secure coding practices for SQL and output handling, the lack of proper authorization mechanisms (nonces and capability checks) on its entry points is a notable security risk. The absence of vulnerability history is a positive sign, but it doesn't negate the inherent risks identified in the code analysis. A thorough review of what each entry point actually does would be necessary to fully assess the impact of these authorization deficiencies.

Key Concerns

  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Writio Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Writio Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
6
Bundled Libraries
0

Output Escaping

100% escaped9 total outputs
Attack Surface

Writio Attack Surface

Entry Points3
Unprotected0

REST API Routes 3

POST/wp-json/writio-api/v1/writio-requestincludes\rest-hooks.php:11
GET/wp-json/writio-api/v1/writio-tokenincludes\rest-hooks.php:17
GET/wp-json/writio-api/v1/writio-dataincludes\rest-hooks.php:22
WordPress Hooks 18
actionadmin_menuadmin\writio-admin.php:119
actionuser_registerincludes\data-listeners.php:7
actionprofile_updateincludes\data-listeners.php:8
actiondelete_userincludes\data-listeners.php:9
actioncreate_categoryincludes\data-listeners.php:10
actionedit_categoryincludes\data-listeners.php:11
actiondelete_categoryincludes\data-listeners.php:12
filterpre_option_uploads_use_yearmonth_foldersincludes\rest-hooks.php:273
filterupload_dirincludes\rest-hooks.php:274
filterpre_option_uploads_use_yearmonth_foldersincludes\rest-hooks.php:288
filterupload_dirincludes\rest-hooks.php:289
actionrest_api_initwritio.php:42
actioninitwritio.php:43
actionadmin_initwritio.php:44
actionadmin_initwritio.php:45
actionwpwritio.php:46
actionwritio_pull_unpublished_articleswritio.php:47
filterplugin_action_links_writio/writio-admin.phpwritio.php:54

Scheduled Events 1

writio_pull_unpublished_articles
Maintenance & Trust

Writio Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedMar 9, 2024
PHP min version7.0
Downloads13K

Community Trust

Rating94/100
Number of ratings3
Active installs200
Developer Profile

Writio Developer Profile

ezoic

3 plugins · 14K total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
590 days
View full developer profile
Detection Fingerprints

How We Detect Writio

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/writio/writio.css/wp-content/plugins/writio/writio.js
Script Paths
/wp-content/plugins/writio/writio.js
Version Parameters
writio/writio.css?ver=writio/writio.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-writio-plugin-version
JS Globals
writio_rest_urlwritio_plugin_version
REST Endpoints
/writio-api/v1/writio-request/writio-api/v1/writio-token/writio-api/v1/writio-data
FAQ

Frequently Asked Questions about Writio