[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$flXSl3AX3QQDuhloEmjLOPJjBYdx4RRssDdi8A8RqUgw":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"vulnerabilities":29,"developer":30,"crawl_stats":27,"alternatives":36,"analysis":142,"fingerprints":171},"acf-5-pro-json-storage","ACF 5 Pro JSON Storage","1.0.0","craigsimps","https:\u002F\u002Fprofiles.wordpress.org\u002Fcraigsimps\u002F","\u003Cp>I use Advanced Custom Fields 5 Pro for most custom WordPress projects, and the latest version supports saving your Field Groups to JSON. To activate this functionality out of the box, all you have to do is create a folder within your \u003Cem>theme\u003C\u002Fem> called \u003Ccode>\u002Facf-json\u002F\u003C\u002Fcode>. But I don’t like that.\u003C\u002Fp>\n\u003Cp>I prefer for these JSON files to be stored outside of the theme, because they’re key to the functionality of the website, and \u003Ccode>functionality === plugin\u003C\u002Fcode>. Storing this data outside of your WordPress theme makes it inherently more portable, and means you can retain the ACF JSON data even if you change theme.\u003C\u002Fp>\n\u003Cp>Once the plugin is installed and activate it will automatically save field groups as JSON within the plugin’s \u003Ccode>\u002Facf-json\u002F\u003C\u002Fcode> folder when they are updated or saved.\u003C\u002Fp>\n\u003Cp>This plugin is under active development on \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fcraigsimps\u002Facf-pro-json-storage\u002F\" rel=\"nofollow ugc\">Github\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Requirements\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>ACF 5 Pro (Synchronized JSON requires at least v5.1.5)\u003C\u002Fli>\n\u003C\u002Ful>\n","Save ACF 5 Pro custom fields as JSON within this plugin, rather than inside your theme.",90,2424,0,"2015-11-14T00:15:00.000Z","4.0.38","3.5.0","",[19,20,21,22,23],"acfpro","json","location","save","storage","https:\u002F\u002Fgithub.com\u002Fcraigsimps\u002Facf-json-storage","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Facf-5-pro-json-storage.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":31,"total_installs":32,"avg_security_score":11,"avg_patch_time_days":33,"trust_score":34,"computed_at":35},3,110,30,87,"2026-04-04T15:37:33.604Z",[37,59,78,97,119],{"slug":38,"name":39,"version":40,"author":41,"author_profile":42,"description":43,"short_description":44,"active_installs":45,"downloaded":46,"rating":47,"num_ratings":48,"last_updated":49,"tested_up_to":50,"requires_at_least":51,"requires_php":17,"tags":52,"homepage":57,"download_link":58,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"ipgp-geolocation","IPGP Geolocation","1.0.7","Lucian Apostol","https:\u002F\u002Fprofiles.wordpress.org\u002Fthedark\u002F","\u003Cp>Using IPGP Geolocation, you can redirect users in specific countries to another URL. You can add different redirect rules that applies to different countries and different URLs.\u003C\u002Fp>\n\u003Cp>After installation, go to IPGP Geolocation menu in your wordpress administration panel. There you can select which countries you want to apply the redirection for, and set a redirection URL. Add the rule and it is done.\u003C\u002Fp>\n\u003Cp>To get the user location, the data is send to IPGP Geolocation API, located at: http:\u002F\u002Fwww.ipgp.net\u002Fgeo\u002Fcountry.php . The API is free for fair usage. There is no private data sent to any external server. The data exchanged between the plugin and the API are: your visitor IP Address without other details about the visitor, and API key to be identified on the server and your website URL. The data sent back by the API contains the visitor country code, country name.\u003C\u002Fp>\n\u003Cp>When the plugin is activated, an API key is requested from the API website. The data sent to the API servers contains the current time, and a public number to make sure that the API key is requested by the plugin. The data sent back contains the API key, a secret key for authentication and the number of queries allowed for fair usage. Fair usage consist in 20,000 queries per month. This number is subject to change based on the load on our servers.\u003C\u002Fp>\n","Want to show different content based on user location, or to redirect certain users to another url ?",10,4540,76,4,"2023-02-03T23:04:00.000Z","6.1.10","2.7",[53,54,20,55,56],"geolocation","javascript","shortcode","widget","http:\u002F\u002Fwww.ipgp.net","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fipgp-geolocation.1.0.7.zip",{"slug":60,"name":61,"version":62,"author":63,"author_profile":64,"description":65,"short_description":66,"active_installs":45,"downloaded":67,"rating":68,"num_ratings":69,"last_updated":17,"tested_up_to":70,"requires_at_least":71,"requires_php":17,"tags":72,"homepage":75,"download_link":76,"security_score":68,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":77},"lean-media","Lean Media","1.0","Code Master","https:\u002F\u002Fprofiles.wordpress.org\u002Fcodix\u002F","\u003Cp>With easy access to high resolution digital cameras everyone has access to very large images. Your users\u003Cbr \u002F>\nare probably uploading them and using up lot of storage space for you. However these images are hardly\u003Cbr \u002F>\never used.\u003C\u002Fp>\n\u003Cp>Lean Media allows you to automatically delete the very large image files after generating thumbnails. Largest\u003Cbr \u002F>\nthumbnail is saved in place of the original image just in case you decide to generate thumbnails again.\u003C\u002Fp>\n\u003Cp>If the users are kind enough to upload small images Lean Media leaves such images intact.\u003C\u002Fp>\n\u003Ch3>Notes & Credits\u003C\u002Fh3>\n\u003Cp>This plugin is written by \u003Ca href=\"http:\u002F\u002Fmohanjith.com\u002F\" rel=\"nofollow ugc\">S H Mohanjith\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>You should follow us on Twitter \u003Cem>\u003Ca href=\"http:\u002F\u002Ftwitter.com\u002Fcodemasteroy\" rel=\"nofollow ugc\">here\u003C\u002Fa>\u003C\u002Fem>.\u003C\u002Fp>\n","Save storage space by deleting large image files after generating thumbnails.",2489,100,1,"3.5.2","3.4.1",[73,22,23,74],"media","thumbnail","http:\u002F\u002Fcodemaster.fi\u002Fwordpress\u002Fplugins\u002Flean-media\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flean-media.1.0.zip","2026-03-15T10:48:56.248Z",{"slug":79,"name":80,"version":6,"author":81,"author_profile":82,"description":83,"short_description":84,"active_installs":13,"downloaded":85,"rating":13,"num_ratings":13,"last_updated":86,"tested_up_to":87,"requires_at_least":88,"requires_php":89,"tags":90,"homepage":17,"download_link":96,"security_score":68,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"auto-save-progress-for-gravity-forms","Auto Save Progress for Gravity Forms","Maruf Sarkar","https:\u002F\u002Fprofiles.wordpress.org\u002Fmarufsarkar\u002F","\u003Cp>\u003Cstrong>Auto Save Progress for Gravity Forms\u003C\u002Fstrong> automatically saves user progress on Gravity Forms to their browser’s localStorage. This means your users won’t lose their form data if they accidentally refresh the page or close the browser.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Key Features:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Auto-saves form progress to browser localStorage\u003C\u002Fli>\n\u003Cli>No server-side action needed – saves locally on user’s browser\u003C\u002Fli>\n\u003Cli>Auto-restores form data when page is reloaded\u003C\u002Fli>\n\u003Cli>Supports all Gravity Forms field types\u003C\u002Fli>\n\u003Cli>Works with multi-step\u002Fconditional forms\u003C\u002Fli>\n\u003Cli>Automatically clears data after successful submission\u003C\u002Fli>\n\u003Cli>Customizable save interval (1-30 seconds)\u003C\u002Fli>\n\u003Cli>Optional browser console notifications\u003C\u002Fli>\n\u003Cli>Easy admin settings page\u003C\u002Fli>\n\u003Cli>Lightweight and performant\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cp>For support and bug reports, please use the official plugin support forum:\u003Cbr \u002F>\nhttps:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fauto-save-progress-for-gravity-forms\u002F\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is licensed under the GPL v2 or later. See license for more details.\u003C\u002Fp>\n","Automatically save Gravity Forms progress to browser localStorage. Recover user data if page is refreshed or closed.",115,"2025-12-17T12:18:00.000Z","6.9.4","5.0","7.4",[91,92,93,94,95],"auto-save","form-builder","form-progress","gravity-forms","localstorage","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fauto-save-progress-for-gravity-forms.zip",{"slug":98,"name":99,"version":100,"author":101,"author_profile":102,"description":103,"short_description":104,"active_installs":105,"downloaded":106,"rating":107,"num_ratings":108,"last_updated":109,"tested_up_to":87,"requires_at_least":110,"requires_php":89,"tags":111,"homepage":117,"download_link":118,"security_score":68,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"imsanity","Imsanity","2.9.0","nosilver4u","https:\u002F\u002Fprofiles.wordpress.org\u002Fnosilver4u\u002F","\u003Cp>Automatically resize huge image uploads with Imsanity. Choose whatever size and quality you like, and let Imsanity do the rest.  When a contributor uploads an image that is larger than the configured size, Imsanity will automatically scale it down to the configured size and replace the original image.\u003C\u002Fp>\n\u003Cp>Imsanity also provides a bulk-resize feature to resize previously uploaded images and free up disk space. You may resize individual images from the Media Library’s List View.\u003C\u002Fp>\n\u003Cp>This plugin is ideal for blogs that do not require hi-resolution original images to be stored and\u002For the contributors don’t want (or understand how) to scale images before uploading.\u003C\u002Fp>\n\u003Cp>You may report security issues through our Patchstack Vulnerability Disclosure Program. The Patchstack team helps validate, triage and handle any security vulnerabilities. \u003Ca href=\"https:\u002F\u002Fpatchstack.com\u002Fdatabase\u002Fvdp\u002Fimsanity\" rel=\"nofollow ugc\">Report a security vulnerability.\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Automatically scales large image uploads to a more “sane” size\u003C\u002Fli>\n\u003Cli>Bulk resize feature to resize existing images\u003C\u002Fli>\n\u003Cli>Selectively resize images directly in the Media Library (List View)\u003C\u002Fli>\n\u003Cli>Allows configuration of max width\u002Fheight and JPG quality\u003C\u002Fli>\n\u003Cli>Optionally converts BMP and PNG files to JPG for more savings\u003C\u002Fli>\n\u003Cli>Once enabled, Imsanity requires no actions on the part of the user\u003C\u002Fli>\n\u003Cli>Uses WordPress built-in image scaling functions\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Translations\u003C\u002Fh4>\n\u003Cp>Imsanity is available in several languages, each of which will be downloaded automatically when you install the plugin. To help translate it into your language, visit https:\u002F\u002Ftranslate.wordpress.org\u002Fprojects\u002Fwp-plugins\u002Fimsanity\u003C\u002Fp>\n\u003Ch4>Contribute\u003C\u002Fh4>\n\u003Cp>Imsanity is developed at https:\u002F\u002Fgithub.com\u002Fnosilver4u\u002Fimsanity (pull requests are welcome)\u003C\u002Fp>\n\u003Ch3>Credits\u003C\u002Fh3>\n\u003Cp>Originally written by Jason Hinkle (RIP). Maintained and developed by \u003Ca href=\"https:\u002F\u002Fewww.io\" rel=\"nofollow ugc\">Shane Bishop\u003C\u002Fa> with special thanks to my \u003Ca href=\"https:\u002F\u002Fwww.iamsecond.com\u002F\" rel=\"nofollow ugc\">Lord and Savior\u003C\u002Fa>.\u003C\u002Fp>\n","Automatically resizes huge image uploads. Are contributors uploading huge photos? Tired of manually resizing your images? Imsanity to the rescue!",200000,4453561,98,291,"2026-02-10T17:08:00.000Z","6.6",[112,113,114,115,116],"image","quality","resize","scale","space-saver","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fimsanity\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fimsanity.2.9.0.zip",{"slug":120,"name":121,"version":122,"author":123,"author_profile":124,"description":125,"short_description":126,"active_installs":127,"downloaded":128,"rating":129,"num_ratings":130,"last_updated":131,"tested_up_to":132,"requires_at_least":133,"requires_php":134,"tags":135,"homepage":140,"download_link":141,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"disable-json-api","Disable REST API","1.8","Dave McHale","https:\u002F\u002Fprofiles.wordpress.org\u002Fdmchale\u002F","\u003Cp>The most comprehensive plugin for controlling access to the WordPress REST API!\u003C\u002Fp>\n\u003Cp>Works as a “set it and forget it” install. Just upload and activate, and the entire REST API will be inaccessible to your general site visitors.\u003C\u002Fp>\n\u003Cp>But if you do need to grant access to some endpoints, you can do that too. Go to the Settings page and you can quickly whitelist individual endpoints (or entire branches of endpoints) in the REST API.\u003C\u002Fp>\n\u003Cp>You can even do this on a per-user-role basis, so your unauthenticated users have one set of rules while WooCommerce customers have another while Subscribers and Editors and Admins all have their own. NOTE: Out of the box, all defined user roles will still be granted full access to the REST API until you choose to manage those settings.\u003C\u002Fp>\n\u003Cp>For most versions of WordPress, this plugin will return an authentication error if a user is not allowed to access an endpoint. For legacy support, WordPress 4.4, 4.5, and 4.6 use the provided \u003Ccode>rest_enabled\u003C\u002Fcode> filter to disable the entire REST API.\u003C\u002Fp>\n","Disable the use of the REST API on your website to site users. Now with User Role support!",90000,753897,96,38,"2023-09-14T00:26:00.000Z","6.3.8","4.9","5.6",[136,137,20,138,139],"admin","api","rest","rest-api","http:\u002F\u002Fwww.binarytemplar.com\u002Fdisable-json-api","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdisable-json-api.zip",{"attackSurface":143,"codeSignals":159,"taintFlows":166,"riskAssessment":167,"analyzedAt":170},{"hooks":144,"ajaxHandlers":155,"restRoutes":156,"shortcodes":157,"cronEvents":158,"entryPointCount":13,"unprotectedCount":13},[145,151],{"type":146,"name":147,"callback":148,"file":149,"line":150},"filter","acf\u002Fsettings\u002Fsave_json","ajs_acf_json_save_point","acf-5-json-storage.php",27,{"type":146,"name":152,"callback":153,"file":149,"line":154},"acf\u002Fsettings\u002Fload_json","ajs_acf_json_load_point",39,[],[],[],[],{"dangerousFunctions":160,"sqlUsage":161,"outputEscaping":163,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":165},[],{"prepared":13,"raw":13,"locations":162},[],{"escaped":13,"rawEcho":13,"locations":164},[],[],[],{"summary":168,"deductions":169},"The plugin 'acf-5-pro-json-storage' v1.0.0 demonstrates a strong security posture based on the provided static analysis.  There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in zero entry points and no unprotected ones. The code analysis also reveals no dangerous functions, SQL queries are exclusively handled with prepared statements, and all output is properly escaped.  Furthermore, there are no file operations or external HTTP requests, and importantly, no nonce or capability checks are missing, indicating a deliberate design choice to avoid common plugin vulnerabilities.  The absence of any recorded CVEs, past or present, further reinforces its secure track record.  The taint analysis shows no flows with unsanitized paths, which is a significant positive indicator. The plugin's strengths lie in its minimal attack surface and apparent adherence to secure coding practices.  However, the complete absence of capability checks across all potential (though currently zero) entry points, while not a direct vulnerability in this instance due to the lack of entry points, is a point of note.  If functionality were to be added in the future, these checks would become crucial. Overall, the plugin appears very secure, with no immediately exploitable vulnerabilities identified.",[],"2026-03-16T21:22:28.579Z",{"wat":172,"direct":177},{"assetPaths":173,"generatorPatterns":174,"scriptPaths":175,"versionParams":176},[],[],[],[],{"cssClasses":178,"htmlComments":179,"htmlAttributes":180,"restEndpoints":181,"jsGlobals":182,"shortcodeOutput":183},[],[],[],[],[],[]]