[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fV0sFe9CghnTiMgrVVc9qSq9MIfeGUmWHg1KlN1woIh4":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":29,"last_vuln_date":30,"fetched_at":31,"vulnerabilities":32,"developer":66,"crawl_stats":38,"alternatives":71,"analysis":170,"fingerprints":271},"atec-debug","atec Debug","1.2.30","docjojo","https:\u002F\u002Fprofiles.wordpress.org\u002Fdocjojo\u002F","\u003Cp>atec Debug is a lightweight developer toolbox to help debug your WordPress site.\u003C\u002Fp>\n\u003Cp>Features include:\u003Cbr \u002F>\n* View \u003Ccode>\u002Fwp-content\u002Fdebug.log\u003C\u002Fcode> directly from the admin bar\u003Cbr \u002F>\n* Toggle WP constants like \u003Ccode>WP_DEBUG\u003C\u002Fcode>, \u003Ccode>WP_DEBUG_LOG\u003C\u002Fcode>, \u003Ccode>SAVEQUERIES\u003C\u002Fcode>, and \u003Ccode>WP_AUTO_UPDATE_CORE\u003C\u002Fcode>\u003Cbr \u002F>\n* View and trigger WordPress cron jobs\u003Cbr \u002F>\n* Parse and edit \u003Ccode>wp-config.php\u003C\u002Fcode> values like \u003Ccode>WP_MEMORY_LIMIT\u003C\u002Fcode>\u003Cbr \u002F>\n* Show all database queries (when \u003Ccode>SAVEQUERIES\u003C\u002Fcode> is enabled)\u003Cbr \u002F>\n* List all included PHP files\u003Cbr \u002F>\n* Read and parse the \u002Fwp-config.php file.\u003C\u002Fp>\n\u003Cp>This plugin is ideal for development and debugging in real-time, without editing files manually.\u003C\u002Fp>\n\u003Ch3>Specifications\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Reads and parses \u003Ccode>wp-config.php\u003C\u002Fcode> and debug.log\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Third-Party Services\u003C\u002Fh3>\n\u003Ch3>Integrity check\u003C\u002Fh3>\n\u003Cp>Once, when activating the plugin, an integrity check is requested from our server – if you give your permission.\u003Cbr \u002F>\nSource: https:\u002F\u002Fatecplugins.com\u002F\u003Cbr \u002F>\nPrivacy policy: https:\u002F\u002Fatecplugins.com\u002Fprivacy-policy\u002F\u003C\u002Fp>\n","Essential toolbox to debug a WordPress installation.",60,4795,100,1,"2026-01-08T13:13:00.000Z","6.9.4","4.9","7.4",[20,21,22,23,24],"cron-jobs","debug","savequeries","toolbox","wp_debug","https:\u002F\u002Fatecplugins.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fatec-debug.1.2.30.zip",94,3,0,"2025-09-03 00:00:00","2026-03-15T15:16:48.613Z",[33,48,58],{"id":34,"url_slug":35,"title":36,"description":37,"plugin_slug":4,"theme_slug":38,"affected_versions":39,"patched_in_version":40,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":30,"updated_date":45,"references":46,"days_to_patch":14},"CVE-2025-9518","atec-debug-authenticated-administrator-arbitrary-file-deletion","atec Debug \u003C= 1.2.22 - Authenticated (Administrator+) Arbitrary File Deletion","The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).",null,"\u003C=1.2.22","1.2.23","high",7.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Absolute Path Traversal","2025-09-04 04:23:48",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F170cd2e3-e31b-452e-8c15-d44a8be7757b?source=api-prod",{"id":49,"url_slug":50,"title":51,"description":52,"plugin_slug":4,"theme_slug":38,"affected_versions":39,"patched_in_version":40,"severity":53,"cvss_score":54,"cvss_vector":55,"vuln_type":44,"published_date":30,"updated_date":45,"references":56,"days_to_patch":14},"CVE-2025-9516","atec-debug-authenticated-administrator-arbitrary-file-read","atec Debug \u003C= 1.2.22 - Authenticated (Administrator+) Arbitrary File Read","The atec Debug plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to view the contents of files outside of the originally intended directory.","medium",4.9,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N",[57],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F4bf43620-34ee-4e4f-b6ee-d24fbdbc894e?source=api-prod",{"id":59,"url_slug":60,"title":61,"description":62,"plugin_slug":4,"theme_slug":38,"affected_versions":39,"patched_in_version":40,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":63,"published_date":30,"updated_date":45,"references":64,"days_to_patch":14},"CVE-2025-9517","atec-debug-authenticated-administrator-remote-code-execution","atec Debug \u003C= 1.2.22 - Authenticated (Administrator+) Remote Code Execution","The atec Debug plugin for WordPress is vulnerable to remote code execution in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This is due to insufficient sanitization when saving the custom log path. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.","Improper Control of Generation of Code ('Code Injection')",[65],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F99fc02ea-5399-4ff2-a5f9-27878cadf40d?source=api-prod",{"slug":7,"display_name":7,"profile_url":8,"plugin_count":67,"total_installs":68,"avg_security_score":69,"avg_patch_time_days":14,"trust_score":69,"computed_at":70},16,2730,99,"2026-04-04T04:57:54.752Z",[72,95,117,136,152],{"slug":73,"name":74,"version":75,"author":76,"author_profile":77,"description":78,"short_description":79,"active_installs":80,"downloaded":81,"rating":13,"num_ratings":82,"last_updated":83,"tested_up_to":84,"requires_at_least":85,"requires_php":86,"tags":87,"homepage":92,"download_link":93,"security_score":94,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"log-deprecated-notices","Log Deprecated Notices","0.4.1","Andrew Nacin","https:\u002F\u002Fprofiles.wordpress.org\u002Fnacin\u002F","\u003Cp>This plugin logs the usage of deprecated files, functions, and function arguments. It identifies where the deprecated functionality is being used and offers the alternative if available.\u003C\u002Fp>\n\u003Cp>This is a plugin for developers. WP_DEBUG is not needed, though its general usage is strongly recommended. Deprecated notices normally exposed by WP_DEBUG will be logged instead.\u003C\u002Fp>\n\u003Cp>This plugin also logs incorrect function usage, which WordPress started reporting in 3.1.\u003C\u002Fp>\n\u003Cp>Please report any bugs to plugins in a \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Flog-deprecated-notices\" rel=\"ugc\">support thread\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>This is young software. It works, but there’s a lot left on the todo (check out the Other Notes tab). Have an idea? Let me know.\u003C\u002Fp>\n\u003Ch3>Ideas\u003C\u002Fh3>\n\u003Cp>These are the various things on the @todo:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Plugin identification. Also, an unobstrusive note on plugins page next to said plugins.\u003C\u002Fli>\n\u003Cli>Perhaps the ability to auto-purge the log.\u003C\u002Fli>\n\u003Cli>Ability to filter on file or plugin in which the deprecated functionality is used.\u003C\u002Fli>\n\u003Cli>Offer some kind of better multisite support.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Want to add something here? I’m all ears. plugins at \u003Ca href=\"http:\u002F\u002Fandrewnacin.com\u002F\" rel=\"nofollow ugc\">andrewnacin.com\u003C\u002Fa> or @\u003Ca href=\"http:\u002F\u002Ftwitter.com\u002Fnacin\" rel=\"nofollow ugc\">nacin\u003C\u002Fa> on Twitter.\u003C\u002Fp>\n\u003Cp>I will prioritize these tasks based on feedback, so let me know what you’d like to see.\u003C\u002Fp>\n","Logs the usage of deprecated files, functions, and function arguments, and identifies where the deprecated functionality is being used.",1000,165887,10,"2021-06-25T14:17:00.000Z","5.8.13","3.0","",[88,89,90,91,24],"admin","deprecated","e_notice","logging","http:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Flog-deprecated-notices\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flog-deprecated-notices.0.4.1.zip",85,{"slug":96,"name":97,"version":98,"author":99,"author_profile":100,"description":101,"short_description":102,"active_installs":103,"downloaded":104,"rating":105,"num_ratings":106,"last_updated":107,"tested_up_to":108,"requires_at_least":109,"requires_php":86,"tags":110,"homepage":113,"download_link":114,"security_score":115,"vuln_count":14,"unpatched_count":29,"last_vuln_date":116,"fetched_at":31},"enable-wp-debug-from-admin-dashboard","Debug Bar – Enable WP_DEBUG from admin dashboard","1.93","Puvox Software","https:\u002F\u002Fprofiles.wordpress.org\u002Fpuvoxsoftware\u002F","\u003Ch4>[ ✅ 𝐒𝐄𝐂𝐔𝐑𝐄 𝐏𝐋𝐔𝐆𝐈𝐍𝐒 b𝓎 𝒫𝓊𝓋𝑜𝓍] :\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>• Revised for security to be reliable and free of vulnerability holes.\u003Cbr \u002F>\n  • Efficient, not to add any extra load\u002Fslowness to site.\u003Cbr \u002F>\n  • Don’t collect private data.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>Plugin Description\u003C\u002Fh4>\n\u003Cp>READ DESCRIPTION BEFORE INSTALLING!\u003Cbr \u002F>\nEasily enable\u002Fdisable WP_DEBUG with one single click from Admin Toolbar. What’s more, this plugin is failsafe & clever – in case of errors, it automatically exits the WP_DEBUG mode, thus, you won’t face any problems.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Works with \u003Ccode>Debug Bar\u003C\u002Fcode> plugin. \u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>NOTE\u003C\u002Fh4>\n\u003Cp>Plugin modifies \u003Ccode>wp-config.php\u003C\u002Fcode>. However, on some sites, this might cause some conflict with existing wp-config, causing to interfere the page-load. So, use at your own responsibility. If unsure, use on test site.\u003C\u002Fp>\n\u003Ch4>Available Options\u003C\u002Fh4>\n\u003Cp>See all available options and their description on plugin’s settings page.\u003C\u002Fp>\n","[ ✅ 𝐒𝐄𝐂𝐔𝐑𝐄 𝐏𝐋𝐔𝐆𝐈𝐍𝐒 b𝓎 𝒫𝓊𝓋𝑜𝓍]  You can easily enable WP_DEBUG using a toolbar button. READ DESCRIPTION!",200,15439,36,5,"2024-10-30T11:24:00.000Z","6.5.8","6.0",[88,21,111,112,24],"enable","wp","https:\u002F\u002Fpuvox.software\u002Fsoftware\u002Fwordpress-plugins\u002F?plugin=enable-wp-debug-from-admin-dashboard","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fenable-wp-debug-from-admin-dashboard.zip",92,"2022-08-01 00:00:00",{"slug":118,"name":119,"version":120,"author":121,"author_profile":122,"description":123,"short_description":124,"active_installs":13,"downloaded":125,"rating":126,"num_ratings":127,"last_updated":128,"tested_up_to":16,"requires_at_least":17,"requires_php":129,"tags":130,"homepage":86,"download_link":135,"security_score":13,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"conflict-finder-wp-fix-it","Conflict Finder","7.2","WP Fix It - WordPress Experts","https:\u002F\u002Fprofiles.wordpress.org\u002Fwpfixit\u002F","\u003Cp>Conflict Finder is a comprehensive troubleshooting plugin designed for WordPress administrators, developers, and support professionals who need to identify the root cause of site issues.\u003C\u002Fp>\n\u003Cp>From a single interface, Conflict Finder allows you to:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Enable and manage WP_DEBUG without manually editing files\u003C\u002Fli>\n\u003Cli>View, download, and clear the WordPress debug log\u003C\u002Fli>\n\u003Cli>Temporarily disable plugins to identify conflicts\u003C\u002Fli>\n\u003Cli>Switch themes to test theme-related issues\u003C\u002Fli>\n\u003Cli>Test WordPress email delivery using \u003Ccode>wp_mail()\u003C\u002Fcode>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Important:\u003C\u002Fstrong>\u003Cbr \u002F>\nConflict Finder \u003Cstrong>does temporarily affect site behavior\u003C\u002Fstrong> while troubleshooting is active. This may include:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Disabled plugins\u003C\u002Fli>\n\u003Cli>A different active theme\u003C\u002Fli>\n\u003Cli>Debug notices or errors being displayed\u003C\u002Fli>\n\u003Cli>Changes visible to logged-out visitors\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>For this reason, troubleshooting should be performed during maintenance windows or on staging sites whenever possible.\u003C\u002Fp>\n\u003Cp>Conflict Finder automatically tracks your original configuration and allows you to restore plugins, themes, and debugging settings once testing is complete.\u003C\u002Fp>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Cstrong>Troubleshooting Dashboard\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Central overview of debugging and conflict states\u003C\u002Fli>\n\u003Cli>Environment snapshot including WordPress, PHP, memory, and server software\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>WP_DEBUG Tool\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Enable or disable WP_DEBUG with a single switch\u003C\u002Fli>\n\u003Cli>Control error display and logging behavior\u003C\u002Fli>\n\u003Cli>Load unminified scripts for debugging\u003C\u002Fli>\n\u003Cli>View, download, or clear \u003Ccode>wp-content\u002Fdebug.log\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>Safely updates \u003Ccode>wp-config.php\u003C\u002Fcode> as needed\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Plugin Conflict Tool\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Temporarily deactivate all active plugins\u003C\u002Fli>\n\u003Cli>Save and restore original plugin states\u003C\u002Fli>\n\u003Cli>Activate plugins one at a time to identify conflicts\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Theme Conflict Tool\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Temporarily switch to another installed theme\u003C\u002Fli>\n\u003Cli>Identify theme-related layout or functionality issues\u003C\u002Fli>\n\u003Cli>Restore the original theme instantly\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Email Delivery Tool\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Send a real test email using WordPress mail\u003C\u002Fli>\n\u003Cli>Confirm whether the server can successfully send email\u003C\u002Fli>\n\u003Cli>Helps identify SMTP or hosting mail issues\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>When to Use Conflict Finder\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Diagnosing white screens or fatal errors\u003C\u002Fli>\n\u003Cli>Identifying plugin conflicts\u003C\u002Fli>\n\u003Cli>Testing theme-related layout or functionality issues\u003C\u002Fli>\n\u003Cli>Investigating PHP notices or warnings\u003C\u002Fli>\n\u003Cli>Verifying WordPress email delivery\u003C\u002Fli>\n\u003Cli>Support and development workflows\u003C\u002Fli>\n\u003C\u002Ful>\n","Conflict Finder is a WordPress troubleshooting toolkit that helps diagnose plugin conflicts, theme issues, debugging errors, and email delivery proble &hellip;",8747,90,4,"2026-01-27T14:26:00.000Z","5.6",[131,132,133,134,24],"debug-log","plugin-conflict","theme-conflict","troubleshooting","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fconflict-finder-wp-fix-it.7.2.zip",{"slug":137,"name":138,"version":139,"author":140,"author_profile":141,"description":142,"short_description":143,"active_installs":126,"downloaded":144,"rating":29,"num_ratings":29,"last_updated":145,"tested_up_to":16,"requires_at_least":146,"requires_php":129,"tags":147,"homepage":150,"download_link":151,"security_score":13,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"debug-status-display-footer","Debug Status display","1.1.0","apasionados","https:\u002F\u002Fprofiles.wordpress.org\u002Fapasionados\u002F","\u003Cp>This plugin displays if WP_DEBUG is active (\u003Ccode>define('WP_DEBUG', true);\u003C\u002Fcode> in the wp-config.php configuration file) in the admin footer. If WP_DEBUG is not active it shows WP_DEBUG strike through in the admin footer and if it’s active it show WP_DEBUG in orange color. This helps to identify in one second if WP_DEBUG is active on a site or not.\u003C\u002Fp>\n\u003Cp>It can be used alone or together with the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fserver-ip-memory-usage\u002F\" rel=\"ugc\">“Server IP & Memory Usage Display”\u003C\u002Fa> and\u002For the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fdisplay-mysql-version\u002F\" rel=\"ugc\">“Display MySql version”\u003C\u002Fa> plugin.\u003C\u002Fp>\n\u003Ch4>What can I do with this plugin?\u003C\u002Fh4>\n\u003Cp>This plugin displays if WP_DEBUG is active (\u003Ccode>define('WP_DEBUG', true);\u003C\u002Fcode> in the wp-config.php configuration file) in the admin footer. If WP_DEBUG is not active it shows WP_DEBUG strike through. If it’s active it show WP_DEBUG in orange color.\u003C\u002Fp>\n\u003Ch4>What ideas is this plugin based on?\u003C\u002Fh4>\n\u003Cp>We have had some requirements to add the information if WP_DEBUG is active and some other information to the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fserver-ip-memory-usage\u002F\" rel=\"ugc\">Server IP & Memory Usage Display\u003C\u002Fa> plugin. As we want to keep this plugin as simple as possible and without settings page, we decided to create this small plugin, which can be used alone or together with the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fserver-ip-memory-usage\u002F\" rel=\"ugc\">“Server IP & Memory Usage Display”\u003C\u002Fa> and\u002For the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fdisplay-mysql-version\u002F\" rel=\"ugc\">“Display MySql version”\u003C\u002Fa> plugin.\u003C\u002Fp>\n\u003Ch4>System requirements\u003C\u002Fh4>\n\u003Cp>PHP version 5.6 or greater.\u003C\u002Fp>\n\u003Ch4>Debug status display Plugin in your Language!\u003C\u002Fh4>\n\u003Cp>This first release is avaliable in English and Spanish. In the “lang” folder we have included the necessary files to translate this plugin.\u003C\u002Fp>\n\u003Cp>If you would like the plugin in your language and you’re good at translating, please drop us a line at \u003Ca href=\"http:\u002F\u002Fapasionados.es\u002Fcontacto\u002Findex.php?desde=wordpress-org-debug-status-display-home\" rel=\"nofollow ugc\">Contact us\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>Further Reading\u003C\u002Fh4>\n\u003Cp>You can access the description of the plugin in Spanish at: \u003Ca href=\"https:\u002F\u002Fapasionados.es\u002Fblog\u002Fmostrar-aviso-si-wordpress-esta-en-modo-debug-wordpress-plugin-7758\u002F\" rel=\"nofollow ugc\">Debug status display en espa&ntilde;ol\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>Contact\u003C\u002Fh3>\n\u003Cp>For further information please send us an \u003Ca href=\"http:\u002F\u002Fapasionados.es\u002Fcontacto\u002Findex.php?desde=wordpress-org-debug-status-display-contact\" rel=\"nofollow ugc\">email\u003C\u002Fa>.\u003C\u002Fp>\n","Displays if WP_DEBUG is active in the admin footer. This plugin can be used alone or together with the \"Server IP & Memory Usage Display\" plugin.",2623,"2026-01-27T14:04:00.000Z","3.0.1",[21,148,149,24],"info","server","http:\u002F\u002Fapasionados.es\u002F#utm_source=wpadmin&utm_medium=plugin&utm_campaign=debug-status-display-plugin","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdebug-status-display-footer.1.1.0.zip",{"slug":153,"name":154,"version":155,"author":156,"author_profile":157,"description":158,"short_description":159,"active_installs":160,"downloaded":161,"rating":162,"num_ratings":14,"last_updated":163,"tested_up_to":164,"requires_at_least":85,"requires_php":86,"tags":165,"homepage":86,"download_link":169,"security_score":94,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"disable-deprecated-warnings","Disable Deprecated Warnings","1.0","tamlyn","https:\u002F\u002Fprofiles.wordpress.org\u002Ftamlyn\u002F","\u003Cp>As a theme developer, you want to have WP_DEBUG enabled but you’re not interested in the deprecated warnings created by other plugins. Use this plugin to disable these messages while still displaying other errors, warnings and notices.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"http:\u002F\u002Foutlandishideas.co.uk\u002Fblog\u002F2012\u002F06\u002Fhide-deprecated-errors-in-wordpress\u002F\" rel=\"nofollow ugc\">Plugin by Outlandish Ideas\u003C\u002Fa>\u003C\u002Fp>\n","Prevents plugins from showing deprecated errors in the WordPress admin.",50,3289,80,"2012-06-22T16:12:00.000Z","3.4.2",[21,166,89,167,168],"depracated","errors","wp-debug","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdisable-deprecated-warnings.zip",{"attackSurface":171,"codeSignals":217,"taintFlows":252,"riskAssessment":253,"analyzedAt":270},{"hooks":172,"ajaxHandlers":207,"restRoutes":214,"shortcodes":215,"cronEvents":216,"entryPointCount":14,"unprotectedCount":14},[173,179,182,185,188,192,196,199,202,204],{"type":174,"name":175,"callback":176,"file":177,"line":178},"action","admin_menu","closure","atec-debug.php",29,{"type":174,"name":180,"callback":176,"file":177,"line":181},"admin_init",30,{"type":174,"name":183,"callback":176,"priority":184,"file":177,"line":105},"admin_bar_menu",999,{"type":174,"name":186,"callback":176,"priority":82,"file":177,"line":187},"wp_error_added",57,{"type":189,"name":190,"callback":176,"priority":82,"file":177,"line":191},"filter","doing_it_wrong_trigger_error",65,{"type":174,"name":193,"callback":176,"file":194,"line":195},"admin_enqueue_scripts","includes\\ATEC\\INIT.php",564,{"type":174,"name":197,"callback":176,"file":194,"line":198},"admin_notices",647,{"type":174,"name":200,"callback":176,"priority":82,"file":194,"line":201},"admin_footer",688,{"type":174,"name":197,"callback":176,"file":194,"line":203},720,{"type":174,"name":183,"callback":176,"priority":184,"file":205,"line":206},"includes\\ATEC\\MEMORY.php",28,[208],{"action":209,"nopriv":210,"callback":211,"hasNonce":210,"hasCapCheck":210,"file":212,"line":213},"atec_admin_notice_dismiss",false,"dismiss_notice","includes\\ATEC\\LOADER.php",109,[],[],[],{"dangerousFunctions":218,"sqlUsage":224,"outputEscaping":226,"fileOperations":249,"externalRequests":14,"nonceChecks":250,"capabilityChecks":106,"bundledLibraries":251},[219],{"fn":220,"file":221,"line":222,"context":223},"preg_replace(\u002Fe)","includes\\atec-parse-debug.php",33,"preg_replace('\u002Fe",{"prepared":29,"raw":29,"locations":225},[],{"escaped":227,"rawEcho":228,"locations":229},324,7,[230,234,236,238,241,243,246],{"file":231,"line":232,"context":233},"includes\\ATEC\\CHECK.php",73,"raw output",{"file":231,"line":235,"context":233},111,{"file":231,"line":237,"context":233},124,{"file":239,"line":240,"context":233},"includes\\ATEC\\CONFIG.php",227,{"file":239,"line":242,"context":233},228,{"file":244,"line":245,"context":233},"includes\\ATEC\\SVG.php",557,{"file":247,"line":248,"context":233},"includes\\ATEC\\TOOLS.php",1211,14,2,[],[],{"summary":254,"deductions":255},"The 'atec-debug' plugin v1.2.30 exhibits a mixed security posture. While it demonstrates good practices in areas like SQL query sanitization (100% prepared statements) and output escaping (98% properly escaped), significant concerns arise from its attack surface. A single AJAX handler lacks authentication checks, presenting a direct entry point for unauthorized actions. The presence of a dangerous function, preg_replace(\u002Fe), also raises flags regarding potential code injection if not handled with extreme care, although no specific taint flows were identified in this analysis.\n\nThe plugin's vulnerability history is a major red flag, with three known CVEs, including two high-severity ones. The recurring types of vulnerabilities, such as Absolute Path Traversal and Code Injection, suggest a pattern of insecure coding practices or a lack of thorough security review in past development. While there are no currently unpatched CVEs, the history of critical and high-severity issues, with the most recent one in late 2025, indicates a history of significant security weaknesses.\n\nIn conclusion, the plugin has some strengths in its implementation of secure coding principles for SQL and output. However, the unprotected AJAX endpoint, the potential for code injection via `preg_replace(\u002Fe)`, and its concerning vulnerability history collectively point to a higher risk profile. Organizations using this plugin should be aware of these weaknesses and prioritize ongoing security monitoring and potential mitigation strategies.",[256,259,261,264,266,268],{"reason":257,"points":258},"Unprotected AJAX handler",8,{"reason":260,"points":228},"Dangerous function: preg_replace(\u002Fe)",{"reason":262,"points":263},"History of 2 High Severity CVEs",15,{"reason":265,"points":106},"History of 1 Medium Severity CVE",{"reason":267,"points":228},"Common vulnerability type: Code Injection history",{"reason":269,"points":106},"Common vulnerability type: Absolute Path Traversal history","2026-03-16T21:45:56.771Z",{"wat":272,"direct":281},{"assetPaths":273,"generatorPatterns":276,"scriptPaths":277,"versionParams":278},[274,275],"\u002Fwp-content\u002Fplugins\u002Fatec-debug\u002Fassets\u002Fcss\u002Fatec-debug-style.css","\u002Fwp-content\u002Fplugins\u002Fatec-debug\u002Fassets\u002Fjs\u002Fatec-debug-scripts.js",[],[275],[279,280],"atec-debug\u002Fassets\u002Fcss\u002Fatec-debug-style.css?ver=","atec-debug\u002Fassets\u002Fjs\u002Fatec-debug-scripts.js?ver=",{"cssClasses":282,"htmlComments":284,"htmlAttributes":285,"restEndpoints":287,"jsGlobals":288,"shortcodeOutput":290},[283],"atec-admin-bar-row",[],[286],"data-atec-slug",[],[289],"atec_wpd_ajax_cb",[]]