[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fTnEeUIinZb9ZuZRCLPSqsDONsYovBuVGtj0PoJowKGA":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":14,"requires_at_least":14,"requires_php":14,"tags":15,"homepage":16,"download_link":17,"security_score":18,"vuln_count":13,"unpatched_count":13,"last_vuln_date":19,"fetched_at":20,"vulnerabilities":21,"developer":22,"crawl_stats":19,"alternatives":29,"analysis":30,"fingerprints":137},"be-main-category","BE – Main Category Selector","2.1.1","mortay","https:\u002F\u002Fprofiles.wordpress.org\u002Fmortay\u002F","\u003Cp>Main Category Selector for WordPress 2.5+.\u003C\u002Fp>\n","Main Category Selector for WordPress 2.5+.",10,2074,0,"",[],"http:\u002F\u002Fblogestudio.com\u002Fplugins\u002Fbe-main-category","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbe-main-category.zip",100,null,"2026-03-15T10:48:56.248Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":23,"total_installs":24,"avg_security_score":25,"avg_patch_time_days":26,"trust_score":27,"computed_at":28},4,140,89,30,86,"2026-04-04T16:27:18.167Z",[],{"attackSurface":31,"codeSignals":70,"taintFlows":92,"riskAssessment":120,"analyzedAt":136},{"hooks":32,"ajaxHandlers":66,"restRoutes":67,"shortcodes":68,"cronEvents":69,"entryPointCount":13,"unprotectedCount":13},[33,39,43,46,50,54,59,63],{"type":34,"name":35,"callback":36,"file":37,"line":38},"action","activate_be-main-category\u002Fbe-main-category.php","add_maincategory_in_table_posts","be-main-category.php",16,{"type":34,"name":40,"callback":41,"file":37,"line":42},"save_post","mcsbe_save_maincategory",33,{"type":34,"name":44,"callback":41,"file":37,"line":45},"edit_post",34,{"type":34,"name":47,"callback":48,"file":37,"line":49},"admin_menu","mcsbe_add_options_box",63,{"type":34,"name":51,"callback":52,"file":37,"line":53},"dbx_post_advanced","mcsbe_add_options_box_dbx",69,{"type":55,"name":56,"callback":57,"file":37,"line":58},"filter","admin_footer","mcsbe_jscode",115,{"type":55,"name":60,"callback":61,"file":37,"line":62},"the_permalink","mcsbe_maincategory_by_categories",205,{"type":55,"name":64,"callback":61,"file":37,"line":65},"post_link",206,[],[],[],[],{"dangerousFunctions":71,"sqlUsage":72,"outputEscaping":81,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":91},[],{"prepared":13,"raw":73,"locations":74},2,[75,78],{"file":37,"line":76,"context":77},51,"$wpdb->query() with variable interpolation",{"file":37,"line":79,"context":80},93,"$wpdb->get_results() with variable interpolation",{"escaped":13,"rawEcho":82,"locations":83},3,[84,87,89],{"file":37,"line":85,"context":86},76,"raw output",{"file":37,"line":88,"context":86},104,{"file":37,"line":90,"context":86},106,[],[93,112],{"entryPoint":94,"graph":95,"unsanitizedCount":110,"severity":111},"mcsbe_save_maincategory (be-main-category.php:36)",{"nodes":96,"edges":107},[97,102],{"id":98,"type":99,"label":100,"file":37,"line":101},"n0","source","$_POST",42,{"id":103,"type":104,"label":105,"file":37,"line":76,"wp_function":106},"n1","sink","query() [SQLi]","query",[108],{"from":98,"to":103,"sanitized":109},false,1,"high",{"entryPoint":113,"graph":114,"unsanitizedCount":110,"severity":111},"\u003Cbe-main-category> (be-main-category.php:0)",{"nodes":115,"edges":118},[116,117],{"id":98,"type":99,"label":100,"file":37,"line":101},{"id":103,"type":104,"label":105,"file":37,"line":76,"wp_function":106},[119],{"from":98,"to":103,"sanitized":109},{"summary":121,"deductions":122},"The \"be-main-category\" v2.1.1 plugin exhibits significant security concerns despite a seemingly clean vulnerability history. The static analysis reveals a lack of critical security best practices. Notably, 100% of SQL queries are not using prepared statements, and there is a complete absence of output escaping. This means that any data inserted into or retrieved from the database could be vulnerable to SQL injection attacks, and user-supplied data displayed on the frontend is susceptible to cross-site scripting (XSS) attacks.\n\nThe taint analysis further highlights these risks, identifying two flows with unsanitized paths, both classified as high severity. This indicates potential pathways where untrusted data could be processed without proper sanitization, leading to exploitable vulnerabilities. The absence of nonce checks, capability checks, and authentication checks on all identified entry points (even though there are zero in this case) also points to a general disregard for common WordPress security measures. While there are no known CVEs for this plugin, the internal code quality issues present a substantial risk that could easily lead to exploitable vulnerabilities.\n\nIn conclusion, while the plugin doesn't have a known history of public vulnerabilities, the static analysis strongly suggests a weak security posture. The lack of prepared statements for SQL queries and proper output escaping, combined with high-severity taint flows, are critical red flags. Users of this plugin should be aware of the inherent risks due to these coding practices, as they create a fertile ground for security vulnerabilities.",[123,125,128,131,134],{"reason":124,"points":11},"SQL queries not using prepared statements",{"reason":126,"points":127},"Output escaping is not used",15,{"reason":129,"points":130},"High severity taint flows found",12,{"reason":132,"points":133},"No nonce checks",5,{"reason":135,"points":133},"No capability checks","2026-03-16T23:21:48.985Z",{"wat":138,"direct":143},{"assetPaths":139,"generatorPatterns":140,"scriptPaths":141,"versionParams":142},[],[],[],[],{"cssClasses":144,"htmlComments":148,"htmlAttributes":156,"restEndpoints":164,"jsGlobals":165,"shortcodeOutput":167},[145,146,147],"dbx-box","dbx-handle","dbx-content",[149,150,151,152,153,154,155],"\u003C!-- WP 2.3 -->","\u003C!-- WP 2.5 -->","\u003C!-- Category Selector -->","\u003C!-- Load JS Code for Selector in Admin Pages -->","\u003C!-- Make sure it really is a category checkbox -->","\u003C!-- up to WordPress 2.0.5 -->","\u003C!-- WordPress 2.1+ -->",[157,158,159,160,157,161,162,163],"id=\"maincategorydiv\"","class=\"dbx-box\"","class=\"dbx-handle\"","class=\"dbx-content\"","name=\"post_maincategory\"","id=\"post_maincategory\"","class=\"postform\"",[],[166],"mcsbe_selectedcategory",[]]