[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f15u75yKBGUcC4Vnwry83rPQWFeECm-6v-sAyS5z9dBU":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":22,"download_link":23,"security_score":24,"vuln_count":25,"unpatched_count":25,"last_vuln_date":26,"fetched_at":27,"vulnerabilities":28,"developer":29,"crawl_stats":26,"alternatives":36,"analysis":37,"fingerprints":91},"buttons-to-edit-next-previous-post","Buttons to Edit Next\u002FPrevious Post","1.2","Aftab Ali Muni","https:\u002F\u002Fprofiles.wordpress.org\u002Faftabmuni\u002F","\u003Cp>This plugin will add easy shortcut buttons to edit next and previous post in admin edit-post page. You can directly navigate to next and previous post.\u003C\u002Fp>\n","This plugin will add easy shortcut buttons to edit next and previous post in admin edit-post page. You can directly navigate to next and previous post &hellip;",1000,11244,82,11,"2023-11-26T07:23:00.000Z","6.4.8","3.2","5.0",[20,21],"edit-next-previous-post-button-in-admin","edit-post-page-add-new-button","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbuttons-to-edit-next-previous-post.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":30,"display_name":7,"profile_url":8,"plugin_count":31,"total_installs":32,"avg_security_score":33,"avg_patch_time_days":34,"trust_score":13,"computed_at":35},"aftabmuni",9,33580,83,30,"2026-04-04T03:56:19.967Z",[],{"attackSurface":38,"codeSignals":56,"taintFlows":79,"riskAssessment":80,"analyzedAt":90},{"hooks":39,"ajaxHandlers":52,"restRoutes":53,"shortcodes":54,"cronEvents":55,"entryPointCount":25,"unprotectedCount":25},[40,47],{"type":41,"name":42,"callback":43,"priority":44,"file":45,"line":46},"filter","plugin_row_meta","amm_edit_next_prev_post_button_plugin_row_meta",10,"edit-next-previous-post-admin.php",34,{"type":48,"name":49,"callback":50,"file":45,"line":51},"action","admin_print_footer_scripts","amm_edit_next_prev_post_button",42,[],[],[],[],{"dangerousFunctions":57,"sqlUsage":58,"outputEscaping":60,"fileOperations":25,"externalRequests":25,"nonceChecks":25,"capabilityChecks":25,"bundledLibraries":78},[],{"prepared":25,"raw":25,"locations":59},[],{"escaped":25,"rawEcho":61,"locations":62},8,[63,66,67,69,71,73,74,76],{"file":45,"line":64,"context":65},64,"raw output",{"file":45,"line":64,"context":65},{"file":45,"line":68,"context":65},66,{"file":45,"line":70,"context":65},68,{"file":45,"line":72,"context":65},72,{"file":45,"line":72,"context":65},{"file":45,"line":75,"context":65},74,{"file":45,"line":77,"context":65},76,[],[],{"summary":81,"deductions":82},"The static analysis of \"buttons-to-edit-next-previous-post\" v1.2 reveals a plugin with a very limited attack surface, as indicated by zero entry points detected. The code also demonstrates good practice in its handling of SQL queries, exclusively using prepared statements, and reports no external HTTP requests or file operations. This suggests a focus on secure data handling and a minimal external footprint.\n\nHowever, a significant concern arises from the complete lack of output escaping. With 8 total outputs and 0% properly escaped, any data rendered by this plugin is potentially vulnerable to cross-site scripting (XSS) attacks. This is a critical oversight that could be exploited by an attacker to inject malicious scripts into a user's browser. The absence of nonce checks and capability checks further exacerbates this risk, as there are no mechanisms in place to verify user authorization or prevent unauthorized script execution.\n\nThe plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the absence of dangerous functions and critical taint flows, points to a generally well-written codebase in certain aspects. Nevertheless, the unescaped output represents a substantial and direct security risk that overshadows the lack of known vulnerabilities and limited attack surface. The plugin's strengths lie in its SQL security and minimal attack surface, but its weakness in output sanitization is a major concern.",[83,85,88],{"reason":84,"points":61},"Output escaping missing for all outputs",{"reason":86,"points":87},"No nonce checks detected",5,{"reason":89,"points":87},"No capability checks detected","2026-03-16T19:03:44.875Z",{"wat":92,"direct":97},{"assetPaths":93,"generatorPatterns":94,"scriptPaths":95,"versionParams":96},[],[],[],[],{"cssClasses":98,"htmlComments":101,"htmlAttributes":103,"restEndpoints":104,"jsGlobals":105,"shortcodeOutput":107},[99,100],"prev-post","next-post",[102],"\u003C!--\u003Cstyle>body{background-color:red !important}\u003C\u002Fstyle>-->",[],[],[106],"window.jQuery",[]]