[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f_gVCqXyLZDTbgw8mk8UBOwOf8J0DRYOkwz6O-yf3Myg":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":11,"num_ratings":11,"last_updated":13,"tested_up_to":14,"requires_at_least":15,"requires_php":16,"tags":17,"homepage":13,"download_link":20,"security_score":21,"vuln_count":11,"unpatched_count":11,"last_vuln_date":22,"fetched_at":23,"vulnerabilities":24,"developer":25,"crawl_stats":22,"alternatives":30,"analysis":31,"fingerprints":88},"bvd-wcpdf-user-template","WCPDF User Template","1.0.0","basvandijkk","https:\u002F\u002Fprofiles.wordpress.org\u002Fbasvandijkk\u002F","\u003Cp>With this plugin you can change what PDF template will be used for a certain user. “WooCommerce PDF Invoices & Packing Slips” is the plugin which my function hooks into.\u003Cbr \u002F>\nYou still need to add the template(s) to your child theme. Instead of having one template selected, you can have multiple.\u003C\u002Fp>\n\u003Cp>If anyone has requests about having more conditional logic. For example user groups instead of just users. I could integrate this plugin with the “Groups” plugin.\u003C\u002Fp>\n","With this plugin you can change what PDF template will be used for a certain user. \"WooCommerce PDF Invoices & Packing Slips\" is the plu &hellip;",0,876,"","5.4.19","5.2","7.0",[18,19],"user-based-template","woocommerce-pdf-invoices-packing-slips","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbvd-wcpdf-user-template.zip",100,null,"2026-03-15T10:48:56.248Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":26,"total_installs":11,"avg_security_score":21,"avg_patch_time_days":27,"trust_score":28,"computed_at":29},1,30,94,"2026-04-04T05:36:35.630Z",[],{"attackSurface":32,"codeSignals":74,"taintFlows":81,"riskAssessment":82,"analyzedAt":87},{"hooks":33,"ajaxHandlers":70,"restRoutes":71,"shortcodes":72,"cronEvents":73,"entryPointCount":11,"unprotectedCount":11},[34,40,42,45,48,52,55,58,61,64,67],{"type":35,"name":36,"callback":37,"file":38,"line":39},"action","admin_enqueue_scripts","anonymous","includes\\Import.class.php",127,{"type":35,"name":36,"callback":37,"file":38,"line":41},128,{"type":35,"name":43,"callback":37,"file":38,"line":44},"admin_menu",130,{"type":35,"name":46,"callback":37,"file":38,"line":47},"admin_init",131,{"type":49,"name":50,"callback":37,"file":38,"line":51},"filter","pre_update_option",132,{"type":35,"name":53,"callback":37,"file":38,"line":54},"show_user_profile",134,{"type":35,"name":56,"callback":37,"file":38,"line":57},"edit_user_profile",135,{"type":35,"name":59,"callback":37,"file":38,"line":60},"personal_options_update",137,{"type":35,"name":62,"callback":37,"file":38,"line":63},"edit_user_profile_update",138,{"type":49,"name":65,"callback":37,"file":38,"line":66},"wpo_wcpdf_template_file",151,{"type":35,"name":68,"callback":37,"file":38,"line":69},"plugins_loaded",210,[],[],[],[],{"dangerousFunctions":75,"sqlUsage":76,"outputEscaping":78,"fileOperations":11,"externalRequests":11,"nonceChecks":11,"capabilityChecks":26,"bundledLibraries":80},[],{"prepared":11,"raw":11,"locations":77},[],{"escaped":11,"rawEcho":11,"locations":79},[],[],[],{"summary":83,"deductions":84},"Based on the provided static analysis and vulnerability history, the 'bvd-wcpdf-user-template' plugin version 1.0.0 exhibits a very strong security posture. The code analysis reveals no dangerous functions, no direct SQL queries (all are prepared), and all outputs are properly escaped. Furthermore, there are no identified file operations or external HTTP requests, and importantly, no unsanitized taint flows were detected.  The plugin also demonstrates good security practice by including a capability check, indicating an awareness of access control.\n\nThe plugin's attack surface is effectively zero, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed. This significantly limits the potential for unauthorized access or manipulation. The complete absence of any known vulnerabilities, past or present, further solidifies its strong security profile.  While the lack of nonces on AJAX handlers is noted, this is a minor concern given the absence of any AJAX handlers in the first place. The plugin's strengths lie in its clean code, minimal attack surface, and lack of historical security issues.\n\nOverall, 'bvd-wcpdf-user-template' v1.0.0 appears to be a highly secure plugin. The data suggests diligent development practices with a focus on preventing common web vulnerabilities.  The only slight area for improvement, which is currently non-applicable due to the lack of specific features, would be the implementation of nonces if AJAX functionality were to be introduced in the future. As it stands, this version is highly recommended from a security perspective.",[85],{"reason":86,"points":26},"No nonce checks on AJAX handlers","2026-03-17T05:48:30.692Z",{"wat":89,"direct":99},{"assetPaths":90,"generatorPatterns":93,"scriptPaths":94,"versionParams":96},[91,92],"\u002Fwp-content\u002Fplugins\u002Fbvd-wcpdf-user-template\u002Fcss\u002Fbvd-wcpdf-user-template-admin.css","\u002Fwp-content\u002Fplugins\u002Fbvd-wcpdf-user-template\u002Fjs\u002Fbvd-wcpdf-user-template-admin.js",[],[95],"admin\u002Fjs\u002Fbvd-wcpdf-user-template-admin.js",[97,98],"bvd-wcpdf-user-template\u002Fcss\u002Fbvd-wcpdf-user-template-admin.css?ver=","bvd-wcpdf-user-template\u002Fjs\u002Fbvd-wcpdf-user-template-admin.js?ver=",{"cssClasses":100,"htmlComments":101,"htmlAttributes":102,"restEndpoints":104,"jsGlobals":105,"shortcodeOutput":106},[],[],[103],"data-wcpdf-template-choice",[],[],[107],"bvd-wcpdf-user-template-user-pdf-select"]