[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f3L1NWkTsz8foh72gfOHnjp2zpvS1CP-nz9mVIk_bMzk":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":15,"requires_at_least":15,"requires_php":15,"tags":16,"homepage":19,"download_link":20,"security_score":21,"vuln_count":22,"unpatched_count":22,"last_vuln_date":23,"fetched_at":24,"vulnerabilities":25,"developer":26,"crawl_stats":23,"alternatives":32,"analysis":33,"fingerprints":131},"cbearnings","Plugin: CBEARNING","1.0","prakash.m","https:\u002F\u002Fprofiles.wordpress.org\u002Fprakashm-1\u002F","\u003Cp>CBEARNING allows you to import the ENTIRE ClickBank Marketplace into your WordPress blog in seconds while\u003Cbr \u002F>\nother ClickBank plugins require you to manually enter ClickBank products one by one. want professional version check \u003Ca href=\"http:\u002F\u002Fmagento.ifyouknowit.com\" rel=\"nofollow ugc\">Go pro\u003C\u002Fa>\u003C\u002Fp>\n","CBEARNING allows you to import the ENTIRE ClickBank Marketplace into your WordPress blog in seconds while",10,1698,60,2,"",[17,18],"cbearning","clickbank-affiliate","http:\u002F\u002Fwww.ifyouknowit.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcbearnings.zip",100,0,null,"2026-03-15T10:48:56.248Z",[],{"slug":27,"display_name":7,"profile_url":8,"plugin_count":28,"total_installs":11,"avg_security_score":21,"avg_patch_time_days":29,"trust_score":30,"computed_at":31},"prakashm-1",1,30,94,"2026-04-05T02:45:41.458Z",[],{"attackSurface":34,"codeSignals":75,"taintFlows":115,"riskAssessment":116,"analyzedAt":130},{"hooks":35,"ajaxHandlers":59,"restRoutes":60,"shortcodes":61,"cronEvents":73,"entryPointCount":74,"unprotectedCount":22},[36,42,47,50,54],{"type":37,"name":38,"callback":39,"file":40,"line":41},"action","admin_menu","PluginMenu","cbearnings.php",52,{"type":43,"name":44,"callback":45,"file":40,"line":46},"filter","the_content","shortcode_tags",337,{"type":37,"name":38,"callback":48,"file":40,"line":49},"plugin_admin_add_page_cb",341,{"type":37,"name":51,"callback":52,"file":40,"line":53},"admin_init","plugin_admin_initcb",383,{"type":37,"name":55,"callback":56,"file":57,"line":58},"widgets_init","ok_register_widgets_cb","cbewidget.php",75,[],[],[62,66,70],{"tag":63,"callback":64,"file":40,"line":65},"CB_EARNINGS","cbearnings_short",338,{"tag":67,"callback":68,"file":40,"line":69},"php","shortcodephp",509,{"tag":71,"callback":68,"file":40,"line":72},"PHP",510,[],3,{"dangerousFunctions":76,"sqlUsage":77,"outputEscaping":86,"fileOperations":74,"externalRequests":22,"nonceChecks":22,"capabilityChecks":22,"bundledLibraries":114},[],{"prepared":78,"raw":14,"locations":79},5,[80,83],{"file":40,"line":81,"context":82},109,"$wpdb->get_col() with variable interpolation",{"file":40,"line":84,"context":85},282,"$wpdb->get_var() with variable interpolation",{"escaped":14,"rawEcho":87,"locations":88},13,[89,92,94,96,98,100,102,104,106,107,108,110,112],{"file":40,"line":90,"context":91},145,"raw output",{"file":40,"line":93,"context":91},320,{"file":40,"line":95,"context":91},326,{"file":40,"line":97,"context":91},411,{"file":40,"line":99,"context":91},422,{"file":40,"line":101,"context":91},432,{"file":57,"line":103,"context":91},28,{"file":57,"line":105,"context":91},29,{"file":57,"line":105,"context":91},{"file":57,"line":105,"context":91},{"file":57,"line":109,"context":91},50,{"file":57,"line":111,"context":91},56,{"file":57,"line":113,"context":91},64,[],[],{"summary":117,"deductions":118},"The \"cbearnings\" v1.0 plugin exhibits a mixed security posture. On the positive side, it has a relatively small attack surface with no AJAX handlers or REST API routes that appear to be unprotected. Furthermore, there are no recorded vulnerabilities in its history, suggesting a potentially stable and secure codebase. The majority of SQL queries are also prepared, which is a good practice for preventing SQL injection. However, several significant concerns arise from the static analysis.\n\nThe most pressing issue is the extremely low rate of proper output escaping, with only 13% of outputs being escaped. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, where user-supplied data could be injected into the page and executed by a victim's browser. The complete absence of nonce checks and capability checks for any potential entry points is also a major weakness, as it means any authenticated user, regardless of their role or permissions, could potentially trigger unintended actions or access sensitive data through the shortcodes. Taint analysis yielded no critical or high-severity flows, but this could be due to the limited scope of the analysis, especially given the lack of explicit security checks.\n\nWhile the plugin has no known CVEs, this could be attributed to its obscurity or simply the lack of thorough security audits in the past. The low escaping rate and lack of authorization checks are serious flaws that significantly elevate the risk profile, outweighing the absence of recorded vulnerabilities. The plugin needs immediate attention to address output escaping and implement robust authorization checks for all entry points.",[119,122,125,127],{"reason":120,"points":121},"Low output escaping rate (13%)",15,{"reason":123,"points":124},"No nonce checks",8,{"reason":126,"points":124},"No capability checks",{"reason":128,"points":129},"SQL queries not always prepared (29% not prepared)",7,"2026-03-16T23:19:45.544Z",{"wat":132,"direct":137},{"assetPaths":133,"generatorPatterns":134,"scriptPaths":135,"versionParams":136},[],[],[],[],{"cssClasses":138,"htmlComments":140,"htmlAttributes":141,"restEndpoints":142,"jsGlobals":143,"shortcodeOutput":144},[139],"wrap_cbearnings",[],[],[],[],[145,146,147],"[CB_EARNINGS]","[CB_EARNINGS]Search","[CB_EARNINGS]ClickBank Affiliate ID"]