[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fyws-e0zOcfUBMeP4qZNCPqIwKBZpY7VS4hXI7ZiFSok":3,"$f2Mfd2hJvmjjbx-0XBuXNCbgJLdsC_N2BrFWVPiXc7Os":424,"$fMI8FM1HLARgUM_8d4Jfm69OQdgf9MfmBdgVzWdNbIaQ":428},{"slug":4,"name":5,"version":6,"author":4,"author_profile":7,"description":8,"short_description":9,"active_installs":10,"downloaded":11,"rating":12,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":21,"download_link":22,"security_score":23,"vuln_count":24,"unpatched_count":25,"last_vuln_date":26,"fetched_at":27,"discovery_status":28,"vulnerabilities":29,"developer":103,"crawl_stats":35,"alternatives":108,"analysis":203,"fingerprints":392},"cliengo","Cliengo – Chatbot","3.0.5","https:\u002F\u002Fprofiles.wordpress.org\u002Fcliengo\u002F","\u003Cp>Through proactive conversations, Cliengo’s \u003Ca href=\"https:\u002F\u002Fwww.cliengo.com\u002F?utm_source=wordpress&utm_medium=plugin\" rel=\"nofollow ugc\">chatbot\u003C\u002Fa> and WhatsApp assist your company’s commercial team by capturing the contact information of each website visitor: name, telephone number, email and query.\u003C\u002Fp>\n\u003Cp>In this way, you can respond immediately to all the potential clients who visit your website, automating the conversation or intervening the best leads.\u003C\u002Fp>\n\u003Cp>Cliengo helps you to reach better sales opportunities  and offers the visists a great experience in their first contact.\u003Cbr \u002F>\nAlso, allows you to obtain a qualified lead for subsequent follow-up commercial actions.\u003C\u002Fp>\n\u003Cp>Cliengo adapts to your company’s processes and integrates with 80% of the CRMs on the market, in order to help you to have all the information of your leads centralized in one place.\u003C\u002Fp>\n\u003Cp>Cliengo is connected with more than 1,300 applications, such as Google Ads and Facebook Ads, Google Analytics, and lot of email marketing automation platforms.\u003Cbr \u002F>\n    * Google Ads \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> to maximize your conversions and optimize yours campaigns audiences.\u003Cbr \u002F>\n    * Google Analytics \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> for a complete analysis of everything that happens on your website.\u003Cbr \u002F>\n    * e-mail Marketing Automation tools \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> to improve your email marketing performance with qualified audiences.\u003C\u002Fp>\n\u003Cp>Do you want to learn how to integrate WordPress with Cliengo? Read \u003Ca href=\"https:\u002F\u002Fhelp.cliengo.com\u002Fhc\u002Fes\u002Farticles\u002F115002918668-Instalaci%C3%B3n-en-Wordpress\" rel=\"nofollow ugc\">this article\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Do you want to get in contact with Cliengo? Write to \u003Ca href=\"mailto:hola@cliengo.com\" rel=\"nofollow ugc\">hola@cliengo.com\u003C\u002Fa>\u003C\u002Fp>\n","Cliengo helps you scale your business by automating customer contact points and providing 24\u002F7 responses.",2000,54441,80,3,"2026-03-17T18:43:00.000Z","6.8.5","4.4","5.2.4",[19,4,20],"chatbot","leads","http:\u002F\u002Fcliengo.com\u002F?utm_source=wordpress_plugin&utm_medium=wordpress","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.3.0.5.zip",95,4,0,"2026-02-09 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[30,62,76,91],{"id":31,"url_slug":32,"title":33,"description":34,"plugin_slug":4,"theme_slug":35,"affected_versions":36,"patched_in_version":6,"severity":37,"cvss_score":38,"cvss_vector":39,"vuln_type":40,"published_date":26,"updated_date":41,"references":42,"days_to_patch":44,"patch_diff_files":45,"patch_trac_url":35,"research_status":52,"research_verified":53,"research_rounds_completed":13,"research_plan":54,"research_summary":55,"research_vulnerable_code":56,"research_fix_diff":57,"research_exploit_outline":58,"research_model_used":59,"research_started_at":60,"research_completed_at":61,"research_error":35,"poc_status":35,"poc_video_id":35,"poc_summary":35,"poc_steps":35,"poc_tested_at":35,"poc_wp_version":35,"poc_php_version":35,"poc_playwright_script":35,"poc_exploit_code":35,"poc_has_trace":53,"poc_model_used":35,"poc_verification_depth":35},"CVE-2025-69388","cliengo-chatbot-missing-authorization","Cliengo – Chatbot \u003C= 3.0.4 - Missing Authorization","The Cliengo – Chatbot plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 3.0.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform an unauthorized action.",null,"\u003C=3.0.4","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Missing Authorization","2026-04-15 13:37:03",[43],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F570a9fc7-ad0d-4aa3-8c31-4d2f534cdbae?source=api-prod",66,[46,47,48,49,50,51],"README.txt","admin\u002Fclass-cliengo-form.php","admin\u002Fjs\u002Fcliengo-admin.js","admin\u002Fpartials\u002Fcliengo-admin-display.php","cliengo.php","includes\u002Fclass-cliengo.php","researched",false,"` (inside `Cliengo_Admin`) was:\n        ```php\n        add_menu_page('Cliengo', 'Cliengo', 'read', 'cliengo', array($this, 'display_page'));\n        ```\n        Then a Subscriber could see the page.\n        And the page `display_page` would include:\n        `include_once 'partials\u002Fcliengo-admin-display.php';`\n        Which would output:\n        ```php\n        \u003Cinput type=\"hidden\" id=\"update_chatbot_token_nonce\" ... value=\"\u003C?php echo wp_create_nonce('update_chatbot_token_action'); ?>\" \u002F>\n        ```\n        So a Subscriber *can* get the nonce.\n        But they still fail the `current_user_can('manage_options')` check in `update_chatbot_token`.\n\n        Wait! Does EVERY function have the `current_user_can` check?\n        `update_chatbot_token` - Yes.\n        `update_chatbot_position` - Yes.\n        `update_session` - Yes.\n        `wordpress_login` - **NO**.\n        `wp_registration` - **Likely NO** (since it's registered similarly to `wordpress_login` and missing from snippet).\n        `restore_session` - **NO**.\n\n        So `wordpress_login`, `wp_registration`, and `restore_session` are the missing ones.\n        `restore_session` is `C:","The Cliengo – Chatbot plugin for WordPress is vulnerable to unauthorized access and potential information disclosure due to missing capability checks on several AJAX handlers. This allows authenticated attackers, such as Subscribers, to perform actions like restoring sessions (leaking account tokens), attempting Cliengo account logins, and registering new accounts.","\u002F\u002F admin\u002Fclass-cliengo-form.php line 71\n  public function restore_session() {\n    $account = get_option( 'cliengo_session' );\n    $session = array(\n      'token' => stripslashes( get_option( 'cliengo_chatbot_token' ) ),\n      'account' => $account != null ? json_decode(stripslashes($account)) : '',\n      'position' => stripslashes( get_option( 'cliengo_chatbot_position' ) )\n    );\n\n    echo wp_json_encode($session);\n    wp_die();\n  }\n\n---\n\n\u002F\u002F admin\u002Fclass-cliengo-form.php line 154\n  public function wordpress_login()\n  {\n    if ( ! isset( $_POST['wordpress_login_nonce'] ) || ! wp_verify_nonce( $_POST['wordpress_login_nonce'], 'wordpress_login_action' ) ) {\n      wp_die('Security Error: Security check failed. Please reload the page and try again.');\n    }\n\n    $api_host = Cliengo_Form::PROD_ENV ? 'https:\u002F\u002Fapi.cliengo.com' : 'https:\u002F\u002Fapi.stagecliengo.com';\n    $body = array('username' => $_POST['username'], 'password' => $_POST['password']);\n    \u002F\u002F ... (rest of function)","diff -ru \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fcliengo\u002F3.0.4\u002Fadmin\u002Fclass-cliengo-form.php \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fcliengo\u002F3.0.5\u002Fadmin\u002Fclass-cliengo-form.php\n--- \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fcliengo\u002F3.0.4\u002Fadmin\u002Fclass-cliengo-form.php\t2024-07-15 19:44:10.000000000 +0000\n+++ \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fcliengo\u002F3.0.5\u002Fadmin\u002Fclass-cliengo-form.php\t2026-03-17 18:43:42.000000000 +0000\n@@ -74,6 +93,12 @@\n    * Fetches and returns all session variables\n    *\u002F\n   public function restore_session() {\n+    if ( ! current_user_can( 'manage_options' ) ) {\n+      wp_die( 'Error: You do not have sufficient permissions to perform this action.' );\n+    }\n+\n+    check_ajax_referer( 'restore_session_action', 'restore_session_nonce' );\n+\n     $account = get_option( 'cliengo_session' );\n     $session = array( \n@@ -153,9 +175,13 @@\n    *\u002F\n   public function wordpress_login()\n   {\n-    if ( ! isset( $_POST['wordpress_login_nonce'] ) || ! wp_verify_nonce( $_POST['wordpress_login_nonce'], 'wordpress_login_action' ) ) {\n-      wp_die('Security Error: Security check failed. Please reload the page and try again.');\n+    if ( ! current_user_can( 'manage_options' ) ) {\n+      wp_die( 'Error: You do not have sufficient permissions to perform this action. Please contact the site administrator.' );\n     }\n \n+    check_ajax_referer( 'wordpress_login_action', 'wordpress_login_nonce' );\n+\n+    $username = isset( $_POST['username'] ) ? sanitize_email( wp_unslash( $_POST['username'] ) ) : '';\n+    $password = isset( $_POST['password'] ) ? wp_unslash( $_POST['password'] ) : '';\n+\n     $api_host = Cliengo_Form::PROD_ENV ? 'https:\u002F\u002Fapi.cliengo.com' : 'https:\u002F\u002Fapi.stagecliengo.com';\n-    $body = array('username' => $_POST['username'], 'password' => $_POST['password']);\n+    $body = array( 'username' => $username, 'password' => $password );","The exploit methodology involves an authenticated attacker with low-level privileges (e.g., Subscriber) performing the following steps:\n\n1.  **Access the Admin Dashboard**: Login to the WordPress site as a Subscriber. \n2.  **Retrieve Nonces**: Visit the Cliengo configuration page (registered with the 'read' capability). Inspect the HTML source to find hidden input fields containing nonces for various actions, such as `wordpress_login_nonce`, `update_session_nonce`, and `wp_registration_nonce`.\n3.  **Execute Unauthorized AJAX Action**: Send a POST request to `\u002Fwp-admin\u002Fadmin-ajax.php`. \n    *   To leak the chatbot token and session data, use the `action=restore_session` parameter. Since version 3.0.4 lacked both capability and nonce checks for this specific action, the server will return the session JSON.\n    *   To attempt account operations, use actions like `wordpress_login` or `wp_registration` while providing the stolen nonces from Step 2. Even though these actions have nonce checks, they lack a `current_user_can('manage_options')` check, allowing the request to proceed if a valid nonce (which the plugin leaked to the Subscriber) is provided.","gemini-3-flash-preview","2026-04-21 03:06:20","2026-04-21 03:07:06",{"id":63,"url_slug":64,"title":65,"description":66,"plugin_slug":4,"theme_slug":35,"affected_versions":36,"patched_in_version":6,"severity":37,"cvss_score":67,"cvss_vector":68,"vuln_type":69,"published_date":70,"updated_date":71,"references":72,"days_to_patch":74,"patch_diff_files":75,"patch_trac_url":35,"research_status":35,"research_verified":53,"research_rounds_completed":25,"research_plan":35,"research_summary":35,"research_vulnerable_code":35,"research_fix_diff":35,"research_exploit_outline":35,"research_model_used":35,"research_started_at":35,"research_completed_at":35,"research_error":35,"poc_status":35,"poc_video_id":35,"poc_summary":35,"poc_steps":35,"poc_tested_at":35,"poc_wp_version":35,"poc_php_version":35,"poc_playwright_script":35,"poc_exploit_code":35,"poc_has_trace":53,"poc_model_used":35,"poc_verification_depth":35},"CVE-2024-37923","cliengo-chatbot-cross-site-request-forgery","Cliengo – Chatbot \u003C= 3.0.4 - Cross-Site Request Forgery","The Cliengo – Chatbot plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.4. This is due to missing or incorrect nonce validation on an unknown function. This makes it possible for unauthenticated attackers to perform an unknown action granted they can trick a site administrator into performing an action such as clicking on a link.",5.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:N\u002FI:L\u002FA:L","Cross-Site Request Forgery (CSRF)","2024-07-09 00:00:00","2026-04-15 13:27:20",[73],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F1de6c0d9-efa8-4c86-9d57-7aa92a0eda96?source=api-prod",646,[],{"id":77,"url_slug":78,"title":79,"description":80,"plugin_slug":4,"theme_slug":35,"affected_versions":81,"patched_in_version":82,"severity":37,"cvss_score":83,"cvss_vector":84,"vuln_type":40,"published_date":85,"updated_date":86,"references":87,"days_to_patch":89,"patch_diff_files":90,"patch_trac_url":35,"research_status":35,"research_verified":53,"research_rounds_completed":25,"research_plan":35,"research_summary":35,"research_vulnerable_code":35,"research_fix_diff":35,"research_exploit_outline":35,"research_model_used":35,"research_started_at":35,"research_completed_at":35,"research_error":35,"poc_status":35,"poc_video_id":35,"poc_summary":35,"poc_steps":35,"poc_tested_at":35,"poc_wp_version":35,"poc_php_version":35,"poc_playwright_script":35,"poc_exploit_code":35,"poc_has_trace":53,"poc_model_used":35,"poc_verification_depth":35},"CVE-2024-5992","cliengo-chatbot-missing-authorization-to-unauthenticated-chatbot-settings-update","Cliengo - Chatbot \u003C= 3.0.2 - Missing Authorization to Unauthenticated Chatbot Settings Update","The Cliengo – Chatbot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_chatbot_token' and 'update_chatbot_position' functions in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to change chatbot settings, which can lead to unavailability or other changes to the chatbot.","\u003C=3.0.2","3.0.3",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:L","2024-07-08 19:56:10","2024-08-01 20:17:48",[88],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa7f0afe8-234a-4c3f-87c8-f3f23ac94fe3?source=api-prod",24,[],{"id":92,"url_slug":93,"title":94,"description":95,"plugin_slug":4,"theme_slug":35,"affected_versions":81,"patched_in_version":82,"severity":37,"cvss_score":67,"cvss_vector":96,"vuln_type":40,"published_date":97,"updated_date":98,"references":99,"days_to_patch":101,"patch_diff_files":102,"patch_trac_url":35,"research_status":35,"research_verified":53,"research_rounds_completed":25,"research_plan":35,"research_summary":35,"research_vulnerable_code":35,"research_fix_diff":35,"research_exploit_outline":35,"research_model_used":35,"research_started_at":35,"research_completed_at":35,"research_error":35,"poc_status":35,"poc_video_id":35,"poc_summary":35,"poc_steps":35,"poc_tested_at":35,"poc_wp_version":35,"poc_php_version":35,"poc_playwright_script":35,"poc_exploit_code":35,"poc_has_trace":53,"poc_model_used":35,"poc_verification_depth":35},"CVE-2024-5993","cliengo-chatbot-missing-authorization-to-authorized-subscriber-chatbot-settings-update","Cliengo - Chatbot \u003C= 3.0.2 - Missing Authorization to Authorized (Subscriber+) Chatbot Settings Update","The Cliengo – Chatbot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_session' function in all versions up to, and including, 3.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the session token of the chatbot.","CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:L","2024-07-08 00:00:00","2024-08-01 20:18:06",[100],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0a13e87d-51cd-43b0-a658-900a174738fc?source=api-prod",25,[],{"slug":4,"display_name":4,"profile_url":7,"plugin_count":104,"total_installs":10,"avg_security_score":23,"avg_patch_time_days":105,"trust_score":106,"computed_at":107},1,190,76,"2026-05-20T02:20:22.199Z",[109,130,151,168,186],{"slug":110,"name":111,"version":112,"author":113,"author_profile":114,"description":115,"short_description":116,"active_installs":117,"downloaded":118,"rating":25,"num_ratings":25,"last_updated":119,"tested_up_to":120,"requires_at_least":121,"requires_php":122,"tags":123,"homepage":127,"download_link":128,"security_score":129,"vuln_count":25,"unpatched_count":25,"last_vuln_date":35,"fetched_at":27},"a11y-enhancer","SiteBirds | AI Chat, Lead Capture, Bookings & Accessibility","4.3.5","Sitebirds","https:\u002F\u002Fprofiles.wordpress.org\u002Faacers\u002F","\u003Cp>SiteBirds for WordPress is built for businesses that want to keep their current website and make it work harder.\u003C\u002Fp>\n\u003Cp>Learn more about the platform at \u003Ca href=\"https:\u002F\u002Fsitebirds.com\" rel=\"nofollow ugc\">sitebirds.com\u003C\u002Fa>, start from the \u003Ca href=\"https:\u002F\u002Fsitebirds.com\u002Fwizard\" rel=\"nofollow ugc\">SiteBirds setup wizard\u003C\u002Fa>, or view plans on \u003Ca href=\"https:\u002F\u002Fsitebirds.com\u002Fproducts\u002Fen\" rel=\"nofollow ugc\">sitebirds.com\u002Fproducts\u002Fen\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>The plugin gives you a clear starting point inside WordPress:\u003Cbr \u002F>\n– scan your site\u003Cbr \u002F>\n– review accessibility and site-fix opportunities\u003Cbr \u002F>\n– keep useful built-in accessibility improvements active\u003Cbr \u002F>\n– open the SiteBirds setup wizard with your WordPress site already filled in\u003Cbr \u002F>\n– connect your SiteBirds dashboard with a connect code\u003C\u002Fp>\n\u003Cp>This plugin does \u003Cstrong>not\u003C\u002Fstrong> inject the SiteBirds widget by default. It is designed as a scan-first and connect-first admin experience.\u003C\u002Fp>\n\u003Ch4>What you get in WordPress\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>A SiteBirds overview page with a clear scan flow\u003C\u002Fli>\n\u003Cli>A setup wizard launch page with WordPress-prefilled site data\u003C\u002Fli>\n\u003Cli>A SiteBirds dashboard launch page for connected sites\u003C\u002Fli>\n\u003Cli>Local accessibility and site-fix improvements\u003C\u002Fli>\n\u003Cli>A plugin opportunity scan that shows what SiteBirds may replace or simplify\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>WordPress data used to prefill the wizard\u003C\u002Fh4>\n\u003Cp>The setup wizard can use information already available in WordPress, such as:\u003Cbr \u002F>\n– website URL\u003Cbr \u002F>\n– site name\u003Cbr \u002F>\n– admin email\u003Cbr \u002F>\n– language and timezone\u003Cbr \u002F>\n– active theme\u003Cbr \u002F>\n– number of active plugins\u003Cbr \u002F>\n– published pages and posts\u003C\u002Fp>\n\u003Ch4>What stays in WordPress\u003C\u002Fh4>\n\u003Cp>The local fixes remain available in the plugin:\u003Cbr \u002F>\n– image alt text improvements\u003Cbr \u002F>\n– heading hierarchy improvements\u003Cbr \u002F>\n– link accessibility improvements\u003Cbr \u002F>\n– form label improvements\u003Cbr \u002F>\n– table semantics improvements\u003Cbr \u002F>\n– ARIA landmark improvements\u003Cbr \u002F>\n– language attribute improvements\u003Cbr \u002F>\n– focus and skip-link improvements\u003Cbr \u002F>\n– optional contrast help\u003C\u002Fp>\n\u003Ch4>Connect flow\u003C\u002Fh4>\n\u003Col>\n\u003Cli>Start with the scan in WordPress.\u003C\u002Fli>\n\u003Cli>Open the SiteBirds wizard.\u003C\u002Fli>\n\u003Cli>Create your SiteBirds setup.\u003C\u002Fli>\n\u003Cli>Copy your connect code.\u003C\u002Fli>\n\u003Cli>Paste the code back into WordPress.\u003C\u002Fli>\n\u003Cli>Open your SiteBirds dashboard.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>External service\u003C\u002Fh4>\n\u003Cp>This plugin can connect to SiteBirds, a hosted service at sitebirds.com.\u003C\u002Fp>\n\u003Cp>When you choose to connect, the plugin sends connection and site information to SiteBirds so your dashboard can be created and linked to this WordPress install.\u003C\u002Fp>\n\u003Cp>The plugin can also open the public SiteBirds wizard with WordPress-prefilled query parameters.\u003C\u002Fp>\n","Turn your existing WordPress site into a lead and booking machine with AI chat, lead capture, bookings, built-in accessibility improvements, smart sca &hellip;",20,1577,"2026-03-25T18:12:00.000Z","6.9.4","5.8","7.4",[124,125,19,20,126],"accessibility","ai","schema","https:\u002F\u002Fsitebirds.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fa11y-enhancer.4.3.5.zip",100,{"slug":131,"name":132,"version":133,"author":134,"author_profile":135,"description":136,"short_description":137,"active_installs":138,"downloaded":139,"rating":12,"num_ratings":24,"last_updated":140,"tested_up_to":141,"requires_at_least":142,"requires_php":143,"tags":144,"homepage":148,"download_link":149,"security_score":150,"vuln_count":25,"unpatched_count":25,"last_vuln_date":35,"fetched_at":27},"anytimereply","AnyTimeReply – Sales chatbot","2.1","Spiker","https:\u002F\u002Fprofiles.wordpress.org\u002Fspikersolns\u002F","\u003Cp>AnyTimeReply is the automated sales chatbot available to customers round the clock. Its services include Facebook messanger chatbot, collecting leads, managing queries of your customers, answering them, saving the unsolved queries so that you can view and answer them later, auto emailing back to the customers once the answers are available.\u003Cbr \u002F>\nImagine that you are running a business and you can’t afford a support-staff to handle client queries, but it needs to be done in order to expand your business as you know that they are your potential customers. Small and medium sized business including startups and individual professional may not be able to afford support system or support staff. Client may need to ask about your office, services and other information about your business round the clock. You may lose you productive hours in giving client support yourself because you do not have a support person and you keep on sending the same information to different clients. One thing that we found in our research is that around 70% queries from clients are repeated, which of course hampers your productive hours very badly. Also, giving same information to clients is waste of time for business. So, after a few years of research, we have come up with AnyTimeReply support system, which is affordable to small to medium sized business and also individual professionals. We at AnyTimeReply believe that customer satisfaction is critical to win customers loyalty, and loyalty is one of driving factors to increase company revenues.\u003C\u002Fp>\n\u003Cp>Key features:\u003Cbr \u002F>\n   * Free and easy to use\u003Cbr \u002F>\n   * Collect leads\u003Cbr \u002F>\n   * Easy and Free FaceBook chatbot\u003Cbr \u002F>\n   * Round the clock support for your client\u003Cbr \u002F>\n   * Immediate response, no long support chat queue for visitors\u003Cbr \u002F>\n   * Reduces human resources and get more satisfied clients\u003Cbr \u002F>\n   * You can train your assistant yourself\u003Cbr \u002F>\n   * You can check chat log, correct their mistakes and even can continue chat\u003Cbr \u002F>\n   * You can get unsolved queries in your ATR system\u003Cbr \u002F>\n   * Know your clients exact requirements\u003C\u002Fp>\n","AnyTimeReply is the automated sales chatbot available to customers round the clock. It collect leads in interactive way and manage customer queries.",10,2273,"2017-07-21T07:23:00.000Z","4.8.28","2.5.1","",[19,145,20,146,147],"facebook","support-bot","virtual-assistant","http:\u002F\u002Fanytimereply.com\u002Fwordpress","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fanytimereply.zip",85,{"slug":152,"name":153,"version":154,"author":155,"author_profile":156,"description":157,"short_description":158,"active_installs":138,"downloaded":159,"rating":25,"num_ratings":25,"last_updated":160,"tested_up_to":141,"requires_at_least":161,"requires_php":162,"tags":163,"homepage":143,"download_link":167,"security_score":150,"vuln_count":25,"unpatched_count":25,"last_vuln_date":35,"fetched_at":27},"chat-in","Chat-In Inc","1.0.0","cteamcom","https:\u002F\u002Fprofiles.wordpress.org\u002Fcteamcom\u002F","\u003Cp>Chat-In es una solucion integral al momento de obtener contactos de tu página. Integra todo lo necesario para convertir tus clientes en ventas aseguradas, desde un chatbot 24\u002F7 hasta un formulario de contacto. Toda la informacion de tus clientes se pueden ver desde un panel de control que integra toda la informacion necesaria.\u003C\u002Fp>\n\u003Cp>Nuestro servicio está basado en www.chat-in.net, desde ahi podras registrarte gratuitamente, obtener una cuenta demo y comenzar a probar tanto el chatbot como el diseño de formularios.\u003C\u002Fp>\n","Chat-In es una solucion integral al momento de obtener contactos de tu página.",1501,"2018-11-02T16:10:00.000Z","3.3","5.6",[164,165,19,166,20],"assitant","bot","contact-form","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fchat-in.zip",{"slug":169,"name":170,"version":154,"author":171,"author_profile":172,"description":173,"short_description":174,"active_installs":25,"downloaded":175,"rating":25,"num_ratings":25,"last_updated":176,"tested_up_to":177,"requires_at_least":178,"requires_php":179,"tags":180,"homepage":184,"download_link":185,"security_score":150,"vuln_count":25,"unpatched_count":25,"last_vuln_date":35,"fetched_at":27},"cometleads-contact","CometLeads Contact","jasonleakey","https:\u002F\u002Fprofiles.wordpress.org\u002Fjasonleakey\u002F","\u003Ch3>CometLeads Contact – Conversational Lead Generation\u003C\u002Fh3>\n\u003Cp>Get low conversions with your site?\u003Cbr \u002F>\nHave no idea of anything of your leads? ComletLeads feels your pain. CometLeads Contact is a product to rebuild your confidence of winning hearts of your leads.\u003C\u002Fp>\n\u003Cp>CometLeads Contact for WordPress is a plugin to enpower your wordpress with our powerful conversational lead gen bot.\u003C\u002Fp>\n\u003Cp>WHAT WE CAN HELP YOU\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Generate more leads from your wordpress site\u003C\u002Fli>\n\u003Cli>Get in-depth insights of your leads, and grow your audiences\u003C\u002Fli>\n\u003Cli>Build your reputation \u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>FEATURES\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Collect lead information\u003C\u002Fli>\n\u003Cli>Talk in natural human way\u003C\u002Fli>\n\u003C\u002Ful>\n","Replace your static contact form with a conversational chatbot and you’ll see more leads coming your way.",1199,"2018-08-16T15:10:00.000Z","4.9.29","4.8","5.3",[19,181,182,183,20],"cometleads","customer","lead-generation","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fcometleads-contact","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcometleads-contact.1.0.0.zip",{"slug":187,"name":188,"version":189,"author":190,"author_profile":191,"description":192,"short_description":193,"active_installs":25,"downloaded":194,"rating":25,"num_ratings":25,"last_updated":195,"tested_up_to":15,"requires_at_least":196,"requires_php":143,"tags":197,"homepage":143,"download_link":202,"security_score":129,"vuln_count":25,"unpatched_count":25,"last_vuln_date":35,"fetched_at":27},"furie-ai-chat-widget","Furie™ AI Chat \u002F Live Handoff, Auto Engagement, and Lead Generation","1.4","furieai","https:\u002F\u002Fprofiles.wordpress.org\u002Ffurieai\u002F","\u003Cp>Furie™ is an AI-powered chat widget built to increase conversions, capture leads, and assist customers with real-time intelligence.\u003Cbr \u002F>\nJust install the plugin, choose your \u003Cstrong>Property ID\u003C\u002Fstrong>, and Furie™ appears instantly on your site — no coding required.\u003C\u002Fp>\n\u003Ch3>🌟 Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Real-time visitor tracking (“Live Browsing”).\u003C\u002Fli>\n\u003Cli>Lead scoring and prospect analysis.\u003C\u002Fli>\n\u003Cli>AI Chatbot powered by your brand, training data, redirects, and intelligent behavior.\u003C\u002Fli>\n\u003Cli>Live agent takeover & routing queues.\u003C\u002Fli>\n\u003Cli>Promo Pops™ for boosted engagement and sales (upselling based on current item in cart, etc.).\u003C\u002Fli>\n\u003Cli>Full chat widget customization (colors, avatars, position, branding).\u003C\u002Fli>\n\u003Cli>Multi-business-unit support (FREE).\u003C\u002Fli>\n\u003Cli>Advanced reporting for agents & performance.\u003C\u002Fli>\n\u003Cli>FREE FOREVER — no trial limits or credit card numbers.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>🔧 How it Works\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Install and activate the plugin.  \u003C\u002Fli>\n\u003Cli>Sign up at Furie.ai to get your Property ID from the Admin \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> Properties tab.  \u003C\u002Fli>\n\u003Cli>Go to Settings \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> Furie AI Chat Widget.Enter your Property ID (default is 29).  \u003C\u002Fli>\n\u003Cli>Furie™ instantly loads on your website using this embed:\n   \u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>You can update the Property ID anytime.\u003C\u002Fp>\n","Add a powerful AI chat widget to your site. Engage visitors, automate replies, capture leads, and boost conversions — FREE FOREVER.",189,"2025-12-02T16:46:00.000Z","5.0",[198,199,200,20,201],"ai-chatbot","conversion","customer-engagement","live-chat","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ffurie-ai-chat-widget.zip",{"attackSurface":204,"codeSignals":253,"taintFlows":274,"riskAssessment":378,"analyzedAt":391},{"hooks":205,"ajaxHandlers":225,"restRoutes":249,"shortcodes":250,"cronEvents":251,"entryPointCount":252,"unprotectedCount":252},[206,212,215,217,220,223],{"type":207,"name":208,"callback":209,"file":210,"line":211},"action","plugins_loaded","anonymous","includes\\class-cliengo.php",147,{"type":207,"name":213,"callback":209,"file":210,"line":214},"admin_enqueue_scripts",163,{"type":207,"name":213,"callback":209,"file":210,"line":216},164,{"type":207,"name":218,"callback":209,"file":210,"line":219},"admin_menu",165,{"type":207,"name":221,"callback":209,"file":210,"line":222},"wp_enqueue_scripts",187,{"type":207,"name":221,"callback":209,"file":210,"line":224},188,[226,229,232,235,238,240,243,246],{"action":227,"nopriv":53,"callback":209,"hasNonce":53,"hasCapCheck":53,"file":210,"line":228},"update_chatbot_token",166,{"action":227,"nopriv":230,"callback":209,"hasNonce":53,"hasCapCheck":53,"file":210,"line":231},true,167,{"action":233,"nopriv":53,"callback":209,"hasNonce":53,"hasCapCheck":53,"file":210,"line":234},"wordpress_login",168,{"action":236,"nopriv":53,"callback":209,"hasNonce":53,"hasCapCheck":53,"file":210,"line":237},"wp_registration",169,{"action":236,"nopriv":230,"callback":209,"hasNonce":53,"hasCapCheck":53,"file":210,"line":239},170,{"action":241,"nopriv":53,"callback":209,"hasNonce":53,"hasCapCheck":53,"file":210,"line":242},"update_session",171,{"action":244,"nopriv":53,"callback":209,"hasNonce":53,"hasCapCheck":53,"file":210,"line":245},"update_chatbot_position",172,{"action":247,"nopriv":53,"callback":209,"hasNonce":53,"hasCapCheck":53,"file":210,"line":248},"restore_session",173,[],[],[],8,{"dangerousFunctions":254,"sqlUsage":255,"outputEscaping":257,"fileOperations":25,"externalRequests":272,"nonceChecks":259,"capabilityChecks":13,"bundledLibraries":273},[],{"prepared":25,"raw":25,"locations":256},[],{"escaped":258,"rawEcho":259,"locations":260},30,5,[261,265,267,269,270],{"file":262,"line":263,"context":264},"admin\\class-cliengo-form.php",73,"raw output",{"file":262,"line":266,"context":264},101,{"file":262,"line":268,"context":264},145,{"file":262,"line":245,"context":264},{"file":262,"line":271,"context":264},279,2,[],[275,316,330,345],{"entryPoint":276,"graph":277,"unsanitizedCount":272,"severity":315},"update_chatbot_token (admin\\class-cliengo-form.php:80)",{"nodes":278,"edges":309},[279,284,289,293,297,302,305,307],{"id":280,"type":281,"label":282,"file":262,"line":283},"n0","source","$_POST",93,{"id":285,"type":286,"label":287,"file":262,"line":266,"wp_function":288},"n1","sink","echo() [XSS]","echo",{"id":290,"type":281,"label":291,"file":262,"line":292},"n2","$_POST['chatbot_token']",92,{"id":294,"type":295,"label":296,"file":262,"line":292},"n3","transform","→ update_cliengo_option()",{"id":298,"type":286,"label":299,"file":262,"line":300,"wp_function":301},"n4","update_option() [Settings Manipulation]",196,"update_option",{"id":303,"type":281,"label":304,"file":262,"line":283},"n5","$_POST['position_chatbot']",{"id":306,"type":295,"label":296,"file":262,"line":283},"n6",{"id":308,"type":286,"label":299,"file":262,"line":300,"wp_function":301},"n7",[310,311,312,313,314],{"from":280,"to":285,"sanitized":230},{"from":290,"to":294,"sanitized":53},{"from":294,"to":298,"sanitized":53},{"from":303,"to":306,"sanitized":53},{"from":306,"to":308,"sanitized":53},"low",{"entryPoint":317,"graph":318,"unsanitizedCount":104,"severity":315},"update_chatbot_position (admin\\class-cliengo-form.php:109)",{"nodes":319,"edges":326},[320,322,323,324,325],{"id":280,"type":281,"label":304,"file":262,"line":321},120,{"id":285,"type":286,"label":287,"file":262,"line":321,"wp_function":288},{"id":290,"type":281,"label":304,"file":262,"line":321},{"id":294,"type":295,"label":296,"file":262,"line":321},{"id":298,"type":286,"label":299,"file":262,"line":300,"wp_function":301},[327,328,329],{"from":280,"to":285,"sanitized":230},{"from":290,"to":294,"sanitized":53},{"from":294,"to":298,"sanitized":53},{"entryPoint":331,"graph":332,"unsanitizedCount":104,"severity":315},"update_session (admin\\class-cliengo-form.php:128)",{"nodes":333,"edges":341},[334,336,337,339,340],{"id":280,"type":281,"label":282,"file":262,"line":335},142,{"id":285,"type":286,"label":287,"file":262,"line":268,"wp_function":288},{"id":290,"type":281,"label":338,"file":262,"line":335},"$_POST['chatbot_session']",{"id":294,"type":295,"label":296,"file":262,"line":335},{"id":298,"type":286,"label":299,"file":262,"line":300,"wp_function":301},[342,343,344],{"from":280,"to":285,"sanitized":230},{"from":290,"to":294,"sanitized":53},{"from":294,"to":298,"sanitized":53},{"entryPoint":346,"graph":347,"unsanitizedCount":24,"severity":315},"\u003Cclass-cliengo-form> (admin\\class-cliengo-form.php:0)",{"nodes":348,"edges":369},[349,351,352,353,354,355,356,357,359,361,363,365,367],{"id":280,"type":281,"label":350,"file":262,"line":283},"$_POST (x2)",{"id":285,"type":286,"label":287,"file":262,"line":266,"wp_function":288},{"id":290,"type":281,"label":304,"file":262,"line":321},{"id":294,"type":286,"label":287,"file":262,"line":321,"wp_function":288},{"id":298,"type":281,"label":291,"file":262,"line":292},{"id":303,"type":295,"label":296,"file":262,"line":292},{"id":306,"type":286,"label":299,"file":262,"line":300,"wp_function":301},{"id":308,"type":281,"label":358,"file":262,"line":283},"$_POST['position_chatbot'] (x2)",{"id":360,"type":295,"label":296,"file":262,"line":283},"n8",{"id":362,"type":286,"label":299,"file":262,"line":300,"wp_function":301},"n9",{"id":364,"type":281,"label":338,"file":262,"line":335},"n10",{"id":366,"type":295,"label":296,"file":262,"line":335},"n11",{"id":368,"type":286,"label":299,"file":262,"line":300,"wp_function":301},"n12",[370,371,372,373,374,375,376,377],{"from":280,"to":285,"sanitized":230},{"from":290,"to":294,"sanitized":230},{"from":298,"to":303,"sanitized":53},{"from":303,"to":306,"sanitized":53},{"from":308,"to":360,"sanitized":53},{"from":360,"to":362,"sanitized":53},{"from":364,"to":366,"sanitized":53},{"from":366,"to":368,"sanitized":53},{"summary":379,"deductions":380},"The Cliengo plugin v3.0.4 presents a mixed security posture. On the positive side, it demonstrates good practices in its handling of SQL queries, utilizing prepared statements exclusively, and shows a relatively high percentage of properly escaped output, along with a reasonable number of nonce and capability checks. This suggests some level of attention to common web security pitfalls.\n\nHowever, significant concerns arise from the substantial attack surface exposed through AJAX handlers. All eight identified AJAX handlers lack authentication checks, making them prime targets for unauthorized actions. Furthermore, the taint analysis reveals flows with unsanitized paths, although none are categorized as critical or high severity in this specific analysis. The plugin's vulnerability history is a major red flag, with four known CVEs, two of which remain unpatched. The prevalence of medium-severity vulnerabilities, particularly Cross-Site Request Forgery (CSRF) and Missing Authorization, reinforces the concerns identified in the static analysis regarding unprotected entry points.\n\nIn conclusion, while the plugin exhibits some strengths in secure coding practices like prepared statements, the significant number of unprotected AJAX endpoints and the history of unpatched medium-severity vulnerabilities, especially those related to authorization and CSRF, indicate a substantial risk. Users should exercise caution and prioritize updating the plugin to address the known vulnerabilities.",[381,383,385,387,389],{"reason":382,"points":117},"Unprotected AJAX handlers",{"reason":384,"points":117},"Unpatched CVEs",{"reason":386,"points":252},"Flows with unsanitized paths",{"reason":388,"points":138},"Missing authorization checks",{"reason":390,"points":138},"Cross-Site Request Forgery (CSRF) history","2026-03-16T18:36:34.581Z",{"wat":393,"direct":412},{"assetPaths":394,"generatorPatterns":402,"scriptPaths":403,"versionParams":404},[395,396,397,398,399,400,401],"\u002Fwp-content\u002Fplugins\u002Fcliengo\u002Fpublic\u002Fcss\u002Fcliengo-public.css","\u002Fwp-content\u002Fplugins\u002Fcliengo\u002Fpublic\u002Fjs\u002Fcliengo-public.js","\u002Fwp-content\u002Fplugins\u002Fcliengo\u002Fadmin\u002Fextras\u002Fcliengo-bootstrap\u002Fcliengo-bootstrap.css","\u002Fwp-content\u002Fplugins\u002Fcliengo\u002Fadmin\u002Fcss\u002Fcliengo-admin.css","\u002Fwp-content\u002Fplugins\u002Fcliengo\u002Fadmin\u002Fjs\u002Fvue.min.js","\u002Fwp-content\u002Fplugins\u002Fcliengo\u002Fadmin\u002Fjs\u002Fvue-resource.min.js","\u002Fwp-content\u002Fplugins\u002Fcliengo\u002Fadmin\u002Fjs\u002Fcliengo-admin.js",[],[396,399,400,401],[405,406,407,408,409,410,411],"cliengo\u002Fcss\u002Fcliengo-public.css?ver=","cliengo\u002Fjs\u002Fcliengo-public.js?ver=","cliengo\u002Fextras\u002Fcliengo-bootstrap\u002Fcliengo-bootstrap.css?ver=","cliengo\u002Fcss\u002Fcliengo-admin.css?ver=","cliengo\u002Fjs\u002Fvue.min.js?ver=","cliengo\u002Fjs\u002Fvue-resource.min.js?ver=","cliengo\u002Fjs\u002Fcliengo-admin.js?ver=",{"cssClasses":413,"htmlComments":415,"htmlAttributes":418,"restEndpoints":420,"jsGlobals":421,"shortcodeOutput":423},[414],"cliengo-chatbot",[416,417],"\u003C!-- DO NOT MODIFY THIS FILE. -->","\u003C!-- This file is auto-generated by the cliengo plugin -->",[419],"data-cliengo-chat",[],[422],"window.cliengo_options",[],{"error":230,"url":425,"statusCode":426,"statusMessage":427,"message":427},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fcliengo\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":429,"versions":430},16,[431,436,445,453,464,475,486,497,508,519,530,541,552,562,573,584],{"version":6,"download_url":22,"svn_tag_url":432,"released_at":35,"has_diff":53,"diff_files_changed":433,"diff_lines":35,"trac_diff_url":434,"vulnerabilities":435,"is_current":230},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F3.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F3.0.4&new_path=%2Fcliengo%2Ftags%2F3.0.5",[],{"version":437,"download_url":438,"svn_tag_url":439,"released_at":35,"has_diff":53,"diff_files_changed":440,"diff_lines":35,"trac_diff_url":441,"vulnerabilities":442,"is_current":53},"3.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.3.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F3.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F3.0.3&new_path=%2Fcliengo%2Ftags%2F3.0.4",[443,444],{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"version":82,"download_url":446,"svn_tag_url":447,"released_at":35,"has_diff":53,"diff_files_changed":448,"diff_lines":35,"trac_diff_url":449,"vulnerabilities":450,"is_current":53},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.3.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F3.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F3.0.2&new_path=%2Fcliengo%2Ftags%2F3.0.3",[451,452],{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"version":454,"download_url":455,"svn_tag_url":456,"released_at":35,"has_diff":53,"diff_files_changed":457,"diff_lines":35,"trac_diff_url":458,"vulnerabilities":459,"is_current":53},"3.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.3.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F3.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F3.0.1&new_path=%2Fcliengo%2Ftags%2F3.0.2",[460,461,462,463],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":465,"download_url":466,"svn_tag_url":467,"released_at":35,"has_diff":53,"diff_files_changed":468,"diff_lines":35,"trac_diff_url":469,"vulnerabilities":470,"is_current":53},"3.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.3.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F3.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F3.0.0&new_path=%2Fcliengo%2Ftags%2F3.0.1",[471,472,473,474],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":476,"download_url":477,"svn_tag_url":478,"released_at":35,"has_diff":53,"diff_files_changed":479,"diff_lines":35,"trac_diff_url":480,"vulnerabilities":481,"is_current":53},"3.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.3.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F3.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F2.0.4&new_path=%2Fcliengo%2Ftags%2F3.0.0",[482,483,484,485],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":487,"download_url":488,"svn_tag_url":489,"released_at":35,"has_diff":53,"diff_files_changed":490,"diff_lines":35,"trac_diff_url":491,"vulnerabilities":492,"is_current":53},"2.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.2.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F2.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F2.0.3&new_path=%2Fcliengo%2Ftags%2F2.0.4",[493,494,495,496],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":498,"download_url":499,"svn_tag_url":500,"released_at":35,"has_diff":53,"diff_files_changed":501,"diff_lines":35,"trac_diff_url":502,"vulnerabilities":503,"is_current":53},"2.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.2.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F2.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F2.0.2&new_path=%2Fcliengo%2Ftags%2F2.0.3",[504,505,506,507],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":509,"download_url":510,"svn_tag_url":511,"released_at":35,"has_diff":53,"diff_files_changed":512,"diff_lines":35,"trac_diff_url":513,"vulnerabilities":514,"is_current":53},"2.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.2.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F2.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F2.0.1&new_path=%2Fcliengo%2Ftags%2F2.0.2",[515,516,517,518],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":520,"download_url":521,"svn_tag_url":522,"released_at":35,"has_diff":53,"diff_files_changed":523,"diff_lines":35,"trac_diff_url":524,"vulnerabilities":525,"is_current":53},"2.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.2.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F2.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F2.0.0&new_path=%2Fcliengo%2Ftags%2F2.0.1",[526,527,528,529],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":531,"download_url":532,"svn_tag_url":533,"released_at":35,"has_diff":53,"diff_files_changed":534,"diff_lines":35,"trac_diff_url":535,"vulnerabilities":536,"is_current":53},"2.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.2.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F2.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F1.0.1&new_path=%2Fcliengo%2Ftags%2F2.0.0",[537,538,539,540],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":542,"download_url":543,"svn_tag_url":544,"released_at":35,"has_diff":53,"diff_files_changed":545,"diff_lines":35,"trac_diff_url":546,"vulnerabilities":547,"is_current":53},"1.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.1.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F1.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F1.0.0&new_path=%2Fcliengo%2Ftags%2F1.0.1",[548,549,550,551],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":154,"download_url":553,"svn_tag_url":554,"released_at":35,"has_diff":53,"diff_files_changed":555,"diff_lines":35,"trac_diff_url":556,"vulnerabilities":557,"is_current":53},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.1.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F1.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F0.0.3&new_path=%2Fcliengo%2Ftags%2F1.0.0",[558,559,560,561],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":563,"download_url":564,"svn_tag_url":565,"released_at":35,"has_diff":53,"diff_files_changed":566,"diff_lines":35,"trac_diff_url":567,"vulnerabilities":568,"is_current":53},"0.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.0.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F0.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F0.0.2&new_path=%2Fcliengo%2Ftags%2F0.0.3",[569,570,571,572],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":574,"download_url":575,"svn_tag_url":576,"released_at":35,"has_diff":53,"diff_files_changed":577,"diff_lines":35,"trac_diff_url":578,"vulnerabilities":579,"is_current":53},"0.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.0.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F0.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcliengo%2Ftags%2F0.0.1&new_path=%2Fcliengo%2Ftags%2F0.0.2",[580,581,582,583],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82},{"version":585,"download_url":586,"svn_tag_url":587,"released_at":35,"has_diff":53,"diff_files_changed":588,"diff_lines":35,"trac_diff_url":35,"vulnerabilities":589,"is_current":53},"0.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcliengo.0.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fcliengo\u002Ftags\u002F0.0.1\u002F",[],[590,591,592,593],{"id":92,"url_slug":93,"title":94,"severity":37,"cvss_score":67,"vuln_type":40,"patched_in_version":82},{"id":63,"url_slug":64,"title":65,"severity":37,"cvss_score":67,"vuln_type":69,"patched_in_version":6},{"id":31,"url_slug":32,"title":33,"severity":37,"cvss_score":38,"vuln_type":40,"patched_in_version":6},{"id":77,"url_slug":78,"title":79,"severity":37,"cvss_score":83,"vuln_type":40,"patched_in_version":82}]