[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$faxwBL3UEASJpdyavdyzGgnsc7JZ9foAM7E6PaQ7IAMg":3,"$fLN5mmPP16z28nfELQwkgQF01DN7pA8IoxQgTzC42X4U":126,"$fkz0pqq2t2S9MEa6dig5_YJCXN6uYld0l8om8mwqkF4w":131},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"discovery_status":29,"vulnerabilities":30,"developer":31,"crawl_stats":27,"alternatives":37,"analysis":57,"fingerprints":105},"customize-edit-wp-signup-registration-for-wpms","Customize\u002Fedit wp-signup (registration) for wpms","1.0.1","diegpl","https:\u002F\u002Fprofiles.wordpress.org\u002Fdiegpl\u002F","\u003Cp>If you want a smaller wp-signup in the top of your site, that works for wpms, allowing website registration and even integrated with “New blog templates” wpmudev plugin, this is your plugin.\u003Cbr \u002F>\nYou could do this with a custom-signup.php like a template for your theme too, so this is more useful for people that doesn`t have FTP access.\u003Cbr \u002F>\nThe integration with “New blog templates” is only to make your templates appear since the first step of you registration form, because it has 3 steps and the default is make your templates appear only in the second step.\u003Cbr \u002F>\nCheck the installation tab here or this thread (http:\u002F\u002Fpremium.wpmudev.org\u002Fforums\u002Ftopic\u002Fhow-to-get-the-new-blog-template-theme-viewer) to see how it is integrated with “New blog templates” wpmudev plugin\u003C\u002Fp>\n\u003Cp>Our sites:\u003Cbr \u002F>\nhttp:\u002F\u002Fwpsoftwares.com\u003C\u002Fp>\n\u003Cp>http:\u002F\u002Fwpsoft.com.br\u003C\u002Fp>\n\u003Ch3>Arbitrary section\u003C\u002Fh3>\n\u003Ch3>Markdown\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Make you website registration easier for the users\u003C\u002Fli>\n\u003Cli>Make money renting wp-themes\u003C\u002Fli>\n\u003C\u002Fol>\n","Make a smaller wp-signup in the top of your site, that works for wpms, allowing website registration and even integrated with \"New blog templates &hellip;",10,1927,0,"2014-06-13T21:30:00.000Z","3.7.41","3.0.1","",[19,20,21,22,23],"customize-registration","edit-registration","jquery-wp-signup","smaller-wp-signup","wp-signup","http:\u002F\u002Fwpsoft.com.br","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcustomize-edit-wp-signup-registration-for-wpms.zip",85,null,"2026-04-06T09:54:40.288Z","no_bundle",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":32,"total_installs":33,"avg_security_score":26,"avg_patch_time_days":34,"trust_score":35,"computed_at":36},6,60,30,84,"2026-05-20T06:18:56.793Z",[38],{"slug":39,"name":40,"version":41,"author":42,"author_profile":43,"description":44,"short_description":45,"active_installs":46,"downloaded":47,"rating":46,"num_ratings":48,"last_updated":49,"tested_up_to":50,"requires_at_least":17,"requires_php":51,"tags":52,"homepage":17,"download_link":55,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":56},"edit-registration-date","Edit Registration Date","1.0.3","Tyler","https:\u002F\u002Fprofiles.wordpress.org\u002Ftylerthedude\u002F","\u003Cp>This plugin adds a Registration Date field to the Edit User page which allows administrators to change the date that the user has registered to the site. Administrators can also change their own registration date when editing their profiles.\u003C\u002Fp>\n","Very simple plugin that allows you to easily edit a user's registration date in WordPress",100,2138,4,"2023-11-29T22:44:00.000Z","6.4.8","5.3",[53,39,54],"edit-date","registration-date","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fedit-registration-date.1.0.3.zip","2026-04-16T10:56:18.058Z",{"attackSurface":58,"codeSignals":77,"taintFlows":92,"riskAssessment":93,"analyzedAt":104},{"hooks":59,"ajaxHandlers":73,"restRoutes":74,"shortcodes":75,"cronEvents":76,"entryPointCount":13,"unprotectedCount":13},[60,66,70],{"type":61,"name":62,"callback":63,"file":64,"line":65},"action","wp_footer","editWpSignup","insert-it-at-head.php",20,{"type":61,"name":67,"callback":68,"file":64,"line":69},"signup_extra_fields","registration_template_selection",21,{"type":61,"name":71,"callback":68,"file":64,"line":72},"signup_finished",22,[],[],[],[],{"dangerousFunctions":78,"sqlUsage":79,"outputEscaping":81,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":91},[],{"prepared":13,"raw":13,"locations":80},[],{"escaped":13,"rawEcho":82,"locations":83},3,[84,87,89],{"file":64,"line":85,"context":86},15,"raw output",{"file":64,"line":88,"context":86},16,{"file":64,"line":90,"context":86},17,[],[],{"summary":94,"deductions":95},"The plugin \"customize-edit-wp-signup-registration-for-wpms\" v1.0.1 exhibits a generally strong security posture based on the provided static analysis.  The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events, along with zero dangerous functions and no external HTTP requests, significantly limits the potential attack surface. Furthermore, the fact that all SQL queries utilize prepared statements is a positive indicator of secure database interaction.\n\nHowever, a critical concern arises from the output escaping. With 3 total outputs and 0% properly escaped, this represents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any data that is displayed to users without proper sanitization or encoding could be manipulated to inject malicious scripts. The lack of nonce and capability checks across all entry points also presents a weakness, as it implies that any functionality exposed could potentially be accessed and exploited by unauthenticated or unauthorized users, especially if the limited attack surface were to be expanded or if vulnerabilities in other areas were discovered.\n\nGiven the complete absence of recorded vulnerabilities in its history, it's difficult to infer long-term patterns. However, the current analysis highlights a disconnect between the limited attack surface and the critical oversight in output sanitization. While the plugin appears well-contained and uses secure database practices, the unescaped output represents a clear and present danger that needs immediate attention.",[96,99,102],{"reason":97,"points":98},"Unescaped output detected",8,{"reason":100,"points":101},"Missing nonce checks",5,{"reason":103,"points":101},"Missing capability checks","2026-04-16T11:48:55.148Z",{"wat":106,"direct":119},{"assetPaths":107,"generatorPatterns":111,"scriptPaths":112,"versionParams":115},[108,109,110],"\u002Fwp-content\u002Fplugins\u002Fcustomize-edit-wp-signup-registration-for-wpms\u002Fsignup-style.css","\u002Fwp-content\u002Fplugins\u002Fcustomize-edit-wp-signup-registration-for-wpms\u002Fedit-wp-signup.js","\u002Fwp-content\u002Fplugins\u002Fcustomize-edit-wp-signup-registration-for-wpms\u002Fwatermark\u002Fjquery.watermark.js",[],[113,114],"edit-wp-signup.js","watermark\u002Fjquery.watermark.js",[116,117,118],"customize-edit-wp-signup-registration-for-wpms\u002Fsignup-style.css?ver=","customize-edit-wp-signup-registration-for-wpms\u002Fedit-wp-signup.js?ver=","customize-edit-wp-signup-registration-for-wpms\u002Fwatermark\u002Fjquery.watermark.js?ver=",{"cssClasses":120,"htmlComments":121,"htmlAttributes":122,"restEndpoints":123,"jsGlobals":124,"shortcodeOutput":125},[],[],[],[],[],[],{"error":127,"url":128,"statusCode":129,"statusMessage":130,"message":130},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fcustomize-edit-wp-signup-registration-for-wpms\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":13,"versions":132},[]]