[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$ftV5RX4yC0zhpnSB9LwV1UCVgoi5D94OSgYZnBH3YV1w":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"vulnerabilities":29,"developer":30,"crawl_stats":27,"alternatives":37,"analysis":38,"fingerprints":159},"dbt-extensions","DB Toolkit Extensions Manager","0.1.0.4","David Cramer","https:\u002F\u002Fprofiles.wordpress.org\u002Fdesertsnowman\u002F","\u003Cp>Allows you to install and manage custom and add-on fieldtypes and form processors for DB-Toolkit.\u003C\u002Fp>\n","Allows you to install and manage custom and add-on fieldtypes and form processors for DB-Toolkit.",20,4150,0,"2011-12-30T08:37:00.000Z","3.2.1","3.1","",[19,20,21,22,23],"custom-field-types","custom-fieldtypes","db-toolkit-extentions","db-toolkit-field-types","db-toolkit-fieldtypes","http:\u002F\u002Fdbtoolkit.digilab.co.za","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdbt-extensions.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":31,"display_name":7,"profile_url":8,"plugin_count":32,"total_installs":33,"avg_security_score":26,"avg_patch_time_days":34,"trust_score":35,"computed_at":36},"desertsnowman",6,1130,1,90,"2026-04-04T04:29:43.274Z",[],{"attackSurface":39,"codeSignals":63,"taintFlows":115,"riskAssessment":142,"analyzedAt":158},{"hooks":40,"ajaxHandlers":59,"restRoutes":60,"shortcodes":61,"cronEvents":62,"entryPointCount":13,"unprotectedCount":13},[41,47,51,55],{"type":42,"name":43,"callback":44,"file":45,"line":46},"action","admin_init","adminInitdbtExistance","plugincore.php",13,{"type":42,"name":48,"callback":49,"file":45,"line":50},"admin_notices","dependancyNoticeAlert",15,{"type":42,"name":52,"callback":53,"file":45,"line":54},"admin_menu","dbt_menus",37,{"type":42,"name":56,"callback":57,"file":45,"line":58},"admin_head","dbte_headers",41,[],[],[],[],{"dangerousFunctions":64,"sqlUsage":70,"outputEscaping":76,"fileOperations":68,"externalRequests":13,"nonceChecks":13,"capabilityChecks":34,"bundledLibraries":114},[65],{"fn":66,"file":67,"line":68,"context":69},"unserialize","extensions\\gps\\functions.php",7,"$Out = unserialize($Input);",{"prepared":13,"raw":34,"locations":71},[72],{"file":73,"line":74,"context":75},"extensions\\translate\\functions.php",122,"$wpdb->get_results() with variable interpolation",{"escaped":13,"rawEcho":77,"locations":78},16,[79,83,85,88,90,92,94,96,98,100,102,104,106,108,110,112],{"file":80,"line":81,"context":82},"extensions\\gps\\input.php",12,"raw output",{"file":80,"line":84,"context":82},14,{"file":86,"line":87,"context":82},"functions.php",164,{"file":86,"line":89,"context":82},170,{"file":86,"line":91,"context":82},208,{"file":86,"line":93,"context":82},212,{"file":86,"line":95,"context":82},213,{"file":86,"line":97,"context":82},215,{"file":86,"line":99,"context":82},237,{"file":86,"line":101,"context":82},241,{"file":86,"line":103,"context":82},242,{"file":86,"line":105,"context":82},244,{"file":86,"line":107,"context":82},266,{"file":86,"line":109,"context":82},270,{"file":86,"line":111,"context":82},271,{"file":86,"line":113,"context":82},273,[],[116,133],{"entryPoint":117,"graph":118,"unsanitizedCount":34,"severity":132},"dbte_Manager (functions.php:55)",{"nodes":119,"edges":129},[120,124],{"id":121,"type":122,"label":123,"file":86,"line":89},"n0","source","$_SERVER['REQUEST_URI']",{"id":125,"type":126,"label":127,"file":86,"line":89,"wp_function":128},"n1","sink","echo() [XSS]","echo",[130],{"from":121,"to":125,"sanitized":131},false,"medium",{"entryPoint":134,"graph":135,"unsanitizedCount":34,"severity":141},"\u003Cfunctions> (functions.php:0)",{"nodes":136,"edges":139},[137,138],{"id":121,"type":122,"label":123,"file":86,"line":89},{"id":125,"type":126,"label":127,"file":86,"line":89,"wp_function":128},[140],{"from":121,"to":125,"sanitized":131},"low",{"summary":143,"deductions":144},"The plugin \"dbt-extensions\" v0.1.0.4 exhibits a mixed security posture. While it currently has no recorded CVEs and a seemingly limited attack surface with no apparent entry points in static analysis, significant concerns arise from its code quality signals. The presence of the `unserialize` function is a major red flag, especially when coupled with a complete lack of output escaping for all identified outputs. This combination can lead to serious vulnerabilities if unsanitized data is passed to `unserialize`.  Furthermore, the fact that 100% of SQL queries are not using prepared statements is a strong indicator of potential SQL injection risks. The taint analysis revealing unsanitized paths further reinforces these concerns, even though no critical or high severity flows were explicitly identified in this particular analysis run. The absence of vulnerability history, while positive on the surface, might simply reflect a lack of past auditing or discovery, rather than inherent security. In conclusion, while the plugin appears to have no known vulnerabilities and a small attack surface, the internal code quality issues related to serialization, SQL, and output handling present substantial potential risks that require immediate attention.",[145,147,150,153,156],{"reason":146,"points":50},"Dangerous function unserialize used",{"reason":148,"points":149},"100% of SQL queries unescaped",10,{"reason":151,"points":152},"0% of outputs properly escaped",8,{"reason":154,"points":155},"Flows with unsanitized paths",5,{"reason":157,"points":155},"No nonce checks on potential entry points","2026-03-16T22:50:12.569Z",{"wat":160,"direct":166},{"assetPaths":161,"generatorPatterns":163,"scriptPaths":164,"versionParams":165},[162],"\u002Fwp-content\u002Fplugins\u002Fdbt-extensions\u002Flibs\u002Fhandlers.js",[],[162],[],{"cssClasses":167,"htmlComments":168,"htmlAttributes":169,"restEndpoints":170,"jsGlobals":171,"shortcodeOutput":174},[],[],[],[],[172,173],"ajaxurl","jQuery",[]]