[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fO6NrO6EfpMQH6N0qeivySVmJnwtIh7I02qtR87_InXE":3,"$fHu-smCADLXbMkmnNKh1ej_JIEehcF4TK85OxKGZIHHw":335,"$fgNGbSypeumfdHQH6mV76Vw3CZ7tR7ZVcPMYezsykg1E":339},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":29,"last_vuln_date":30,"fetched_at":31,"discovery_status":32,"vulnerabilities":33,"developer":64,"crawl_stats":39,"alternatives":69,"analysis":173,"fingerprints":303},"dropdown-multisite-selector","Dropdown multisite selector","0.9.4","alordiel","https:\u002F\u002Fprofiles.wordpress.org\u002Falordiel\u002F","\u003Cp>With this plugin you can create fully configurable dropdown field which select options would work as links and will redirect the user to the selected one. It was originally built for multisite for faster navigation between each sub-site, but currently it also supports custom links as options from the dropdown.\u003C\u002Fp>\n\u003Ch4>There are three options:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>manually configure the number of the options from the dropdown element – pick up a name of your option and the relevant url where the user will be redirected after choosing it;\u003C\u002Fli>\n\u003Cli>get any list of all sites from WordPress Multisite network – this one picks the names of all your sites that are in the multisite network and adds them to the select element;\u003C\u002Fli>\n\u003Cli>get the same list as previous one but only with the site where the current logged-in user is registered;\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>You can manage:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Your label for the name of the select option or leave it without label\u003C\u002Fli>\n\u003Cli>Your first select option (‘Select branch’, ‘Select country’, ‘Choose Side’)\u003C\u002Fli>\n\u003Cli>Sorting of your custom list (alphabetic sorting + reverse sorting (your last entries will become first in the dropdown))\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Once you have saved your settings you can see the result using this shortcode [dms] or use the widget.\u003C\u002Fp>\n\u003Ch4>Shortcodes\u003C\u002Fh4>\n\u003Cp>[dms] – Using this shortcode will generate the same dropdown as the one you have configured in the admin settings panel.\u003C\u002Fp>\n\u003Cp>[dms_manual name=”” placeholder=”” target=”” options=””] – Use this one your own dropdown that has nothing to do with the settings you have set. The arguments of this shortcode are:\u003Cbr \u002F>\n* name – the label of the select option (leave empty for no label)\u003Cbr \u002F>\n* placeholder – the first option that is shown in the select menu (like: “–  Select –“)\u003Cbr \u002F>\n* target – could be “default” or “blank”. This is the target of the link – “blank” is to be open in new window\u003Cbr \u002F>\n* options – name-link pairs, should be placed as : “url1|name1, url2|name2, url3|name3”\u003C\u002Fp>\n\u003Cp>An example:\u003Cbr \u002F>\n[dms_manual name=”Label” placeholder=”–Select–” target=”blank” options=”Trusted search engine|https:\u002F\u002Fduckduckgo.com, Tracking search engine|https:\u002F\u002Fgoogle.bg”]\u003C\u002Fp>\n\u003Cp>If you would more functionality, please contact me to check if I can implement it. Also thanks to everyone giving me hints how to improve this plugin.\u003C\u002Fp>\n\u003Ch4>Filters in the code\u003C\u002Fh4>\n\u003Cp>Here are some filters that you can use to modify the results from the code:\u003Cbr \u002F>\n* \u003Ccode>dms_sites_arguments\u003C\u002Fcode> – to control the attributes used in the function \u003Ccode>get_sites()\u003C\u002Fcode> when ‘Show all sites in the WMN’ option is selected.\u003Cbr \u002F>\n* \u003Ccode>dms_multisite_pairs\u003C\u002Fcode> – filter the results returned from \u003Ccode>get_sites()\u003C\u002Fcode>.\u003Cbr \u002F>\n* \u003Ccode>dms_users_sites\u003C\u002Fcode> – control the sites when ‘Show only the sites where the user is registered’ option is selected.\u003C\u002Fp>\n","Gives you the resources to make select field with redirecting options to a given URLs.",1000,31846,100,19,"2025-03-26T10:17:00.000Z","6.7.5","3.8","7.4.0",[20,21,22,23,24],"dropdown-menu","edit-select-options","flexible-select","multisite","redirect","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fdropdown-multisite-selector\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.zip",91,2,0,"2025-03-28 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[34,51],{"id":35,"url_slug":36,"title":37,"description":38,"plugin_slug":4,"theme_slug":39,"affected_versions":40,"patched_in_version":6,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":30,"updated_date":45,"references":46,"days_to_patch":48,"patch_diff_files":49,"patch_trac_url":39,"research_status":39,"research_verified":50,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":50,"poc_model_used":39,"poc_verification_depth":39},"CVE-2025-31090","dropdown-multisite-selector-authenticated-contributor-stored-cross-site-scripting","Dropdown Multisite selector \u003C 0.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting","The Dropdown Multisite selector plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to 0.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",null,"\u003C0.9.4","medium",6.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2025-04-02 15:32:58",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F6dea5fd0-4996-4cd2-9775-7008b92c7224?source=api-prod",6,[],false,{"id":52,"url_slug":53,"title":54,"description":55,"plugin_slug":4,"theme_slug":39,"affected_versions":56,"patched_in_version":57,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":58,"updated_date":59,"references":60,"days_to_patch":62,"patch_diff_files":63,"patch_trac_url":39,"research_status":39,"research_verified":50,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":50,"poc_model_used":39,"poc_verification_depth":39},"CVE-2024-29910","dropdown-multisite-selector-authenticated-contributor-stored-cross-site-scripting-via-shortcode","Dropdown Multisite selector \u003C= 0.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode","The Dropdown multisite selector plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 0.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.","\u003C=0.9.2","0.9.2.1","2024-03-25 00:00:00","2024-03-29 17:09:04",[61],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F212e33f8-438b-4781-913f-a4f9f6d24a89?source=api-prod",5,[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":65,"total_installs":66,"avg_security_score":67,"avg_patch_time_days":48,"trust_score":27,"computed_at":68},3,1020,87,"2026-05-19T20:41:53.299Z",[70,96,117,137,155],{"slug":71,"name":72,"version":73,"author":74,"author_profile":75,"description":76,"short_description":77,"active_installs":78,"downloaded":79,"rating":80,"num_ratings":81,"last_updated":82,"tested_up_to":83,"requires_at_least":84,"requires_php":85,"tags":86,"homepage":92,"download_link":93,"security_score":13,"vuln_count":94,"unpatched_count":29,"last_vuln_date":95,"fetched_at":31},"safe-redirect-manager","Safe Redirect Manager","2.2.2","10up","https:\u002F\u002Fprofiles.wordpress.org\u002F10up\u002F","\u003Cp>Safely manage your site’s redirects the WordPress way. There are many redirect plugins available. Most of them store redirects in the options table or in custom tables. Most of them provide tons of unnecessary options. Some of them have serious performance implications (404 error logging). Safe Redirect Manager stores redirects as Custom Post Types. This makes your data portable and your website scalable. Safe Redirect Manager is built to handle enterprise level traffic and is used on major publishing websites. The plugin comes with only what you need following the WordPress mantra, decisions not options. Actions and filters make the plugin very extensible.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fgithub.com\u002F10up\u002Fsafe-redirect-manager\" rel=\"nofollow ugc\">Fork the plugin on GitHub.\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Configuration\u003C\u002Fh3>\n\u003Cp>There are no overarching settings for this plugin. To manage redirects, navigate to the administration panel (“Tools” > “Safe Redirect Manager”).\u003C\u002Fp>\n\u003Cp>Each redirect contains a few fields that you can utilize:\u003C\u002Fp>\n\u003Ch3>“Redirect From”\u003C\u002Fh3>\n\u003Cp>This should be a path relative to the root of your WordPress installation. When someone visits your site with a path that matches this one, a redirect will occur. If your site is located at \u003Ccode>http:\u002F\u002Fexample.com\u002Fwp\u002F\u003C\u002Fcode> and you wanted to redirect \u003Ccode>http:\u002F\u002Fexample.com\u002Fwp\u002Fabout\u003C\u002Fcode> to \u003Ccode>http:\u002F\u002Fexample.com\u003C\u002Fcode>, your “Redirect From” would be \u003Ccode>\u002Fabout\u003C\u002Fcode>.\u003C\u002Fp>\n\u003Cp>Clicking the “Enable Regex” checkbox allows you to use regular expressions in your path. There are many \u003Ca href=\"http:\u002F\u002Fwww.regular-expressions.info\" rel=\"nofollow ugc\">great tutorials\u003C\u002Fa> on regular expressions.\u003C\u002Fp>\n\u003Cp>You can also use wildcards in your “Redirect From” paths. By adding an \u003Ccode>*\u003C\u002Fcode> at the end of a URL, your redirect will match any request that starts with your “Redirect From”. Wildcards support replacements. This means if you have a wildcard in your from path that matches a string, you can have that string replace a wildcard character in your “Redirect To” path. For example, if your “Redirect From” is \u003Ccode>\u002Ftest\u002F*\u003C\u002Fcode>, your “Redirect To” is \u003Ccode>http:\u002F\u002Fgoogle.com\u002F*\u003C\u002Fcode>, and the requested path is \u003Ccode>\u002Ftest\u002Fstring\u003C\u002Fcode>, the user would be redirect to \u003Ccode>http:\u002F\u002Fgoogle.com\u002Fstring\u003C\u002Fcode>.\u003C\u002Fp>\n\u003Ch3>“Redirect To”\u003C\u002Fh3>\n\u003Cp>This should be a path (i.e. \u003Ccode>\u002Ftest\u003C\u002Fcode>) or a URL (i.e. \u003Ccode>http:\u002F\u002Fexample.com\u002Fwp\u002Ftest\u003C\u002Fcode>). If a requested path matches “Redirect From”, they will be redirected here. “Redirect To” supports wildcard and regular expression replacements.\u003C\u002Fp>\n\u003Ch3>“HTTP Status Code”\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"http:\u002F\u002Fwww.w3.org\u002FProtocols\u002Frfc2616\u002Frfc2616-sec10.html\" rel=\"nofollow ugc\">HTTP status codes\u003C\u002Fa> are numbers that contain information about a request (i.e. whether it was successful, unauthorized, not found, etc). You should almost always use either 302 (temporarily moved) or 301 (permanently moved).\u003C\u002Fp>\n\u003Cp>\u003Cem>Note:\u003C\u002Fem>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Redirects are cached using the Transients API. Cache busts occur when redirects are added, updated, and deleted so you shouldn’t be serving stale redirects.\u003C\u002Fli>\n\u003Cli>By default the plugin only allows at most 1000 redirects to prevent performance issues. There is a filter \u003Ccode>srm_max_redirects\u003C\u002Fcode> that you can utilize to up this number.\u003C\u002Fli>\n\u003Cli>“Redirect From” and requested paths are case insensitive by default.\u003C\u002Fli>\n\u003Cli>Developers can use \u003Ccode>srm_additional_status_codes\u003C\u002Fcode> filter to add status codes if needed.\u003C\u002Fli>\n\u003Cli>Rules set with 403 and 410 status codes are handled by applying the HTTP status code and render the default WordPress \u003Ccode>wp_die\u003C\u002Fcode> screen with an optional message.\u003C\u002Fli>\n\u003Cli>Rules set with a 404 status code will apply the status code and render the 404 template.\u003C\u002Fli>\n\u003Cli>Browsers heavily cache 301 (permanently moved) redirects. It’s recommended to test your permanent redirects using the 302 (temporarily moved) status code before changing them to 301 permanently moved.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Developer Documentation\u003C\u002Fh3>\n\u003Cp>Safe Redirect Manager includes a number of actions and filters developers can make use of. These are documented on the \u003Ca href=\"http:\u002F\u002F10up.github.io\u002Fsafe-redirect-manager\u002F\" rel=\"nofollow ugc\">Safe Redirect Manager developer documentation\u003C\u002Fa> micro-site.\u003C\u002Fp>\n","Safely manage your website's HTTP redirects.",40000,1943909,94,78,"2026-01-04T21:19:00.000Z","6.9.4","6.5","7.4",[87,88,89,90,91],"http-redirects","multisite-redirects","redirect-manager","safe-http-redirection","url-redirection","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fsafe-redirect-manager","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsafe-redirect-manager.2.2.2.zip",1,"2022-06-19 00:00:00",{"slug":97,"name":98,"version":99,"author":100,"author_profile":101,"description":102,"short_description":103,"active_installs":13,"downloaded":104,"rating":105,"num_ratings":106,"last_updated":107,"tested_up_to":108,"requires_at_least":109,"requires_php":110,"tags":111,"homepage":114,"download_link":115,"security_score":116,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"language-redirect","Language Redirect","1.0.5","bjoerne","https:\u002F\u002Fprofiles.wordpress.org\u002Fbjoerne\u002F","\u003Cp>WordPress plugin which redirects from the root site of a multisite project to a language specific network site.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Please Note: This plugin doesn’t allow content on the root site! Please read this description carefully to see if this works for you.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>The decision which language should be used is based in the browser language of the user which is usually sent as ‘Accept-Language’ header (PHP: $_SERVER[‘HTTP_ACCEPT_LANGUAGE’]).\u003C\u002Fp>\n\u003Cp>The plugin provides a configuration page where supported languages, redirect targets and the default language can be configured.\u003C\u002Fp>\n\u003Cp>The plugin should be activated only on the root site. It shouldn’t be active on the language specific network site.\u003C\u002Fp>\n\u003Cp>The plugin is developed on \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fbjoerne2\u002Flanguage-redirect\" rel=\"nofollow ugc\">Github\u003C\u002Fa>. Feel free to fork the project or create pull requests.\u003C\u002Fp>\n\u003Cp>\u003Cem>This plugin was originally developed for \u003Ca href=\"http:\u002F\u002Fwww.monkkee.com\u002F\" rel=\"nofollow ugc\">monkkee\u003C\u002Fa> and is inspired by \u003Ca href=\"http:\u002F\u002Foncleben31.cc\" rel=\"nofollow ugc\">oncleben31.cc\u003C\u002Fa>\u003C\u002Fem>\u003C\u002Fp>\n","Redirects from the root site of a multisite project to a language specific network site.",12919,80,13,"2017-02-11T11:22:00.000Z","4.7.33","3.4","",[112,113,23,24],"header","language","http:\u002F\u002Fwww.bjoerne.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flanguage-redirect.zip",85,{"slug":118,"name":119,"version":120,"author":121,"author_profile":122,"description":123,"short_description":124,"active_installs":125,"downloaded":126,"rating":13,"num_ratings":127,"last_updated":128,"tested_up_to":129,"requires_at_least":130,"requires_php":110,"tags":131,"homepage":135,"download_link":136,"security_score":116,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"jonimo-simple-redirect","jonimo Simple Redirect","1.5","jonimo","https:\u002F\u002Fprofiles.wordpress.org\u002Fjonimo\u002F","\u003Cp>\u003Ca href=\"http:\u002F\u002Fjonimo.com\" rel=\"nofollow ugc\">jonimo\u003C\u002Fa> simple redirect helps your users with different roles get to the right place when they login or logout of your WordPress, WooCommerce or BuddyPress site.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Set any url (internal or external) to redirect users to on login or logout.\u003C\u002Fli>\n\u003Cli>Redirect users with specific roles to a location just once, or up to nine times.\u003C\u002Fli>\n\u003Cli>After a user has been redirected the required number of times on login, they are automatically redirected to a default location\u003C\u002Fli>\n\u003Cli>The default location is where users will be redirected if no custom location is specified. The default location can be any internal or external url, tag, page or category.\u003C\u002Fli>\n\u003Cli>On logout redirect users to any internal or external url.\u003C\u002Fli>\n\u003Cli>Fully compatible with WordPress 3.9 and BuddyPress 1.9.2 You can give your users an experience more similar to popular social networks by redirecting them to\u003Cbr \u002F>\ntheir personal profile pages, their ‘friends’ menu or the activity stream.\u003C\u002Fli>\n\u003Cli>Fully multisite compatible, giving each site administration control over where the different users of their site are redirected to\u003C\u002Fli>\n\u003Cli>Extendable and built with developers in mind. It’s easy to change the default redirect behaviour using custom filters.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Works with WooCommerce\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Ca href=\"http:\u002F\u002Fjonimo.com\u002Fproduct\u002Fjonimo-simple-redirect-pro\" rel=\"nofollow ugc\">jonimo simple redirect\u003C\u002Fa> is 100% compatible with Woocommerce, meaning you can login using the woocommerce login form and still redirect users a set number of times to a specific location \u003C\u002Fli>\n\u003Cli>NEW With Woocommerce -> Example: Redirect each user just once to an offer page on login or logout\u003C\u002Fli>\n\u003Cli>NEW With Woocommerce -> Example: Redirect each user with a specific role to a set product category just once on login, and then to any other location on logout.\u003C\u002Fli>\n\u003Cli>NEW With Woocommerce -> Example: Always redirect different users on logout to a thank you for buying screen \u003C\u002Fli>\n\u003Cli>Free support for 1 year\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>= Use examples for a none WooCommerce site.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>On login, redirect subscribers to an welcome page just once, and then to the homepage.\u003C\u002Fli>\n\u003Cli>On login, redirect users to any url before reverting to the default location the next time a user logs in.\u003C\u002Fli>\n\u003Cli>On login, redirect BuddyPress users to their profile edit screen a set number of times before redirecting them to their profile.  \u003C\u002Fli>\n\u003Cli>On login, redirect users to a specific blog article just once when they login and then after that to another location. \u003C\u002Fli>\n\u003Cli>On login, encourage users to accept updates to terms and conditions.   \u003C\u002Fli>\n\u003Cli>Always redirect users to a specific location.\u003C\u002Fli>\n\u003Cli>On logout, redirect users to any location, including external sites\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>If you have any questions, or require support, let us know at \u003Ca href=\"http:\u002F\u002Fjonimo.com\u002Fforums\u002Fsupport\" title=\"jonimo support\" rel=\"nofollow ugc\">jonimo\u003C\u002Fa>\u003C\u002Fp>\n","Easily redirect users with specific roles to any url, page, tag or category a set number of times when they login or logout.",70,9045,8,"2014-04-21T20:15:00.000Z","3.9.40","3.0.1",[132,133,134,23,24],"buddypress","login","logout","http:\u002F\u002Fwww.jonimo.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fjonimo-simple-redirect.zip",{"slug":138,"name":139,"version":140,"author":141,"author_profile":142,"description":143,"short_description":144,"active_installs":145,"downloaded":146,"rating":13,"num_ratings":28,"last_updated":147,"tested_up_to":148,"requires_at_least":149,"requires_php":85,"tags":150,"homepage":153,"download_link":154,"security_score":13,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"primary-redirect","Primary Redirect","2.0.2","Mustafa Uysal","https:\u002F\u002Fprofiles.wordpress.org\u002Fm_uysl\u002F","\u003Cp>Primary Redirect is a powerful WordPress plugin that allows you to customize where users are redirected after logging in. Instead of the default WordPress behavior, you can redirect users to:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>A custom URL of your choice\u003C\u002Fli>\n\u003Cli>Their primary blog’s dashboard (in multisite installations)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This plugin is perfect for:\u003Cbr \u002F>\n* Multisite networks where you want users to go to their primary blog\u003Cbr \u002F>\n* Sites with custom dashboards or landing pages\u003Cbr \u002F>\n* Improving user experience with personalized redirects\u003C\u002Fp>\n\u003Ch4>Key Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Custom URL Redirect\u003C\u002Fstrong>: Set any URL as the post-login destination\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Primary Blog Redirect\u003C\u002Fstrong>: Automatically redirect users to their primary blog’s dashboard (multisite)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Network & Single Site Support\u003C\u002Fstrong>: Works on both multisite networks and single WordPress sites\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Easy Configuration\u003C\u002Fstrong>: Simple settings interface in WordPress admin\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Developer Friendly\u003C\u002Fstrong>: Clean, modern code following WordPress best practices\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Multisite Support\u003C\u002Fh4>\n\u003Cp>On multisite installations, you get additional options:\u003Cbr \u002F>\n* Redirect users to their primary blog’s dashboard\u003Cbr \u002F>\n* Network-wide settings that apply to all sites\u003Cbr \u002F>\n* Override custom URLs with primary blog redirect\u003C\u002Fp>\n\u003Ch4>Single Site Support\u003C\u002Fh4>\n\u003Cp>On single WordPress sites, configure a custom redirect URL that applies to all users after login.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>If you like this plugin, then consider checking out our other projects:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fpoweredcache.com\u002F\" rel=\"friend nofollow ugc\">Powered Cache\u003C\u002Fa> – Caching and Optimization for WordPress – Easily Improve PageSpeed & Web Vitals Score\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fhandyplugins.co\u002Fmagic-login-pro\u002F\" rel=\"friend nofollow ugc\">Magic Login Pro\u003C\u002Fa> – Easy, secure, and passwordless authentication for WordPress.\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fhandyplugins.co\u002Fpaddlepress-pro\u002F\" rel=\"friend nofollow ugc\">PaddlePress PRO\u003C\u002Fa> – Paddle Plugin for WordPress\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fhandyplugins.co\u002Feasy-text-to-speech\u002F\" rel=\"friend nofollow ugc\">Easy Text-to-Speech for WordPress\u003C\u002Fa> – Transform your textual content into high-quality synthesized speech with AI.\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fhandyplugins.co\u002Fhandywriter\u002F\" rel=\"friend nofollow ugc\">Handywriter\u003C\u002Fa> – AI-powered writing assistant that can help you create content for your WordPress.\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fhandyplugins.co\u002Fwp-accessibility-toolkit\u002F\" rel=\"friend nofollow ugc\">WP Accessibility Toolkit\u003C\u002Fa> – A collection of tools to help you make your WordPress more accessible.\u003C\u002Fli>\n\u003C\u002Ful>\n","Redirects users to a custom URL or their primary blog's dashboard after login, replacing the default WordPress behavior.",10,2688,"2025-07-25T11:39:00.000Z","6.8.5","5.0",[133,23,151,24,152],"primary","redirection","https:\u002F\u002Fhandyplugins.co","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fprimary-redirect.2.0.2.zip",{"slug":156,"name":157,"version":158,"author":159,"author_profile":160,"description":161,"short_description":162,"active_installs":145,"downloaded":163,"rating":13,"num_ratings":94,"last_updated":164,"tested_up_to":165,"requires_at_least":166,"requires_php":110,"tags":167,"homepage":171,"download_link":172,"security_score":116,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"redirect-multisite-user-to-their-own-site","Redirect multisite user to their own site (UNMAINTAINED)","1.1.2","Mark Howells-Mead","https:\u002F\u002Fprofiles.wordpress.org\u002Fmarkhowellsmead\u002F","\u003Cp>\u003Cstrong>THIS PLUGIN IS NO LONGER MAINTAINED.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>If the current user in a multisite environment accesses a subsite to which access has not been granted, then redirect the user back to their own site. If the user has been granted access to more than one site in the Multisite installation, then no redirect can occur. (Because there is no way of finding out which one is “correct”.)\u003C\u002Fp>\n\u003Ch3>Information for developers\u003C\u002Fh3>\n\u003Cp>There are three action hooks available to developers. You can use them, for example, to write a log file or notify an email address when an action is carried out.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ccode>redirect-multisite-user-to-their-own-site\u002Fno-sites\u003C\u002Fcode> fires when the user is logged in but does not have specific access to any sites in the current Multisite installation. Receives the values \u003Ccode>$current_user\u003C\u002Fcode> (WordPress User object) and \u003Ccode>$current_site_id\u003C\u002Fcode> (integer) as attributes.\u003C\u002Fli>\n\u003Cli>\u003Ccode>redirect-multisite-user-to-their-own-site\u002Fredirecting\u003C\u002Fcode> fires immediately before the user is redirected to the appropriate site. Receives the values \u003Ccode>$current_user\u003C\u002Fcode> (WordPress User object), \u003Ccode>$current_site_id\u003C\u002Fcode> (integer) and \u003Ccode>$user_target_site->siteurl\u003C\u002Fcode> (the URL to which the user will be redirected) as attributes.\u003C\u002Fli>\n\u003Cli>\u003Ccode>redirect-multisite-user-to-their-own-site\u002Fnot-allowed\u003C\u002Fcode> fires when the user has authorized access to more than one site in the installation, and can therefore not be redirected. Receives the values \u003Ccode>$current_user\u003C\u002Fcode> (WordPress User object), \u003Ccode>$current_site_id\u003C\u002Fcode> (integer) and \u003Ccode>$user_sites\u003C\u002Fcode> (array) as attributes.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This plugin requires PHP 5.3 or newer because it uses PHP namespaces.\u003C\u002Fp>\n","Redirect a multisite user to their own site.",2628,"2022-11-11T16:31:00.000Z","4.6.30","4.5",[23,168,24,169,170],"parse_request","user","wpmu","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fredirect-multisite-user-to-their-own-site\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fredirect-multisite-user-to-their-own-site.zip",{"attackSurface":174,"codeSignals":220,"taintFlows":268,"riskAssessment":295,"analyzedAt":302},{"hooks":175,"ajaxHandlers":202,"restRoutes":208,"shortcodes":209,"cronEvents":219,"entryPointCount":65,"unprotectedCount":29},[176,182,187,190,194,198],{"type":177,"name":178,"callback":179,"file":180,"line":181},"action","plugins_loaded","dms_plugin_updated","dropdown-multisite-selector.php",63,{"type":177,"name":183,"callback":184,"file":185,"line":186},"widgets_init","dms_load_widget","functions\\widgets.php",51,{"type":177,"name":178,"callback":188,"file":189,"line":48},"dropdown_multisite_meta_init","functions\\wordpress.php",{"type":177,"name":191,"callback":192,"file":189,"line":193},"admin_enqueue_scripts","dms_admin_styles_script",15,{"type":177,"name":195,"callback":196,"file":189,"line":197},"wp_enqueue_scripts","dms_front_styles_script",41,{"type":177,"name":199,"callback":200,"file":189,"line":201},"admin_menu","dms_register_submenu",55,[203],{"action":204,"nopriv":50,"callback":205,"hasNonce":206,"hasCapCheck":50,"file":207,"line":65},"dms_add_fields","dms_ajax_update_fields",true,"functions\\ajax.php",[],[210,215],{"tag":211,"callback":212,"file":213,"line":214},"dms","dms_build_select","functions\\shortcodes.php",4,{"tag":216,"callback":217,"file":213,"line":218},"dms_manual","dms_build_select_manual",52,[],{"dangerousFunctions":221,"sqlUsage":222,"outputEscaping":224,"fileOperations":29,"externalRequests":29,"nonceChecks":94,"capabilityChecks":94,"bundledLibraries":267},[],{"prepared":29,"raw":29,"locations":223},[],{"escaped":225,"rawEcho":14,"locations":226},9,[227,230,232,234,236,238,240,242,245,247,249,251,253,255,257,259,261,263,265],{"file":185,"line":228,"context":229},18,"raw output",{"file":185,"line":231,"context":229},20,{"file":185,"line":233,"context":229},22,{"file":185,"line":235,"context":229},23,{"file":185,"line":237,"context":229},32,{"file":185,"line":239,"context":229},34,{"file":185,"line":241,"context":229},35,{"file":243,"line":244,"context":229},"templates\\dms-admin.php",64,{"file":243,"line":246,"context":229},67,{"file":243,"line":248,"context":229},76,{"file":243,"line":250,"context":229},81,{"file":243,"line":252,"context":229},86,{"file":243,"line":254,"context":229},99,{"file":243,"line":256,"context":229},104,{"file":243,"line":258,"context":229},109,{"file":243,"line":260,"context":229},114,{"file":243,"line":262,"context":229},144,{"file":243,"line":264,"context":229},147,{"file":243,"line":266,"context":229},183,[],[269,287],{"entryPoint":270,"graph":271,"unsanitizedCount":29,"severity":286},"dms_ajax_update_fields (functions\\ajax.php:4)",{"nodes":272,"edges":284},[273,278],{"id":274,"type":275,"label":276,"file":207,"line":277},"n0","source","$_POST (x5)",17,{"id":279,"type":280,"label":281,"file":207,"line":282,"wp_function":283},"n1","sink","update_option() [Settings Manipulation]",73,"update_option",[285],{"from":274,"to":279,"sanitized":206},"low",{"entryPoint":288,"graph":289,"unsanitizedCount":29,"severity":286},"\u003Cajax> (functions\\ajax.php:0)",{"nodes":290,"edges":293},[291,292],{"id":274,"type":275,"label":276,"file":207,"line":277},{"id":279,"type":280,"label":281,"file":207,"line":282,"wp_function":283},[294],{"from":274,"to":279,"sanitized":206},{"summary":296,"deductions":297},"The \"dropdown-multisite-selector\" plugin v0.9.4 exhibits a mixed security posture. On the positive side, the static analysis reveals good practices such as the absence of dangerous functions, all SQL queries using prepared statements, and a single nonce and capability check, indicating an attempt to secure entry points. There are no identified flows with unsanitized paths in the taint analysis, and the code does not perform file operations or external HTTP requests, minimizing certain attack vectors.\n\nHowever, there are significant concerns. A substantial portion of output (68%) is not properly escaped, presenting a considerable Cross-Site Scripting (XSS) risk. While the static analysis shows zero unprotected entry points, the vulnerability history reveals two past medium-severity CVEs, both related to XSS. The fact that these vulnerabilities existed, even if currently patched, suggests a recurring weakness in output sanitization, which is further evidenced by the high percentage of unescaped output in the current version. The presence of past vulnerabilities, particularly of the same type as indicated by the unescaped output, should be a strong indicator of potential future issues if not addressed.\n\nIn conclusion, while the plugin has made efforts to secure its core functionality with prepared statements and checks, the lack of robust output escaping remains a critical security weakness. The historical pattern of XSS vulnerabilities reinforces this concern. Users should be cautious, as the potential for XSS attacks is high due to the unescaped output, and the plugin's past indicates a susceptibility to this type of vulnerability.",[298,300],{"reason":299,"points":193},"High percentage of unescaped output",{"reason":301,"points":145},"History of medium severity XSS vulnerabilities","2026-03-16T18:57:24.894Z",{"wat":304,"direct":316},{"assetPaths":305,"generatorPatterns":310,"scriptPaths":311,"versionParams":312},[306,307,308,309],"\u002Fwp-content\u002Fplugins\u002Fdropdown-multisite-selector\u002Fassets\u002Fjs\u002Fdms-admin.js","\u002Fwp-content\u002Fplugins\u002Fdropdown-multisite-selector\u002Fassets\u002Fcss\u002Fdms-admin.css","\u002Fwp-content\u002Fplugins\u002Fdropdown-multisite-selector\u002Fassets\u002Fjs\u002Fdms-front.js","\u002Fwp-content\u002Fplugins\u002Fdropdown-multisite-selector\u002Fassets\u002Fcss\u002Fdms-front.css",[],[306,308],[313,314,315],"dropdown-multisite-selector\u002Fassets\u002Fjs\u002Fdms-admin.js?ver=0.7.0","dropdown-multisite-selector\u002Fassets\u002Fjs\u002Fdms-front.js?ver=","dropdown-multisite-selector\u002Fassets\u002Fcss\u002Fdms-front.css?ver=",{"cssClasses":317,"htmlComments":321,"htmlAttributes":322,"restEndpoints":326,"jsGlobals":327,"shortcodeOutput":329},[318,319,320],"dms-container","dms-select","open-in-new-tab",[],[323,324,325],"data-dms-tag-name","data-dms-value","data-dms-siteurl",[],[328],"trans_str",[330,331,332,333,334],"\u003Cdiv class='dms-container'>","\u003Clabel for='dms-select'>","\u003Cselect class='dms-select'>","\u003Coption value=''>","\u003Cselect class='dms-select open-in-new-tab'>",{"error":206,"url":336,"statusCode":337,"statusMessage":338,"message":338},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fdropdown-multisite-selector\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":340,"versions":341},27,[342,349,356,365,374,383,392,401,410,419,428,437,446,455,464,473,482,491,500,509,518,527,536,545,554,563,572],{"version":343,"download_url":344,"svn_tag_url":345,"released_at":39,"has_diff":50,"diff_files_changed":346,"diff_lines":39,"trac_diff_url":347,"vulnerabilities":348,"is_current":50},"0.9.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.9.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.9.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.2.1&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.5",[],{"version":57,"download_url":350,"svn_tag_url":351,"released_at":39,"has_diff":50,"diff_files_changed":352,"diff_lines":39,"trac_diff_url":353,"vulnerabilities":354,"is_current":50},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.9.2.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.9.2.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.2&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.2.1",[355],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":357,"download_url":358,"svn_tag_url":359,"released_at":39,"has_diff":50,"diff_files_changed":360,"diff_lines":39,"trac_diff_url":361,"vulnerabilities":362,"is_current":50},"0.9.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.9.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.9.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.1&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.2",[363,364],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":366,"download_url":367,"svn_tag_url":368,"released_at":39,"has_diff":50,"diff_files_changed":369,"diff_lines":39,"trac_diff_url":370,"vulnerabilities":371,"is_current":50},"0.9.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.9.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.9.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.0&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.1",[372,373],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":375,"download_url":376,"svn_tag_url":377,"released_at":39,"has_diff":50,"diff_files_changed":378,"diff_lines":39,"trac_diff_url":379,"vulnerabilities":380,"is_current":50},"0.9.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.9.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.9.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.6&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.9.0",[381,382],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":384,"download_url":385,"svn_tag_url":386,"released_at":39,"has_diff":50,"diff_files_changed":387,"diff_lines":39,"trac_diff_url":388,"vulnerabilities":389,"is_current":50},"0.8.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.8.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.8.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.5&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.6",[390,391],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":393,"download_url":394,"svn_tag_url":395,"released_at":39,"has_diff":50,"diff_files_changed":396,"diff_lines":39,"trac_diff_url":397,"vulnerabilities":398,"is_current":50},"0.8.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.8.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.8.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.4&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.5",[399,400],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":402,"download_url":403,"svn_tag_url":404,"released_at":39,"has_diff":50,"diff_files_changed":405,"diff_lines":39,"trac_diff_url":406,"vulnerabilities":407,"is_current":50},"0.8.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.8.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.8.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.3&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.4",[408,409],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":411,"download_url":412,"svn_tag_url":413,"released_at":39,"has_diff":50,"diff_files_changed":414,"diff_lines":39,"trac_diff_url":415,"vulnerabilities":416,"is_current":50},"0.8.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.8.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.8.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.2&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.3",[417,418],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":420,"download_url":421,"svn_tag_url":422,"released_at":39,"has_diff":50,"diff_files_changed":423,"diff_lines":39,"trac_diff_url":424,"vulnerabilities":425,"is_current":50},"0.8.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.8.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.8.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.1&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.2",[426,427],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":429,"download_url":430,"svn_tag_url":431,"released_at":39,"has_diff":50,"diff_files_changed":432,"diff_lines":39,"trac_diff_url":433,"vulnerabilities":434,"is_current":50},"0.8.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.8.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.8.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8.1",[435,436],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":438,"download_url":439,"svn_tag_url":440,"released_at":39,"has_diff":50,"diff_files_changed":441,"diff_lines":39,"trac_diff_url":442,"vulnerabilities":443,"is_current":50},"0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.7&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.8",[444,445],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":447,"download_url":448,"svn_tag_url":449,"released_at":39,"has_diff":50,"diff_files_changed":450,"diff_lines":39,"trac_diff_url":451,"vulnerabilities":452,"is_current":50},"0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6.4&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.7",[453,454],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":456,"download_url":457,"svn_tag_url":458,"released_at":39,"has_diff":50,"diff_files_changed":459,"diff_lines":39,"trac_diff_url":460,"vulnerabilities":461,"is_current":50},"0.6.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.6.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.6.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6.3&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6.4",[462,463],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":465,"download_url":466,"svn_tag_url":467,"released_at":39,"has_diff":50,"diff_files_changed":468,"diff_lines":39,"trac_diff_url":469,"vulnerabilities":470,"is_current":50},"0.6.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.6.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.6.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6.2&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6.3",[471,472],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":474,"download_url":475,"svn_tag_url":476,"released_at":39,"has_diff":50,"diff_files_changed":477,"diff_lines":39,"trac_diff_url":478,"vulnerabilities":479,"is_current":50},"0.6.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.6.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.6.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6.1&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6.2",[480,481],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":483,"download_url":484,"svn_tag_url":485,"released_at":39,"has_diff":50,"diff_files_changed":486,"diff_lines":39,"trac_diff_url":487,"vulnerabilities":488,"is_current":50},"0.6.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.6.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.6.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6.1",[489,490],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":492,"download_url":493,"svn_tag_url":494,"released_at":39,"has_diff":50,"diff_files_changed":495,"diff_lines":39,"trac_diff_url":496,"vulnerabilities":497,"is_current":50},"0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.5&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.6",[498,499],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":501,"download_url":502,"svn_tag_url":503,"released_at":39,"has_diff":50,"diff_files_changed":504,"diff_lines":39,"trac_diff_url":505,"vulnerabilities":506,"is_current":50},"0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.4.1&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.5",[507,508],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":510,"download_url":511,"svn_tag_url":512,"released_at":39,"has_diff":50,"diff_files_changed":513,"diff_lines":39,"trac_diff_url":514,"vulnerabilities":515,"is_current":50},"0.4.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.4.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.4.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.4&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.4.1",[516,517],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":519,"download_url":520,"svn_tag_url":521,"released_at":39,"has_diff":50,"diff_files_changed":522,"diff_lines":39,"trac_diff_url":523,"vulnerabilities":524,"is_current":50},"0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.3.3&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.4",[525,526],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":528,"download_url":529,"svn_tag_url":530,"released_at":39,"has_diff":50,"diff_files_changed":531,"diff_lines":39,"trac_diff_url":532,"vulnerabilities":533,"is_current":50},"0.3.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.3.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.3.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.3.2&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.3.3",[534,535],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":537,"download_url":538,"svn_tag_url":539,"released_at":39,"has_diff":50,"diff_files_changed":540,"diff_lines":39,"trac_diff_url":541,"vulnerabilities":542,"is_current":50},"0.3.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.3.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.3.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.3.1&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.3.2",[543,544],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":546,"download_url":547,"svn_tag_url":548,"released_at":39,"has_diff":50,"diff_files_changed":549,"diff_lines":39,"trac_diff_url":550,"vulnerabilities":551,"is_current":50},"0.3.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.3.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.3.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.3&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.3.1",[552,553],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":555,"download_url":556,"svn_tag_url":557,"released_at":39,"has_diff":50,"diff_files_changed":558,"diff_lines":39,"trac_diff_url":559,"vulnerabilities":560,"is_current":50},"0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.2&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.3",[561,562],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":564,"download_url":565,"svn_tag_url":566,"released_at":39,"has_diff":50,"diff_files_changed":567,"diff_lines":39,"trac_diff_url":568,"vulnerabilities":569,"is_current":50},"0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fdropdown-multisite-selector%2Ftags%2F0.1&new_path=%2Fdropdown-multisite-selector%2Ftags%2F0.2",[570,571],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":573,"download_url":574,"svn_tag_url":575,"released_at":39,"has_diff":50,"diff_files_changed":576,"diff_lines":39,"trac_diff_url":39,"vulnerabilities":577,"is_current":50},"0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdropdown-multisite-selector.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fdropdown-multisite-selector\u002Ftags\u002F0.1\u002F",[],[578,579],{"id":52,"url_slug":53,"title":54,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":57},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6}]