[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fonsKRGPpE0j2X6pkQjcTNlm_7UjAektHy9n5hFrTZmA":3,"$f8yAe6GrgozGb8aFNud15Ev56VlQ908rncMc4SJzRMUo":313,"$fZiuBI0vB96ytx9A7ZejE_LZnMEG8sYx7-mcSS3QZxtE":318},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":24,"download_link":25,"security_score":26,"vuln_count":14,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29,"discovery_status":30,"vulnerabilities":31,"developer":66,"crawl_stats":37,"alternatives":74,"analysis":177,"fingerprints":293},"htaccess-file-editor","Htaccess File Editor – Easily Edit, Backup, Restore .htaccess file","1.0.22","WP Chill","https:\u002F\u002Fprofiles.wordpress.org\u002Fwpchill\u002F","\u003Cp>Htaccess File Editor is a fast, safe and simple yet perfect to edit the WordPress site’s \u003Cem>.htaccess\u003C\u002Fem> file from admin panel. You can create a backup of your \u003Cem>.htaccess\u003C\u002Fem> file and can be restored from WordPress Dashboard.\u003Cbr \u002F>\nYou can create a Backup from Htaccess –> Backup Menu and you can edit .htaccess file from Htaccess Menu.\u003Cbr \u002F>\n\u003Cstrong>This plugin should be used only by experienced users!\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Edit .htaccess file easily\u003C\u002Fli>\n\u003Cli>Create Backup of .htaccess file\u003C\u002Fli>\n\u003Cli>Restore  old .htaccess backup\u003C\u002Fli>\n\u003C\u002Fol>\n","Simple editor htaccess file without using FTP client.",10000,123634,100,2,"2025-12-02T11:01:00.000Z","6.9.4","6.5","",[20,21,22,23],"htaccess","htaccess-backup","htaccess-editor","htaccess-restore","https:\u002F\u002Fwpchill.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.22.zip",99,0,"2025-01-14 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[32,50],{"id":33,"url_slug":34,"title":35,"description":36,"plugin_slug":4,"theme_slug":37,"affected_versions":38,"patched_in_version":39,"severity":40,"cvss_score":41,"cvss_vector":42,"vuln_type":43,"published_date":28,"updated_date":44,"references":45,"days_to_patch":47,"patch_diff_files":48,"patch_trac_url":37,"research_status":37,"research_verified":49,"research_rounds_completed":27,"research_plan":37,"research_summary":37,"research_vulnerable_code":37,"research_fix_diff":37,"research_exploit_outline":37,"research_model_used":37,"research_started_at":37,"research_completed_at":37,"research_error":37,"poc_status":37,"poc_video_id":37,"poc_summary":37,"poc_steps":37,"poc_tested_at":37,"poc_wp_version":37,"poc_php_version":37,"poc_playwright_script":37,"poc_exploit_code":37,"poc_has_trace":49,"poc_model_used":37,"poc_verification_depth":37},"CVE-2025-22773","htaccess-file-editor-unauthenticated-information-exposure","Htaccess File Editor \u003C= 1.0.19 - Unauthenticated Information Exposure","The Htaccess File Editor – Easily Edit, Backup, Restore .htaccess file plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.19 via the location of .htaccess file backups. This makes it possible for unauthenticated attackers to extract sensitive data that could be contained in .htaccess file backups.",null,"\u003C=1.0.19","1.0.20","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2025-01-21 16:29:03",[46],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5ad275a2-c559-4a2f-8f82-646cb75285a7?source=api-prod",8,[],false,{"id":51,"url_slug":52,"title":53,"description":54,"plugin_slug":4,"theme_slug":37,"affected_versions":55,"patched_in_version":56,"severity":40,"cvss_score":57,"cvss_vector":58,"vuln_type":59,"published_date":60,"updated_date":61,"references":62,"days_to_patch":64,"patch_diff_files":65,"patch_trac_url":37,"research_status":37,"research_verified":49,"research_rounds_completed":27,"research_plan":37,"research_summary":37,"research_vulnerable_code":37,"research_fix_diff":37,"research_exploit_outline":37,"research_model_used":37,"research_started_at":37,"research_completed_at":37,"research_error":37,"poc_status":37,"poc_video_id":37,"poc_summary":37,"poc_steps":37,"poc_tested_at":37,"poc_wp_version":37,"poc_php_version":37,"poc_playwright_script":37,"poc_exploit_code":37,"poc_has_trace":49,"poc_model_used":37,"poc_verification_depth":37},"CVE-2024-49256","htaccess-file-editor-missing-authorization","Htaccess File Editor \u003C= 1.0.18 - Missing Authorization","The Htaccess File Editor plugin for WordPress is vulnerable to unauthorized access due to a missing capability check in the class-htaccess-file-editor-ebwp-notice.php file in versions up to, and including, 1.0.18. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform unauthorized actions.","\u003C=1.0.18","1.0.19",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Missing Authorization","2024-10-14 00:00:00","2024-10-18 16:29:00",[63],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa706e4eb-cd27-44b1-a023-5e4e075c768d?source=api-prod",5,[],{"slug":67,"display_name":7,"profile_url":8,"plugin_count":68,"total_installs":69,"avg_security_score":70,"avg_patch_time_days":71,"trust_score":72,"computed_at":73},"wpchill",29,420400,95,560,76,"2026-05-19T16:32:43.753Z",[75,94,117,136,156],{"slug":76,"name":77,"version":78,"author":79,"author_profile":80,"description":81,"short_description":82,"active_installs":83,"downloaded":84,"rating":13,"num_ratings":85,"last_updated":86,"tested_up_to":16,"requires_at_least":87,"requires_php":88,"tags":89,"homepage":92,"download_link":93,"security_score":13,"vuln_count":27,"unpatched_count":27,"last_vuln_date":37,"fetched_at":29},"wp-htaccess-editor","Htaccess File Editor – Safely Edit Htaccess File","1.73","WebFactory","https:\u002F\u002Fprofiles.wordpress.org\u002Fwebfactory\u002F","\u003Cp>\u003Ca href=\"https:\u002F\u002Fwphtaccess.com\u002F\" rel=\"nofollow ugc\">WP Htaccess Editor\u003C\u002Fa> provides a \u003Cstrong>simple, safe & fast way\u003C\u002Fstrong> to edit, fix & test the site’s htaccess file from WP admin. Before saving, htaccess file can be tested for syntax errors. It also automatically creates a htaccess backup every time you make a change to the htaccess file. Htaccess backups can be restored directly from the plugin, or via FTP if the errors in htaccess file prevents WP from running normally. Great for fixing htaccess errors. For all questions, including support please use the official \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fwp-htaccess-editor\" rel=\"ugc\">forum\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Access WP Htaccess Editor via WP Admin – Settings menu.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>If you’re having problems with SSL or HTTPS try our free \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-force-ssl\u002F\" rel=\"ugc\">WP Force SSL\u003C\u002Fa> plugin. It’s the easiest way to enable SSL and fix SSL problems.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Ch4>Testing Htaccess Syntax\u003C\u002Fh4>\n\u003Cp>Use the “test before saving” button to test htaccess file syntax before saving. Please note that this test does not check the logic of your htaccess file, ie if the redirects work as intended. It only checks for syntax errors. If you need to fix htaccess file we suggest restoring it to the default version and then add custom code line by line.\u003C\u002Fp>\n\u003Ch4>Automatic Htaccess Backups\u003C\u002Fh4>\n\u003Cp>Htaccess Editor makes automatic backups of htaccess file every time you make a change to it. Backups are located in \u003Ccode>\u002Fwp-content\u002Fhtaccess-editor-backups\u002F\u003C\u002Fcode> and timestamped so you can easily find the latest htaccess backup and restore it.\u003C\u002Fp>\n\u003Ch4>WordPress Network (WPMU) Support\u003C\u002Fh4>\n\u003Cp>WP Htaccess Editor is fully compatible and tested with WP Network (WPMU). It shows up under the Settings menu in network admin. It’s not available in individual sites as there is only one htaccess file per network.\u003C\u002Fp>\n\u003Cp>The plugin was originally developed by \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002Flukenzi\" rel=\"nofollow ugc\">Lukenzi\u003C\u002Fa> in March of 2011.\u003C\u002Fp>\n\u003Ch4>GDPR compatibility\u003C\u002Fh4>\n\u003Cp>We are not lawyers. Please do not take any of the following as legal advice.\u003Cbr \u002F>\nWP Htaccess Editor does not track, collect or process any user data. Nothing is logged or pushed to any 3rd parties nor do we use any 3rd party services or CDNs. Based on that, we feel it’s GDPR compatible, but again, please, don’t take this as legal advice.\u003C\u002Fp>\n","A safe & simple htaccess file editor with automatic htaccess backups & htaccess file syntax testing.",40000,811818,102,"2025-12-03T19:33:00.000Z","4.0","5.2",[90,20,22,91,4],"file-editor","htaccess-file","https:\u002F\u002Fwphtaccess.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-htaccess-editor.1.73.zip",{"slug":95,"name":96,"version":97,"author":98,"author_profile":99,"description":100,"short_description":101,"active_installs":102,"downloaded":103,"rating":104,"num_ratings":105,"last_updated":106,"tested_up_to":16,"requires_at_least":17,"requires_php":107,"tags":108,"homepage":113,"download_link":114,"security_score":115,"vuln_count":64,"unpatched_count":27,"last_vuln_date":116,"fetched_at":29},"redirection","Redirection","5.7.5","John Godley","https:\u002F\u002Fprofiles.wordpress.org\u002Fjohnny5\u002F","\u003Cp>Redirection is the most popular redirect manager for WordPress. With it you can easily manage 301 redirections, keep track of 404 errors, and generally tidy up any loose ends your site may have. This can help reduce errors and improve your site ranking.\u003C\u002Fp>\n\u003Cp>Redirection is designed to be used on sites with a few redirects to sites with thousands of redirects.\u003C\u002Fp>\n\u003Cp>It has been a WordPress plugin for over 10 years and has been recommended countless times. And it’s free!\u003C\u002Fp>\n\u003Cp>Full documentation can be found at \u003Ca href=\"https:\u002F\u002Fredirection.me\" rel=\"nofollow ugc\">https:\u002F\u002Fredirection.me\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Redirection is compatible with PHP from 7.4 to 8.4.\u003C\u002Fp>\n\u003Ch4>Redirect manager\u003C\u002Fh4>\n\u003Cp>Create and manage redirects quickly and easily without needing Apache or Nginx knowledge. If your WordPress supports permalinks then you can use Redirection to redirect any URL.\u003C\u002Fp>\n\u003Cp>There is full support for regular expressions so you can create redirect patterns to match any number of URLs. You can match query parameters and even pass them through to the target URL.\u003C\u002Fp>\n\u003Cp>The plugin can also be configured to monitor when post or page permalinks are changed and automatically create a redirect to the new URL.\u003C\u002Fp>\n\u003Ch4>Conditional redirects\u003C\u002Fh4>\n\u003Cp>In addition to straightforward URL matching you can redirect based on other conditions:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Login status – redirect only if the user is logged in or logged out\u003C\u002Fli>\n\u003Cli>WordPress capability – redirect if the user is able to perform a certain capability\u003C\u002Fli>\n\u003Cli>Browser – redirect if the user is using a certain browser\u003C\u002Fli>\n\u003Cli>Referrer – redirect if the user visited the link from another page\u003C\u002Fli>\n\u003Cli>Cookies – redirect if a particular cookie is set\u003C\u002Fli>\n\u003Cli>HTTP headers – redirect based on a HTTP header\u003C\u002Fli>\n\u003Cli>Custom filter – redirect based on your own WordPress filter\u003C\u002Fli>\n\u003Cli>IP address – redirect if the client IP address matches\u003C\u002Fli>\n\u003Cli>Server – redirect another domain if also hosted on this server\u003C\u002Fli>\n\u003Cli>Page type – redirect if the current page is a 404\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Full logging\u003C\u002Fh4>\n\u003Cp>A configurable logging option allows to view all redirects occurring on your site, including information about the visitor, the browser used, and the referrer. A ‘hit’ count is maintained for each redirect so you can see if a URL is being used.\u003C\u002Fp>\n\u003Cp>Logs can be exported for external viewing, and can be searched and filtered for more detailed investigation.\u003C\u002Fp>\n\u003Cp>Display geographic information about an IP address, as well as a full user agent information, to try and understand who the visitor is.\u003C\u002Fp>\n\u003Cp>You are able to disable or reduce IP collection to meet the legal requirements of your geographic region, and can change the amount of information captured from the bare minimum to HTTP headers.\u003C\u002Fp>\n\u003Cp>You can also log any redirect happening on your site, including those performed outside of Redirection.\u003C\u002Fp>\n\u003Ch4>Add HTTP headers\u003C\u002Fh4>\n\u003Cp>HTTP headers can be added to redirects or your entire site that help reduce the impact of redirects or help increase security. You can also add your own custom headers.\u003C\u002Fp>\n\u003Ch4>Track 404 errors\u003C\u002Fh4>\n\u003Cp>Redirection will keep track of all 404 errors that occur on your site, allowing you to track down and fix problems.\u003C\u002Fp>\n\u003Cp>Errors can be grouped to show where you should focus your attention, and can be redirected in bulk.\u003C\u002Fp>\n\u003Ch4>Query parameter handling\u003C\u002Fh4>\n\u003Cp>You can match query parameters exactly, ignore them, and even pass them through to your target.\u003C\u002Fp>\n\u003Ch4>Migrate Permalinks\u003C\u002Fh4>\n\u003Cp>Changed your permalink structure? You can migrate old permalinks simply by entering the old permalink structure. Multiple migrations are supported.\u003C\u002Fp>\n\u003Ch4>Apache & Nginx support\u003C\u002Fh4>\n\u003Cp>By default Redirection will manage all redirects using WordPress. However you can configure it so redirects are automatically saved to a .htaccess file and handled by Apache itself.\u003C\u002Fp>\n\u003Cp>If you use Nginx then you can export redirects to an Nginx rewrite rules file.\u003C\u002Fp>\n\u003Ch4>Fine-grained permissions\u003C\u002Fh4>\n\u003Cp>Fine-grained permissions are available so you can customise the plugin for different users. This makes it particularly suitable for client sites where you may want to prevent certain actions, and remove functionality.\u003C\u002Fp>\n\u003Ch4>Import & Export\u003C\u002Fh4>\n\u003Cp>The plugin has a fully-featured import and export system and you can:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Import and export to Apache .htaccess\u003C\u002Fli>\n\u003Cli>Export to Nginx rewrite rules\u003C\u002Fli>\n\u003Cli>Copy redirects between sites using JSON\u003C\u002Fli>\n\u003Cli>Import and export to CSV for viewing in a spreadsheet\u003C\u002Fli>\n\u003Cli>Use WP CLI to automate import and export\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>You can also import from the following plugins:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Simple 301 Redirects\u003C\u002Fli>\n\u003Cli>SEO Redirection\u003C\u002Fli>\n\u003Cli>Safe Redirect Manager\u003C\u002Fli>\n\u003Cli>Rank Math\u003C\u002Fli>\n\u003Cli>WordPress old slug redirects\u003C\u002Fli>\n\u003Cli>Quick Post\u002FPages redirects\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Search Regex compatible\u003C\u002Fh4>\n\u003Cp>Redirection is compatible with \u003Ca href=\"https:\u002F\u002Fsearchregex.com\" rel=\"nofollow ugc\">Search Regex\u003C\u002Fa>, allowing you to bulk update your redirects.\u003C\u002Fp>\n\u003Ch4>Wait, it’s free?\u003C\u002Fh4>\n\u003Cp>Yes, it’s really free. There’s no premium version and no need to pay money to get access to features. This is a dedicated redirect management plugin.\u003C\u002Fp>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cp>Please submit bugs, patches, and feature requests to:\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fjohngodley\u002Fredirection\" rel=\"nofollow ugc\">https:\u002F\u002Fgithub.com\u002Fjohngodley\u002Fredirection\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Please submit translations to:\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Ftranslate.wordpress.org\u002Fprojects\u002Fwp-plugins\u002Fredirection\" rel=\"nofollow ugc\">https:\u002F\u002Ftranslate.wordpress.org\u002Fprojects\u002Fwp-plugins\u002Fredirection\u003C\u002Fa>\u003C\u002Fp>\n","Manage 301 redirects, track 404 errors, and improve your site. No knowledge of Apache or Nginx required.",2000000,71778834,88,693,"2026-03-01T07:42:00.000Z","7.4",[109,110,111,20,112],"301","404","apache","redirect","https:\u002F\u002Fredirection.me\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fredirection.5.7.5.zip",97,"2018-11-14 00:00:00",{"slug":118,"name":119,"version":120,"author":121,"author_profile":122,"description":123,"short_description":124,"active_installs":125,"downloaded":126,"rating":127,"num_ratings":64,"last_updated":128,"tested_up_to":129,"requires_at_least":87,"requires_php":18,"tags":130,"homepage":18,"download_link":134,"security_score":135,"vuln_count":27,"unpatched_count":27,"last_vuln_date":37,"fetched_at":29},"spiderblocker","Spider Blocker","1.3.7","Niteo","https:\u002F\u002Fprofiles.wordpress.org\u002Fniteoweb\u002F","\u003Cp>Spider Blocker blocks most common bots that consume bandwidth and slow down your blog.\u003Cbr \u002F>\nIt accomplishes this by using .htaccess file to minimize impact on your website. It’s hidden from external scanners.\u003C\u002Fp>\n\u003Cp>Spider Blocker is specifically designed for Apache servers with mod_rewrite enabled, allowing you to effortlessly safeguard your website from the most prevalent bots that hamper performance and drain resources.\u003C\u002Fp>\n\u003Ch4>Plugin Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Block Unlimited bots from viewing your site\u003C\u002Fli>\n\u003Cli>Easy Export\u002FImport rules (comes with most common list of bots)\u003C\u002Fli>\n\u003Cli>Zero Footprint\u003C\u002Fli>\n\u003C\u002Ful>\n","SpiderBlocker will block most common bots that consume bandwidth and slow down your blog.",20000,613211,80,"2024-05-07T13:39:00.000Z","6.5.8",[111,131,132,20,133],"block","bots","seo","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fspiderblocker.1.3.7.zip",85,{"slug":137,"name":138,"version":139,"author":140,"author_profile":141,"description":142,"short_description":143,"active_installs":11,"downloaded":144,"rating":104,"num_ratings":145,"last_updated":146,"tested_up_to":147,"requires_at_least":148,"requires_php":149,"tags":150,"homepage":154,"download_link":155,"security_score":13,"vuln_count":27,"unpatched_count":27,"last_vuln_date":37,"fetched_at":29},"custom-php-settings","Custom PHP Settings","2.4.1","cyclonecode","https:\u002F\u002Fprofiles.wordpress.org\u002Fcyclonecode\u002F","\u003Cp>This plugin can be used to customize php settings for you WordPress installation.\u003C\u002Fp>\n\u003Cp>The plugin will modify either the \u003Cstrong>.htaccess\u003C\u002Fstrong> file or \u003Cstrong>.user.ini\u003C\u002Fstrong> file in order to change the current php settings directly from within the settings page.\u003C\u002Fp>\n\u003Cp>Since the configuration file needs to be modified this file \u003Cstrong>must\u003C\u002Fstrong> be writable for this plugin to work as expected.\u003C\u002Fp>\n\u003Ch4>Apache module\u003C\u002Fh4>\n\u003Cp>When PHP is running as an Apache module the \u003Cstrong>.htaccess\u003C\u002Fstrong> file will be used to set customized settings; make sure so that this file \u003Cstrong>exists\u003C\u002Fstrong> and is \u003Cstrong>writable\u003C\u002Fstrong> by the webserver.\u003C\u002Fp>\n\u003Ch4>CGI\u002FFast-CGI\u003C\u002Fh4>\n\u003Cp>If instead PHP is running in CGI\u002FFast-CGI mode then a custom INI file will be used. The name of this file depends on the value of \u003Cstrong>user_ini.filename\u003C\u002Fstrong> in the php configuration, by default it is \u003Cstrong>.user.ini\u003C\u002Fstrong>.\u003Cbr \u002F>\nYou can check the name of you custom INI file in the \u003Cstrong>PHP Information\u003C\u002Fstrong> table. The custom INI file should be placed under the root folder and \u003Cstrong>most\u003C\u002Fstrong> be \u003Cstrong>writable\u003C\u002Fstrong> by the webserver.\u003C\u002Fp>\n\u003Cp>Notice that there is also a \u003Cstrong>User INI file cache TTL\u003C\u002Fstrong> value in the information table, this value tells how long the custom INI file will be cached before it gets reloaded.\u003Cbr \u002F>\nFor instance, if this value is set to 300 then any changes to your custom INI file will not be reflected for up to 5 minutes. The name for this setting in the php configuration is \u003Cstrong>user_ini.cache_ttl\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>One important thing is to make sure that your \u003Ccode>.user.ini\u003C\u002Fcode> file is blocked by your webserver. If you are running NGINX this can be done by adding:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>location ~ \u002F\\.user\\.ini {\n  deny all;\n}\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cp>to your server configuration. The same thing using Apache is done by adding the following to the configuration if not already done:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>\u003CFiles .user.ini>\norder allow,deny\ndeny from all\n\u003C\u002FFiles>\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch4>Available Settings\u003C\u002Fh4>\n\u003Cp>The settings table will display all non-system php settings that can be customized by the plugin. All modified settings will be displayed in red in this table.\u003C\u002Fp>\n\u003Cp>Some settings might be displayed in red because they are changed somewhere else, perhaps through a customized php.ini file, by WordPress itself, a plugin or in some other way.\u003Cbr \u002F>\nFor instance if you have enabled \u003Cstrong>WP_DEBUG\u003C\u002Fstrong> in your \u003Cstrong>wp-config.php\u003C\u002Fstrong> file the \u003Cstrong>error_reporting\u003C\u002Fstrong> setting will turn red.\u003C\u002Fp>\n\u003Cp>If you have questions or perhaps some idea on things that should be added you can also try \u003Ca href=\"https:\u002F\u002Fjoin.slack.com\u002Ft\u002Fcyclonecode\u002Fshared_invite\u002Fzt-6bdtbdab-n9QaMLM~exHP19zFDPN~AQ\" rel=\"nofollow ugc\">slack\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>Multiple Configurations\u003C\u002Fh4>\n\u003Cp>The premium version adds support for creating multiple named configurations which all can hold their own custom PHP settings.\u003Cbr \u002F>\nYou will then be able to easily switch between the different configurations entries applying them to you configuration file.\u003C\u002Fp>\n\u003Ch4>Environment Variables\u003C\u002Fh4>\n\u003Cp>In the premium version, when running PHP as an apache module and using an \u003Cstrong>.htaccess\u003C\u002Fstrong> file for configuration, you are able\u003Cbr \u002F>\nto add custom environment variables. These will be accessible by using the super global \u003Cstrong>$_SERVER\u003C\u002Fstrong> array.\u003Cbr \u002F>\nIn order for this to work you will need to have the mod_env module enabled in your apache setup.\u003C\u002Fp>\n\u003Ch4>Resources\u003C\u002Fh4>\n\u003Cp>A complete list of settings that can be modified can be found here: \u003Ca href=\"http:\u002F\u002Fphp.net\u002Fmanual\u002Fen\u002Fini.list.php\" rel=\"nofollow ugc\">List of php.ini directives\u003C\u002Fa>\u003Cbr \u002F>\nNotice that directives marked as \u003Ccode>PHP_INI_SYSTEM\u003C\u002Fcode> can not be modified.\u003C\u002Fp>\n\u003Ch3>Warning\u003C\u002Fh3>\n\u003Cp>Make sure you know how a value should be configured and what different settings do before changing anything.\u003Cbr \u002F>\nThis is important since some settings might render your page inaccessible, depending on what value you are using.\u003Cbr \u002F>\nA good example of this is the \u003Cstrong>variables_order\u003C\u002Fstrong> configuration:\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>Sets the order of the EGPCS (Environment, Get, Post, Cookie, and Server) variable parsing. For example, if variables_order is set to “SP” then PHP will create the superglobals $_SERVER and $_POST, but not create $_ENV, $_GET, and $_COOKIE. Setting to “” means no superglobals will be set.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cp>If this value would be configured to \u003Cstrong>EPCS\u003C\u002Fstrong> then no \u003Cstrong>$_GET\u003C\u002Fstrong> superglobal would be set which would make your page inaccessible.\u003C\u002Fp>\n\u003Cp>Another example is setting the \u003Cstrong>post_max_size\u003C\u002Fstrong> to a very low value so that no form data is sent to the server, which in turn would result in that form data is never saved.\u003C\u002Fp>\n\u003Cp>If you by mistake changed some value and your site is now inaccessible you could simply manually remove everything from between the plugin markers in your \u003Cstrong>.htaccess\u003C\u002Fstrong> file:\u003C\u002Fp>\n\u003Cpre>\u003Ccode># BEGIN CUSTOM PHP SETTINGS PRO\nphp_value variables_order EPCS  \u003C-- Remove\n# END CUSTOM PHP SETTINGS PRO\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cp>If you are running PHP in CGI\u002FFast-CGI mode then instead remove everything between the plugins markers in your \u003Cstrong>.user.ini\u003C\u002Fstrong> file:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>; BEGIN CUSTOM PHP SETTINGS\nphp_value variables_order EPCS  \u003C-- Remove\n; END CUSTOM PHP SETTINGS\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cp>If you run into any trouble, don’t hesitate to add a new topic under the support section:\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fcustom-php-settings\u002F\" rel=\"ugc\">https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fcustom-php-settings\u002F\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>You can also try contacting me on \u003Ca href=\"https:\u002F\u002Fjoin.slack.com\u002Ft\u002Fcyclonecode\u002Fshared_invite\u002Fzt-6bdtbdab-n9QaMLM~exHP19zFDPN~AQ\" rel=\"nofollow ugc\">slack\u003C\u002Fa>.\u003C\u002Fp>\n","This plugin makes it possible to override php settings.",409351,15,"2025-11-20T20:06:00.000Z","6.8.5","4.1.0","5.6",[111,151,20,152,153],"apache2","php","settings","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fcustom-php-settings\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcustom-php-settings.2.4.1.zip",{"slug":157,"name":158,"version":159,"author":160,"author_profile":161,"description":162,"short_description":163,"active_installs":164,"downloaded":165,"rating":166,"num_ratings":64,"last_updated":167,"tested_up_to":147,"requires_at_least":168,"requires_php":169,"tags":170,"homepage":173,"download_link":174,"security_score":175,"vuln_count":14,"unpatched_count":27,"last_vuln_date":176,"fetched_at":29},"phpinfo-wp","phpinfo() WP","6.1","Exeebit","https:\u002F\u002Fprofiles.wordpress.org\u002Fexeebit\u002F","\u003Cp>A simple wordpress plugin to look up information about server and PHP’s configuration and manage server configurations.\u003C\u002Fp>\n\u003Cp>This plugin gives a large amount of information about the current state of PHP. This includes information about PHP compilation options and extensions, the PHP version, server information and environment (if compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options, HTTP headers. For making information concise, PHP license has been removed.\u003C\u002Fp>\n\u003Cp>You can see what extensions are enabled in your server through this plugin. Except these, you can edit or set Server configuration values like max_file_uploads, upload_max_filesize, etc. You can edit or set any directive values through this plugin easily.\u003C\u002Fp>\n\u003Ch3>Updates\u003C\u002Fh3>\n\u003Cp>Added an option to look up some basic information like root directory size, a number of activated and installed plugin, media directory size etc.\u003C\u002Fp>\n","A simple plugin to look up server info and manage server configuration of wordpress site",3000,43985,84,"2025-05-03T17:53:00.000Z","4.7","5.0",[111,20,171,172],"phpinfo","server-info","http:\u002F\u002Fexeebit.com\u002Fwordpress-plugins\u002Fphpinfo-wp","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fphpinfo-wp.zip",91,"2024-06-19 00:00:00",{"attackSurface":178,"codeSignals":214,"taintFlows":282,"riskAssessment":283,"analyzedAt":292},{"hooks":179,"ajaxHandlers":210,"restRoutes":211,"shortcodes":212,"cronEvents":213,"entryPointCount":27,"unprotectedCount":27},[180,186,190,193,197,200,204,207],{"type":181,"name":182,"callback":183,"file":184,"line":185},"action","htaccess_file_editor_restore_backup","restore_backup","includes\\class-htaccess-file-editor-actions.php",6,{"type":181,"name":187,"callback":188,"file":184,"line":189},"htaccess_file_editor_create_backup","create_backup",7,{"type":181,"name":191,"callback":192,"file":184,"line":47},"htaccess_file_editor_delete_backup","delete_backup",{"type":181,"name":194,"callback":195,"file":184,"line":196},"htaccess_file_editor_backup_form","backup_form",9,{"type":181,"name":198,"callback":198,"file":199,"line":189},"admin_menu","includes\\class-htaccess-file-editor-hooks.php",{"type":181,"name":201,"callback":202,"priority":203,"file":199,"line":47},"admin_enqueue_scripts","scripts",10,{"type":181,"name":205,"callback":206,"file":199,"line":196},"admin_init","migrate_backup_name",{"type":181,"name":208,"callback":208,"priority":27,"file":209,"line":70},"init","includes\\class-htaccess-file-editor.php",[],[],[],[],{"dangerousFunctions":215,"sqlUsage":216,"outputEscaping":218,"fileOperations":27,"externalRequests":27,"nonceChecks":185,"capabilityChecks":262,"bundledLibraries":281},[],{"prepared":27,"raw":27,"locations":217},[],{"escaped":219,"rawEcho":220,"locations":221},25,30,[222,226,228,230,232,234,236,238,240,242,244,246,248,250,252,254,255,257,259,261,263,265,267,268,270,273,274,276,278,280],{"file":223,"line":224,"context":225},"templates\\backup-form.php",32,"raw output",{"file":227,"line":185,"context":225},"templates\\dashboard.php",{"file":227,"line":229,"context":225},24,{"file":227,"line":231,"context":225},38,{"file":227,"line":233,"context":225},46,{"file":227,"line":235,"context":225},47,{"file":227,"line":237,"context":225},50,{"file":227,"line":239,"context":225},51,{"file":227,"line":241,"context":225},57,{"file":227,"line":243,"context":225},58,{"file":227,"line":245,"context":225},60,{"file":227,"line":247,"context":225},61,{"file":227,"line":249,"context":225},66,{"file":227,"line":251,"context":225},68,{"file":227,"line":253,"context":225},93,{"file":227,"line":13,"context":225},{"file":227,"line":256,"context":225},109,{"file":227,"line":258,"context":225},128,{"file":260,"line":14,"context":225},"templates\\notices\\backup-failed.php",{"file":260,"line":262,"context":225},3,{"file":264,"line":14,"context":225},"templates\\notices\\backup-success.php",{"file":266,"line":14,"context":225},"templates\\notices\\delete-failed.php",{"file":266,"line":262,"context":225},{"file":269,"line":14,"context":225},"templates\\notices\\delete-success.php",{"file":271,"line":272,"context":225},"templates\\notices\\restore-failed.php",4,{"file":271,"line":203,"context":225},{"file":271,"line":275,"context":225},12,{"file":271,"line":277,"context":225},13,{"file":279,"line":14,"context":225},"templates\\notices\\restore-success.php",{"file":279,"line":262,"context":225},[],[],{"summary":284,"deductions":285},"The \"htaccess-file-editor\" plugin exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed. The plugin also demonstrates good practices in its use of prepared statements for all SQL queries and includes nonce and capability checks in its code.  However, a significant concern arises from the output escaping, where only 45% of outputs are properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities, especially if user-supplied data is involved in these unescaped outputs.\n\nThe vulnerability history for this plugin is particularly concerning. With a total of two known CVEs, both categorized as medium severity and related to 'Exposure of Sensitive Information to an Unauthorized Actor' and 'Missing Authorization,' it suggests a recurring pattern of security flaws in how the plugin handles access control and data protection. The fact that the last vulnerability was dated 2025-01-14 and is currently marked as unpatched (as per typical interpretation of 'currently unpatched: 0' meaning 0 *new* unpatched vulnerabilities, but previous ones may still exist) warrants significant caution. While the static analysis shows no critical taint flows or dangerous functions, the historical data strongly suggests that underlying authorization and data handling issues may not be fully mitigated by the current codebase, despite the presence of some security checks.\n\nIn conclusion, while the plugin has a minimal direct attack surface and uses prepared statements, the significant percentage of unescaped output and the history of medium-severity vulnerabilities related to authorization and data exposure present notable risks. The lack of currently identified unpatched CVEs is positive, but the historical context demands vigilance. Users should be aware of the potential for XSS and authorization bypass if the unescaped outputs are exploited or if historical vulnerabilities remain latent in the code.",[286,288,290],{"reason":287,"points":189},"Significant percentage of unescaped output",{"reason":289,"points":203},"History of 2 medium severity CVEs",{"reason":291,"points":64},"Vulnerabilities related to authorization\u002Fdata exposure","2026-03-16T17:39:03.729Z",{"wat":294,"direct":304},{"assetPaths":295,"generatorPatterns":299,"scriptPaths":300,"versionParams":301},[296,297,298],"\u002Fwp-content\u002Fplugins\u002Fhtaccess-file-editor\u002Fassets\u002Fimages\u002Ficon.png","\u002Fwp-content\u002Fplugins\u002Fhtaccess-file-editor\u002Fassets\u002Fcss\u002Fadmin.css","\u002Fwp-content\u002Fplugins\u002Fhtaccess-file-editor\u002Fassets\u002Fjs\u002Fhtaccess-file-editor.js",[],[298],[302,303],"htaccess-file-editor\u002Fassets\u002Fcss\u002Fadmin.css?ver=","htaccess-file-editor\u002Fassets\u002Fjs\u002Fhtaccess-file-editor.js?ver=",{"cssClasses":305,"htmlComments":307,"htmlAttributes":308,"restEndpoints":309,"jsGlobals":310,"shortcodeOutput":312},[306],"htaccess-file-editor-main-container",[],[],[],[311],"htaccess_file_editor_settings",[],{"error":314,"url":315,"statusCode":316,"statusMessage":317,"message":317},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fhtaccess-file-editor\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":319,"versions":320},21,[321,326,333,339,346,355,364,373,382,391,400,409,418,427,436,445,454,463,472,481,490],{"version":6,"download_url":25,"svn_tag_url":322,"released_at":37,"has_diff":49,"diff_files_changed":323,"diff_lines":37,"trac_diff_url":324,"vulnerabilities":325,"is_current":314},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.22\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.21&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.22",[],{"version":327,"download_url":328,"svn_tag_url":329,"released_at":37,"has_diff":49,"diff_files_changed":330,"diff_lines":37,"trac_diff_url":331,"vulnerabilities":332,"is_current":49},"1.0.21","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.21.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.21\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.20&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.21",[],{"version":39,"download_url":334,"svn_tag_url":335,"released_at":37,"has_diff":49,"diff_files_changed":336,"diff_lines":37,"trac_diff_url":337,"vulnerabilities":338,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.20.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.20\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.19&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.20",[],{"version":56,"download_url":340,"svn_tag_url":341,"released_at":37,"has_diff":49,"diff_files_changed":342,"diff_lines":37,"trac_diff_url":343,"vulnerabilities":344,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.19.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.19\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.18&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.19",[345],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":347,"download_url":348,"svn_tag_url":349,"released_at":37,"has_diff":49,"diff_files_changed":350,"diff_lines":37,"trac_diff_url":351,"vulnerabilities":352,"is_current":49},"1.0.18","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.18.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.18\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.17&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.18",[353,354],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":356,"download_url":357,"svn_tag_url":358,"released_at":37,"has_diff":49,"diff_files_changed":359,"diff_lines":37,"trac_diff_url":360,"vulnerabilities":361,"is_current":49},"1.0.17","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.17.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.17\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.16&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.17",[362,363],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":365,"download_url":366,"svn_tag_url":367,"released_at":37,"has_diff":49,"diff_files_changed":368,"diff_lines":37,"trac_diff_url":369,"vulnerabilities":370,"is_current":49},"1.0.16","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.16.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.16\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.15&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.16",[371,372],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":374,"download_url":375,"svn_tag_url":376,"released_at":37,"has_diff":49,"diff_files_changed":377,"diff_lines":37,"trac_diff_url":378,"vulnerabilities":379,"is_current":49},"1.0.15","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.15.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.15\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.14&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.15",[380,381],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":383,"download_url":384,"svn_tag_url":385,"released_at":37,"has_diff":49,"diff_files_changed":386,"diff_lines":37,"trac_diff_url":387,"vulnerabilities":388,"is_current":49},"1.0.14","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.14.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.14\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.13&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.14",[389,390],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":392,"download_url":393,"svn_tag_url":394,"released_at":37,"has_diff":49,"diff_files_changed":395,"diff_lines":37,"trac_diff_url":396,"vulnerabilities":397,"is_current":49},"1.0.13","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.13.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.13\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.12&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.13",[398,399],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":401,"download_url":402,"svn_tag_url":403,"released_at":37,"has_diff":49,"diff_files_changed":404,"diff_lines":37,"trac_diff_url":405,"vulnerabilities":406,"is_current":49},"1.0.12","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.12.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.12\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.11&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.12",[407,408],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":410,"download_url":411,"svn_tag_url":412,"released_at":37,"has_diff":49,"diff_files_changed":413,"diff_lines":37,"trac_diff_url":414,"vulnerabilities":415,"is_current":49},"1.0.11","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.11.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.11\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.10&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.11",[416,417],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":419,"download_url":420,"svn_tag_url":421,"released_at":37,"has_diff":49,"diff_files_changed":422,"diff_lines":37,"trac_diff_url":423,"vulnerabilities":424,"is_current":49},"1.0.10","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.10.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.10\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.9&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.10",[425,426],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":428,"download_url":429,"svn_tag_url":430,"released_at":37,"has_diff":49,"diff_files_changed":431,"diff_lines":37,"trac_diff_url":432,"vulnerabilities":433,"is_current":49},"1.0.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.8&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.9",[434,435],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":437,"download_url":438,"svn_tag_url":439,"released_at":37,"has_diff":49,"diff_files_changed":440,"diff_lines":37,"trac_diff_url":441,"vulnerabilities":442,"is_current":49},"1.0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.7&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.8",[443,444],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":446,"download_url":447,"svn_tag_url":448,"released_at":37,"has_diff":49,"diff_files_changed":449,"diff_lines":37,"trac_diff_url":450,"vulnerabilities":451,"is_current":49},"1.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.6&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.7",[452,453],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":455,"download_url":456,"svn_tag_url":457,"released_at":37,"has_diff":49,"diff_files_changed":458,"diff_lines":37,"trac_diff_url":459,"vulnerabilities":460,"is_current":49},"1.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.5&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.6",[461,462],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":464,"download_url":465,"svn_tag_url":466,"released_at":37,"has_diff":49,"diff_files_changed":467,"diff_lines":37,"trac_diff_url":468,"vulnerabilities":469,"is_current":49},"1.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.4&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.5",[470,471],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":473,"download_url":474,"svn_tag_url":475,"released_at":37,"has_diff":49,"diff_files_changed":476,"diff_lines":37,"trac_diff_url":477,"vulnerabilities":478,"is_current":49},"1.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.3&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.4",[479,480],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":482,"download_url":483,"svn_tag_url":484,"released_at":37,"has_diff":49,"diff_files_changed":485,"diff_lines":37,"trac_diff_url":486,"vulnerabilities":487,"is_current":49},"1.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.2&new_path=%2Fhtaccess-file-editor%2Ftags%2F1.0.3",[488,489],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56},{"version":491,"download_url":492,"svn_tag_url":493,"released_at":37,"has_diff":49,"diff_files_changed":494,"diff_lines":37,"trac_diff_url":37,"vulnerabilities":495,"is_current":49},"1.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhtaccess-file-editor.1.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhtaccess-file-editor\u002Ftags\u002F1.0.2\u002F",[],[496,497],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"id":51,"url_slug":52,"title":53,"severity":40,"cvss_score":57,"vuln_type":59,"patched_in_version":56}]