[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fm1hM_5xkUsI8ahn5mZrDjNLaSn_L_JFUONfXxcx9cP4":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":29,"last_vuln_date":30,"fetched_at":31,"vulnerabilities":32,"developer":91,"crawl_stats":38,"alternatives":98,"analysis":191,"fingerprints":343},"injection-guard","Injection Guard","1.3.0","Fahad Mahmood","https:\u002F\u002Fprofiles.wordpress.org\u002Ffahadmahmood\u002F","\u003Cp>\u003Cstrong>Author:\u003C\u002Fstrong> \u003Ca href=\"https:\u002F\u002Fwww.androidbubbles.com\u002Fcontact\" rel=\"nofollow ugc\">Fahad Mahmood\u003C\u002Fa>\u003Cbr \u002F>\n\u003Cstrong>Project URI:\u003C\u002Fstrong> \u003Ca href=\"https:\u002F\u002Fwww.androidbubbles.com\u002Fextends\u002Fwordpress\u002Fplugins\u002Finjection-guard\" rel=\"nofollow ugc\">https:\u002F\u002Fwww.androidbubbles.com\u002Fextends\u002Fwordpress\u002Fplugins\u002Finjection-guard\u003C\u002Fa>\u003Cbr \u002F>\n\u003Cstrong>License:\u003C\u002Fstrong> GPL v3\u003C\u002Fp>\n\u003Cp>Injection Guard is a WordPress plugin designed to block malicious query string attacks and suspicious URL parameters. It logs all incoming attempts, blocks harmful parameters, and adds extra security intelligence to your WordPress admin—like user session tracking and capability audit.\u003C\u002Fp>\n\u003Cp>The plugin uses the \u003Ccode>ig_\u003C\u002Fcode> prefix for database keys and functions, follows WordPress coding standards, and supports multiple languages. It’s compatible with pretty permalinks and helps in securing your site from automated bots and manual attacks.\u003C\u002Fp>\n\u003Ch3>Method A (Admin Panel)\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Login to WordPress Admin > Plugins > Add New > Upload Plugin\u003C\u002Fli>\n\u003Cli>Upload the ZIP file and activate the plugin\u003C\u002Fli>\n\u003Cli>Go to Settings > IG Settings and click “Save Settings”\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Method B (Manual Upload)\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Download and unzip the plugin package\u003C\u002Fli>\n\u003Cli>Upload the folder to \u003Ccode>\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002F\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>Activate the plugin from the WordPress Dashboard\u003C\u002Fli>\n\u003Cli>Visit Settings > IG Settings to configure\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Logs all unique query strings attempting to penetrate your website\u003C\u002Fli>\n\u003Cli>Blocks malicious or unknown query parameters\u003C\u002Fli>\n\u003Cli>Tracks login, logout, session start and duration per user\u003C\u002Fli>\n\u003Cli>Capability audit report for all WordPress users\u003C\u002Fli>\n\u003Cli>Multi-language support (FR, DE, ES)\u003C\u002Fli>\n\u003Cli>Bootstrap-based admin UI and dashboard\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is free software licensed under the GNU GPL v2 or later.\u003C\u002Fp>\n\u003Cp>You should have received a copy of the GNU General Public License along with this plugin. If not, see \u003Ca href=\"http:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-2.0.html\" rel=\"nofollow ugc\">http:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-2.0.html\u003C\u002Fa>.\u003C\u002Fp>\n","This plugin blocks all unauthorized and irrelevant requests through query strings and provides extended session tracking and capability audit.",1000,32926,100,4,"2026-03-14T21:13:00.000Z","6.9.4","3.0","7.0",[20,21,22,23,24],"anti-hacking","firewall","security","sql-injection","wordpress-security","https:\u002F\u002Fwww.androidbubbles.com\u002Fextends\u002Fwordpress\u002Fplugins\u002Finjection-guard","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Finjection-guard.1.3.0.zip",96,5,0,"2025-07-24 00:00:00","2026-03-15T15:16:48.613Z",[33,49,64,73,82],{"id":34,"url_slug":35,"title":36,"description":37,"plugin_slug":4,"theme_slug":38,"affected_versions":39,"patched_in_version":40,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":30,"updated_date":45,"references":46,"days_to_patch":48},"CVE-2025-8046","injection-guard-reflected-cross-site-scripting","Injection Guard \u003C= 1.2.7 - Reflected Cross-Site Scripting","The Injection Guard plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the $_SERVER['REQUEST_URI'] parameter in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",null,"\u003C=1.2.7","1.2.8","medium",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2025-08-25 15:39:15",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fbe0e9e67-efc1-4a21-ba32-4a963166350d?source=api-prod",33,{"id":50,"url_slug":51,"title":52,"description":53,"plugin_slug":4,"theme_slug":38,"affected_versions":54,"patched_in_version":55,"severity":41,"cvss_score":56,"cvss_vector":57,"vuln_type":58,"published_date":59,"updated_date":60,"references":61,"days_to_patch":63},"WF-4a5c4bef-f871-4e6b-9b6e-85079f1233a2-injection-guard","injection-guard-cross-site-request-forgery-via-igupdate","Injection Guard \u003C= 1.2.1 - Cross-Site Request Forgery via ig_update","The Injection Guard plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the ig_update functions in versions up to, and including, 1.2.1. This makes it possible for unauthenticated attackers to make changes to IP block- and allowlists via a forged request granted they can trick an admin into performing an action such as clicking on a link.","\u003C=1.2.1","1.2.2",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Cross-Site Request Forgery (CSRF)","2023-05-11 00:00:00","2024-01-22 19:56:02",[62],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F4a5c4bef-f871-4e6b-9b6e-85079f1233a2?source=api-prod",257,{"id":65,"url_slug":66,"title":67,"description":68,"plugin_slug":4,"theme_slug":38,"affected_versions":54,"patched_in_version":55,"severity":41,"cvss_score":56,"cvss_vector":69,"vuln_type":70,"published_date":59,"updated_date":60,"references":71,"days_to_patch":63},"CVE-2023-32574","injection-guard-missing-authorization-via-igupdate","Injection Guard \u003C= 1.2.1 - Missing Authorization via ig_update","The Injection Guard plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check on the ig_update and ig_update_bulk_backlist functions in versions up to, and including, 1.2.1. This makes it possible for authenticated attackers , with subscriber-level access and above, to make changes to IP block- and allowlists.","CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Missing Authorization",[72],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5c6a9cfc-0b30-456e-bac5-4ad79cd08dce?source=api-prod",{"id":74,"url_slug":75,"title":76,"description":77,"plugin_slug":4,"theme_slug":38,"affected_versions":54,"patched_in_version":55,"severity":41,"cvss_score":56,"cvss_vector":57,"vuln_type":58,"published_date":78,"updated_date":60,"references":79,"days_to_patch":81},"WF-1a6bc58f-9cf3-4d3f-a10e-0ccde0b890a3-injection-guard","injection-guard-cross-site-request-forgery-to-whitelist-update","Injection Guard \u003C= 1.2.1 - Cross-Site Request Forgery to Whitelist Update","The Injection Guard plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the ig_update function. This makes it possible for unauthenticated attackers to update the plugin's whitelist via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.","2023-05-10 00:00:00",[80],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F1a6bc58f-9cf3-4d3f-a10e-0ccde0b890a3?source=api-prod",258,{"id":83,"url_slug":84,"title":85,"description":86,"plugin_slug":4,"theme_slug":38,"affected_versions":54,"patched_in_version":55,"severity":41,"cvss_score":87,"cvss_vector":88,"vuln_type":70,"published_date":78,"updated_date":60,"references":89,"days_to_patch":81},"WF-a9c41797-b256-47de-a783-18df36dd2234-injection-guard","injection-guard-missing-authorization-to-whitelist-update","Injection Guard \u003C= 1.2.1 - Missing Authorization to Whitelist Update","The Injection Guard plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ig_update function in versions up to, and including, 1.2.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin's whitelist.",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N",[90],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa9c41797-b256-47de-a783-18df36dd2234?source=api-prod",{"slug":92,"display_name":7,"profile_url":8,"plugin_count":93,"total_installs":94,"avg_security_score":27,"avg_patch_time_days":95,"trust_score":96,"computed_at":97},"fahadmahmood",40,32660,237,76,"2026-04-04T04:19:57.253Z",[99,119,139,160,176],{"slug":100,"name":101,"version":102,"author":103,"author_profile":104,"description":105,"short_description":106,"active_installs":107,"downloaded":108,"rating":109,"num_ratings":110,"last_updated":111,"tested_up_to":16,"requires_at_least":112,"requires_php":18,"tags":113,"homepage":117,"download_link":118,"security_score":13,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"malcare-security","MalCare WordPress Security Plugin – Malware Scanner, Cleaner, Security Firewall","6.36","malcare","https:\u002F\u002Fprofiles.wordpress.org\u002Fmalcare\u002F","\u003Ch3>MALCARE SECURITY SERVICES\u003C\u002Fh3>\n\u003Cp>Security Plugin For WordPress Websites\u003Cbr \u002F>\n★★★★★\u003C\u002Fp>\n\u003Cp>A WordPress security plugin ensures that your website remains completely safe and secure, always. We created \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002F\" rel=\"nofollow ugc\">MalCare Security Plugin\u003C\u002Fa> to help website owners worry less about their site security, achieve peace of mind and focus all their energies on growing their business or website.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Why you need MalCare Security?\u003C\u002Fstrong>\u003Cbr \u002F>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002Fj3h0JF0we4o?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Difference Between MalCare Free vs Premium\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002F4ja5ix9WDCo?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Cp>\u003Cstrong>Why MalCare is best WordPress security plugin?\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002Fvt-0TrMV-TQ?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Cp>\u003Cstrong>MalCare in 1 Minute – Overview\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FH1XRntW_FeE?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003Cbr \u002F>\n\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Important Links: \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Ffeatures\u002F\" rel=\"nofollow ugc\">Security Features\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002F\" rel=\"nofollow ugc\">Why Choose MalCare?\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Ftop-wordpress-security-plugins-compared\u002F\" rel=\"nofollow ugc\">Comparisons\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fmalcare-free-premium\u002F\" rel=\"nofollow ugc\">Free vs Paid\u003C\u002Fa>\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>MalCare is the \u003Cstrong>fastest\u003C\u002Fstrong> malware detection and removal plugin loved by thousands of developers and agencies. With an industry-first \u003Cstrong>automatic one-click malware removal\u003C\u002Fstrong>, your WordPress website is clean before Google blacklists it or your web host takes it down. MalCare has been developed from the ground up after \u003Cstrong>analyzing over 240,000 websites over 2.5+ years\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>Its \u003Cstrong>intelligent scanning methodology\u003C\u002Fstrong> will \u003Cstrong>never slow down your WordPress site\u003C\u002Fstrong> and \u003Cstrong>accurately identifies\u003C\u002Fstrong> the most complex malware that typically goes undetected in other popular WordPress security plugins.\u003C\u002Fp>\n\u003Cp>The \u003Cstrong>one-click malware cleaner\u003C\u002Fstrong> offers unlimited automated cleanups while the inbuilt \u003Cstrong>powerful cloud-based firewall\u003C\u002Fstrong> ensures round-the-clock website protection against spam attacks. Moreover, you can \u003Cstrong>block countries\u003C\u002Fstrong> to mitigate hack attacks.\u003C\u002Fp>\n\u003Cp>MalCare comes integrated with a \u003Cstrong>complete website management\u003C\u002Fstrong> module that ensures better WP security and site management to your websites from a single dashboard.\u003C\u002Fp>\n\u003Cp>The WP security plugin \u003Cstrong>notifies you if the WordPress site goes down\u003C\u002Fstrong> so that you can handle the situation before you start losing visitors. Performance Check enables WordPress users to keep an eye on their \u003Cstrong>loading speed\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>MalCare offers a premium \u003Cstrong>White-Label\u003C\u002Fstrong> solution that lets agencies provide better website security to their clients without risking their business. And enables users to \u003Cstrong>generate beautiful reports\u003C\u002Fstrong> for their clients.\u003C\u002Fp>\n\u003Ch3>Why Choose MalCare WordPress Security Plugin?\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Ch4>WordPress Malware Scanner\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Cloud Based Deep malware scanner\u003C\u002Fli>\n\u003Cli>Doesn’t Slow down your WordPress site\u003C\u002Fli>\n\u003Cli>Detects malware BEFORE it’s too late\u003C\u002Fli>\n\u003Cli>NO impact on your website\u003C\u002Fli>\n\u003Cli>Finds ALL types of malware, even new & complex ones\u003C\u002Fli>\n\u003Cli>Get Alerts about Security Risks with our WordPress Vulnerability Scanner\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>WordPress Malware Removal\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>View hacked file details\u003C\u002Fli>\n\u003Cli>Cleans your site INSTANTLY, in less than 60 Secs\u003C\u002Fli>\n\u003Cli>Removes ALL traces of malware\u003C\u002Fli>\n\u003Cli>UNLIMITED hack cleanups\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>WordPress Website Protection\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Blocks hacker BOTS from attacking login page\u003C\u002Fli>\n\u003Cli>Identifies & blocks MALICIOUS traffic\u003C\u002Fli>\n\u003Cli>Enables users to HARDEN their WordPress sites\u003C\u002Fli>\n\u003Cli>Enables users to block ENTIRE countries\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Easy to Use\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Set up an account in 60 secs\u003C\u002Fli>\n\u003Cli>Configure security once & never look at it again\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Agile & responsive customer support\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Why Is MalCare Such a Game-Changer?\u003C\u002Fh3>\n\u003Cp>MalCare offers unparalleled security services. Some services are free and others are paid.\u003C\u002Fp>\n\u003Ch4>MalCare’s FREE Services –\u003C\u002Fh4>\n\u003Col>\n\u003Cli>\n\u003Ch4>Cloud-Based Malware Scanning (Free)\u003C\u002Fh4>\n\u003Cp>MalCare’s Cloud-based Scanning ensures no impact on your website ever. Moreover, it detects Complex Malware missed by other popular security plugins for WordPress.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Web-Application WordPress Firewall (Free)\u003C\u002Fh4>\n\u003Cp>Get Real-Time Protection for your WordPress website against the latest security threats with MalCare’s Smart Firewall. Block hackers & bots before they harm your site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>CAPTCHA-Based Login Page Protection (Free)\u003C\u002Fh4>\n\u003Cp>Automatically prevent brute force attacks with MalCare’s Smart Captcha-Based Login Page Protection. Round-the-clock protection against malicious traffic.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>MalCare’s PAID Services –\u003C\u002Fh4>\n\u003Col>\n\u003Cli>\n\u003Ch4>Viewing Hacked Files (Paid)\u003C\u002Fh4>\n\u003Cp>View the infected files present on your WordPress website. Learn which themes or plugins or files or folders were infected by hackers.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Industry-First Instant Malware Removal (Paid)\u003C\u002Fh4>\n\u003Cp>Clean your hacked site instantly in less than 60 secs with MalCare’s 1-Click Cleaner. Clean your website before Google blacklists it or your web host takes it down.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>WordPress Recommended Website Hardening (Paid)\u003C\u002Fh4>\n\u003Cp>Easily configure WordPress recommended best security practices with just 1-Click from right within MalCare’s dashboard. No technical knowledge needed.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Geo-blocking (Paid)\u003C\u002Fh4>\n\u003Cp>Restrict access to users based on their geographical location. Easily block all visitors from certain countries to mitigate the risk of being hacked.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Uptime Monitoring (Paid)\u003C\u002Fh4>\n\u003Cp>With MalCare’s Uptime Monitoring keep a steady eye on your WordPress site. It ensures that you are not oblivious to website downtime.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Common Hack Attacks Prevented By MalCare\u003C\u002Fh3>\n\u003Cp>MalCare protects websites against all common hack attacks which includes:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-brute-force\u002F\" rel=\"nofollow ugc\">Brute force attacks\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fjapanese-keyword-hack\u002F\" rel=\"nofollow ugc\">Japanese keyword hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-hacked-redirect\u002F\" rel=\"nofollow ugc\">WordPress redirect hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwhat-is-pharma-hack-how-to-clean-it\u002F\" rel=\"nofollow ugc\">Pharma hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fseo-spam\u002F\" rel=\"nofollow ugc\">SEO spam hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-theme-hacked\u002F\" rel=\"nofollow ugc\">WordPress theme hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fspam-link-injection-wordpress\u002F\" rel=\"nofollow ugc\">WordPress spam link injections\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Frevslider-exploit\u002F\" rel=\"nofollow ugc\">Revslider hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-timthumb\u002F\" rel=\"nofollow ugc\">TimThumb hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fadminer-php-hack\u002F\" rel=\"nofollow ugc\">Adminer.php hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fcross-site-scripting-xss-attacks-what-how-prevent-them\u002F\" rel=\"nofollow ugc\">XSS or cross-site scripting hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fhow-to-detect-and-remove-wp-vcd-malware-a-step-by-step-guide-and-a-bonus-plugin\u002F\" rel=\"nofollow ugc\">WP-VCD hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fpreventing-sql-injections\u002F\" rel=\"nofollow ugc\">SQL injection hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-malvertising\u002F\" rel=\"nofollow ugc\">WordPress malvertising hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fremove-google-blacklist-warning\u002F\" rel=\"nofollow ugc\">Google Blacklist hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fgoogle-adwords-account-suspended\u002F\" rel=\"nofollow ugc\">Google Adwords hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fsession-hijacking-cookie-stealing\u002F\" rel=\"nofollow ugc\">Cookie stealing & session hijacking\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fhow-to-remove-phishing\u002F\" rel=\"nofollow ugc\">WordPress phishing hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Ffavicon-ico-virus-wordpress\u002F\" rel=\"nofollow ugc\">Favicon.ico virus hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fremoving-wp-feed-php-malware\u002F\" rel=\"nofollow ugc\">WP-Feed.php & WP-Tmp.php\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fhow-to-scan-malware-and-backdoors-of-your-wordpress-site\u002F\" rel=\"nofollow ugc\">Backdoor hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fcoinhive-malware-wordpress\u002F\" rel=\"nofollow ugc\">Coinhive hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fdeface-wordpress\u002F\" rel=\"nofollow ugc\">WordPress deface hack\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>MalCare Free vs. MalCare Premium\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\n\u003Ch4>Cloud Based Malware Scanner (FREE)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Cloud-Based Malware Scanning \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Deep Malware Scanning – Files & Database \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Website Firewall (FREE)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Web Application Firewall \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Plugin Based Firewall \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Rules update every 7 days \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Login Page Protection \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Bot Protection \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Rules update every 5 mins \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Geo-Blocking \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Website Hardening \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Instant Malware Removal (PAID)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>View Malware Insights \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Instant One-Click Clean Ups \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Automatic Clean-Ups \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Unlimited Clean-Ups \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Personalized Customer Support (Paid)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Support on WordPress forum \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Support via email and chat \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Who Can Benefit From MalCare?\u003C\u002Fh3>\n\u003Cp>MalCare is perfect for:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Any WordPress Websites\u003C\u002Fli>\n\u003Cli>Small Business Websites\u003C\u002Fli>\n\u003Cli>Developer Websites\u003C\u002Fli>\n\u003Cli>Web Designing Websites\u003C\u002Fli>\n\u003Cli>eCommerce Stores\u003C\u002Fli>\n\u003Cli>Niche Sites\u003C\u002Fli>\n\u003Cli>Artists & Photographers Sites\u003C\u002Fli>\n\u003Cli>Amateur & Professional Bloggers\u003C\u002Fli>\n\u003Cli>Local Business Sites\u003C\u002Fli>\n\u003Cli>Website for Startups\u003C\u002Fli>\n\u003Cli>Websites Selling Courses\u003C\u002Fli>\n\u003Cli>Influencer Sites\u003C\u002Fli>\n\u003Cli>Web Hosting Companies\u003C\u002Fli>\n\u003Cli>Website Maintenance Services or Agencies\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Detailed Setup Step-by-Step Tutorials\u003C\u002Fh3>\n\u003Cp>This WordPress security plugin works in tandem with the \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\" rel=\"nofollow ugc\">MalCare\u003C\u002Fa> servers. MalCare servers do all the heavy processing and will alert you if your site has any security issues.\u003C\u002Fp>\n\u003Cp>Hence a MalCare account is needed to use the plugin. This account can also be used by our other products including \u003Ca href=\"https:\u002F\u002Fblogvault.net\" rel=\"nofollow ugc\">BlogVault\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcare.freshdesk.com\u002Fsupport\u002Fsolutions\u002Farticles\u002F35000055512-how-do-i-set-up-a-malcare-account-\" rel=\"nofollow ugc\">How to Set Up a MalCare Account?\u003C\u002Fa> (Help Doc)\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=v8L_DZllk7k&list=\" rel=\"nofollow ugc\">How to Set Up a MalCare Account?\u003C\u002Fa> (Video)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>MalCare Full Security Features List\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Ch4>Cloud Based Malware Scanner\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Daily Scan Frequency\u003C\u002Fli>\n\u003Cli>On-demand Site Scans\u003C\u002Fli>\n\u003Cli>Scan Non-WP Files\u003C\u002Fli>\n\u003Cli>Does not slow down your website ever\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Instant Malware Removal\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>View Hacked Files details\u003C\u002Fli>\n\u003Cli>Instant Automatic Malware Removal\u003C\u002Fli>\n\u003Cli>Removal of Unknown & New Malware\u003C\u002Fli>\n\u003Cli>Unlimited Malware Removal\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Intelligent Malware Protection\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Web Application Firewall\u003C\u002Fli>\n\u003Cli>IP Whitelisting\u003C\u002Fli>\n\u003Cli>CAPTCHA-based Login Page Protection\u003C\u002Fli>\n\u003Cli>Traffic Logs\u003C\u002Fli>\n\u003Cli>Login Logs\u003C\u002Fli>\n\u003Cli>Geo-Blocking\u003C\u002Fli>\n\u003Cli>Alerts for Suspicious Logins\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Website Hardening\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Block PHP Execution in Untrusted Folders\u003C\u002Fli>\n\u003Cli>Disable Files Editor\u003C\u002Fli>\n\u003Cli>Block Plugin or Theme Installation\u003C\u002Fli>\n\u003Cli>Change Security Keys\u003C\u002Fli>\n\u003Cli>Reset All Passwords\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Complete Website Management\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Centralized Dashboard\u003C\u002Fli>\n\u003Cli>Plugins & Themes Management & Update\u003C\u002Fli>\n\u003Cli>User Management\u003C\u002Fli>\n\u003Cli>Team Management\u003C\u002Fli>\n\u003Cli>Client Management\u003C\u002Fli>\n\u003Cli>Generate & Schedule Reports\u003C\u002Fli>\n\u003Cli>White-Labeling Solution\u003C\u002Fli>\n\u003Cli>Uptime Monitoring\u003C\u002Fli>\n\u003Cli>Site Speed Monitoring\u003C\u002Fli>\n\u003Cli>Blacklist Alarm\u003C\u002Fli>\n\u003Cli>Slack Integration\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Email\u003C\u002Fli>\n\u003Cli>Chat\u003C\u002Fli>\n\u003Cli>Social Media\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Fans Are Raving About Us\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fvisualcomposer.com\u002Fblog\u002Fmalcare-review\u002F\" rel=\"nofollow ugc\">MalCare Review on VisualComposer\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.elegantthemes.com\u002Fblog\u002Fresources\u002Fmalcare-security-and-firewall-the-right-security-plugin-for-your-site\" rel=\"nofollow ugc\">MalCare Review on ElegantThemes\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fblog.weglot.com\u002Fideal-security-solution-malcare-review\u002F\" rel=\"nofollow ugc\">MalCare Review on Weglot\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.wpwhitesecurity.com\u002Fmalcare-wordpress-site-security-service-reviewed\u002F\" rel=\"nofollow ugc\">MalCare Review on WPWhiteSecurity\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=2yNIb4Pc_ig\" rel=\"nofollow ugc\">MalCare Reviews by WordPress Influencer Adam Preiser (Plus Real Malware Removal Demo)\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Connect With Our Team of Security Experts\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fgroups\u002FWordPressForWebCreators\u002F\" rel=\"nofollow ugc\">Join MalCare’s Facebook Community\u003C\u002Fa> – The purpose of the group is to enable Web Creators to gain valuable insights and help from community members which will be valuable to their business. So, if you are a WordPress user & want to keep up with the latest industry news and get help for your business, \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fgroups\u002FWordPressForWebCreators\u002F\" rel=\"nofollow ugc\">join us\u003C\u002Fa>!\u003C\u002Fp>\n\u003Ch3>Don’t Know Where to Getting Started? Start From Here –\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcare.freshdesk.com\u002Fsupport\u002Fsolutions\u002Farticles\u002F35000055512-how-do-i-set-up-a-malcare-account-\" rel=\"nofollow ugc\">How to Setup MalCare Account?\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fgroups\u002FWordPressForWebCreators\u002F\" rel=\"nofollow ugc\">Join MalCare Facebook Group MalCare\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fchannel\u002FUC5oQAXXvndQJuyVrWgMRWqg\" rel=\"nofollow ugc\">MalCare Tutorial Videos\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcare.freshdesk.com\u002Fsupport\u002Fhome\" rel=\"nofollow ugc\">User Help Documentations\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Ffaq\u002F\" rel=\"nofollow ugc\">Frequently Asked Questions\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcare.freshdesk.com\u002Fsupport\u002Ftickets\u002Fnew\" rel=\"nofollow ugc\">Support for MalCare Users\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>MalCare vs. Others\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.codeinwp.com\u002Fblog\u002Fsucuri-vs-wordfence-vs-malcare\u002F\" rel=\"nofollow ugc\">MalCare vs Sucuri vs Wordfence by CodeinWP\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpmayor.com\u002Fmalcare-sucuri-wordfence-sitelock-ithemes-security-comparison\u002F\" rel=\"nofollow ugc\">MalCare vs Sucuri vs Wordfence vs SiteLock vs iThemes Security by WPMayor\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","Get Bulletproof Security for your WordPress site. WordPress security plugin packed with comprehensive Firewall, malware scanner, cleaner & more.",200000,17387894,86,519,"2026-01-29T13:26:00.000Z","4.0",[21,114,115,116,24],"malware-removal","malware-scanner","vulnerabilities","https:\u002F\u002Fwww.malcare.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmalcare-security.6.36.zip",{"slug":120,"name":121,"version":122,"author":123,"author_profile":124,"description":125,"short_description":126,"active_installs":127,"downloaded":128,"rating":13,"num_ratings":129,"last_updated":130,"tested_up_to":131,"requires_at_least":132,"requires_php":133,"tags":134,"homepage":137,"download_link":138,"security_score":13,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"polar-mass-advanced-ip-blocker","Polar Mass Advanced IP Blocker","1.0.1","polarmass","https:\u002F\u002Fprofiles.wordpress.org\u002Fpolarmass\u002F","\u003Cp>\u003Cstrong>Automatically Block Malicious IPs with Cloudflare\u003C\u002Fstrong>\u003Cbr \u002F>\nProtect your WordPress site from hackers and brute-force attacks. This free plugin automatically blocks malicious IPs detected by Wordfence and integrates with Cloudflare for real-time security.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>🔒 \u003Cstrong>Automatic IP Blocking\u003C\u002Fstrong> – Blocks malicious IPs detected by Wordfence.\u003C\u002Fli>\n\u003Cli>⚡ \u003Cstrong>Cloudflare Integration\u003C\u002Fstrong> – Uses Cloudflare’s API for real-time threat mitigation.\u003C\u002Fli>\n\u003Cli>📉 \u003Cstrong>Reduces Server Load\u003C\u002Fstrong> – Shifts security tasks from WordPress to Cloudflare.\u003C\u002Fli>\n\u003Cli>🏆 \u003Cstrong>Lightweight & Fast\u003C\u002Fstrong> – Security without slowing down your site.\u003C\u002Fli>\n\u003Cli>🛠️ \u003Cstrong>Easy Setup\u003C\u002Fstrong> – Just enter your Cloudflare API key and Zone ID.\u003C\u002Fli>\n\u003Cli>🆓 \u003Cstrong>Free & Open Source\u003C\u002Fstrong> – Transparent and continuously improved.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is licensed under the \u003Ca href=\"https:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-2.0.html\" rel=\"nofollow ugc\">GPL v2 or later\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cp>For support, feature requests, or bug reports, open an issue or reach out via \u003Ca href=\"mailto:contact@polarmass.com\" rel=\"nofollow ugc\">email\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>External Services\u003C\u002Fh3>\n\u003Cp>To improve the user experience, \u003Cstrong>Polar Mass Advanced IP Blocker\u003C\u002Fstrong> may use the following third-party services:\u003C\u002Fp>\n\u003Ch4>Cloudflare API (https:\u002F\u002Fapi.cloudflare.com\u002Fclient\u002Fv4\u002F)\u003C\u002Fh4>\n\u003Cp>This plugin integrates with \u003Cstrong>Cloudflare’s API\u003C\u002Fstrong> to manage IP rules and firewall settings, helping block malicious traffic in real-time.\u003Cbr \u002F>\n– Users must manually enter their \u003Cstrong>Cloudflare API Key\u003C\u002Fstrong> and \u003Cstrong>Zone ID\u003C\u002Fstrong> in the plugin settings to enable this feature.\u003Cbr \u002F>\n– No automatic data collection occurs without user input.\u003Cbr \u002F>\n– When configured, the plugin securely sends user-defined IPs and rules to Cloudflare’s servers.\u003Cbr \u002F>\n– Cloudflare Privacy Policy: \u003Ca href=\"https:\u002F\u002Fwww.cloudflare.com\u002Fprivacypolicy\" rel=\"nofollow ugc\">https:\u002F\u002Fwww.cloudflare.com\u002Fprivacypolicy\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Polar Mass API (https:\u002F\u002Fpolarmass.com\u002Fwp-json\u002Fpmip\u002Fv1\u002Fnewsletter\u002Fsignup)\u003C\u002Fh4>\n\u003Cp>This plugin provides an \u003Cstrong>optional\u003C\u002Fstrong> newsletter signup form within the admin panel.\u003Cbr \u002F>\n– The \u003Cstrong>only\u003C\u002Fstrong> data collected is the email address entered by the user.\u003Cbr \u002F>\n– This data is securely transmitted to our server at \u003Cstrong>polarmass.com\u003C\u002Fstrong>.\u003Cbr \u002F>\n– No personal information is shared or processed without explicit user consent.\u003Cbr \u002F>\n– Privacy Policy: \u003Ca href=\"https:\u002F\u002Fpolarmass.com\u002Fprivacy-policy\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fpolarmass.com\u002Fprivacy-policy\u002F\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>For more details, please review our \u003Ca href=\"https:\u002F\u002Fpolarmass.com\u002Fterms-and-conditions\u002F\" rel=\"nofollow ugc\">Terms and Conditions\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fpolarmass.com\u002Fprivacy-policy\u002F\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>.\u003C\u002Fp>\n","Automatically block threats at the network level by forwarding Wordfence-detected IPs to Cloudflare.",90,873,2,"2025-05-20T18:49:00.000Z","6.8.5","5.8","7.4",[135,21,136,22,24],"cloudflare","ip-blocker","https:\u002F\u002Fpolarmass.com\u002Fpolar-mass-advanced-ip-blocker","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fpolar-mass-advanced-ip-blocker.1.0.1.zip",{"slug":140,"name":141,"version":142,"author":143,"author_profile":144,"description":145,"short_description":146,"active_installs":147,"downloaded":148,"rating":29,"num_ratings":29,"last_updated":149,"tested_up_to":150,"requires_at_least":151,"requires_php":152,"tags":153,"homepage":157,"download_link":158,"security_score":159,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"cybershield-waf","Cybershield Firewall","0.1.6","SECURAS TECHNOLOGIES","https:\u002F\u002Fprofiles.wordpress.org\u002Fsecuras\u002F","\u003Cp>Experience effective web security with CyberShield, the advanced Web Application Firewall (WAF) from Securas Technologies, designed to actively protect your digital assets from emerging threats and cyberattacks.\u003C\u002Fp>\n\u003Ch4>Key Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Comprehensive Dashboard\u003C\u002Fstrong>: Easily navigate through the firewall features. CyberShield gathers all the data from your security features on one dashboard, enabling a quick check on your website’s security posture.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Advanced Statistics\u003C\u002Fstrong>: Measure and improve your cybersecurity performance with comprehensive statistics.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>PHP Configuration Audit\u003C\u002Fstrong>: Enhances your PHP settings including error reporting, file permissions, session management, and encryption to prevent common vulnerabilities.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>At-risk Visitor Identification\u003C\u002Fstrong>: Prevent cyberattacks with our advanced detection and prevention system that identifies at-risk visitors.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SQL Injection Protection\u003C\u002Fstrong>: Our AI-powered detection scans and sanitizes every query that reaches your database to prevent SQL injection attacks.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Bot Detection\u003C\u002Fstrong>: Conserve bandwidth and resources by filtering out harmful or irrelevant bots, including scrapers, spammers, and crawlers.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>IP Auto-Ban\u003C\u002Fstrong>: Automatically ban IPs that exhibit suspicious activity, helping to keep your website secure with minimal downtime.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Exposed Services Monitoring\u003C\u002Fstrong>: Identify and report any network services that are publicly accessible and may be vulnerable to exploitation.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Leaked Data Monitoring\u003C\u002Fstrong>: Continuously scan various sources to detect if your credentials have been compromised, ensuring rapid response to secure your accounts.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>More Features\u003C\u002Fstrong>: Explore additional capabilities on our \u003Ca href=\"https:\u002F\u002Fsecuras.fr\u002Fcybershield-security\u002F\" rel=\"nofollow ugc\">CyberShield Official Page\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>IP Geolocation\u003C\u002Fstrong>: Identify the location of your visitors and block or allow access based on their location using https:\u002F\u002Fipinfo.io\u002F.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>[0.1.6] – 2024-10-25\u003C\u002Fh3>\n\u003Ch3>Minor Bug Fix\u003C\u002Fh3>\n\u003Ch3>[0.1.5] – 2024-10-25\u003C\u002Fh3>\n\u003Ch3>Minor Bug Fix\u003C\u002Fh3>\n\u003Ch3>[0.1.4] – 2024-10-25\u003C\u002Fh3>\n\u003Ch3>Minor Bug Fix\u003C\u002Fh3>\n\u003Ch3>[0.1.3] – 2024-10-25\u003C\u002Fh3>\n\u003Ch3>Minor Bug Fix\u003C\u002Fh3>\n\u003Ch3>[0.1.2] – 2024-10-25\u003C\u002Fh3>\n\u003Ch3>Minor Bug Fix\u003C\u002Fh3>\n\u003Ch3>[0.1.1] – 2023-08-27\u003C\u002Fh3>\n\u003Ch3>Minor Bug Fix\u003C\u002Fh3>\n\u003Ch3>[0.1.0] – 2023-08-27\u003C\u002Fh3>\n\u003Ch3>Added\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Service Check Module: Enhances monitoring and diagnostics.\u003C\u002Fli>\n\u003Cli>AI Threat Detection Module: Specializes in detecting SQL injection attacks.\u003C\u002Fli>\n\u003Cli>Support Ticketing System: Streamlined helpdesk for better user assistance.\u003C\u002Fli>\n\u003Cli>Multi-Language Support: Now available in French, English, and Arabic.\u003C\u002Fli>\n\u003Cli>Client PHPinfo Fetching Function: Gathers configuration information for support purposes.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Thrid Party Libraries\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fipinfo.io\u002F\" rel=\"nofollow ugc\">IPInfo\u003C\u002Fa>: We use Ipinfo for IP geolocation services. By using this plugin, you agree to the following terms and conditions:\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fipinfo.io\u002Fprivacy-policy\" rel=\"nofollow ugc\">IpInfo’s privacy policy\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fipinfo.io\u002Fterms\" rel=\"nofollow ugc\">IpInfo’s terms of service\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Got more questions? \u003Ca href=\"mailto:contact@securas.fr\" title=\"Securas Contact\" rel=\"nofollow ugc\">Contact us!\u003C\u002Fa>\u003C\u002Fp>\n","CyberShield, Your First Line of Defense Against Web Attacks.",10,979,"2024-10-27T15:54:00.000Z","6.6.5","5.4","7.2",[22,23,154,155,156],"waf","web-application-firewall","xss","https:\u002F\u002Fcyber-shield.fr\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcybershield-waf.0.1.6.zip",92,{"slug":161,"name":162,"version":163,"author":164,"author_profile":165,"description":166,"short_description":167,"active_installs":147,"downloaded":168,"rating":13,"num_ratings":129,"last_updated":169,"tested_up_to":131,"requires_at_least":170,"requires_php":171,"tags":172,"homepage":171,"download_link":175,"security_score":13,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"guardify","Guardify Firewall","1.1.2","BitCleric","https:\u002F\u002Fprofiles.wordpress.org\u002Fsoamuller23\u002F","\u003Cp>\u003Cstrong>Guardify\u003C\u002Fstrong> is a powerful WordPress firewall plugin designed to protect your website from a wide range of threats, including brute force attacks, SQL injections, malicious bots, and unauthorized access attempts. With an intuitive dashboard, detailed statistics, and advanced settings, Guardify empowers you to secure your site effortlessly.\u003C\u002Fp>\n\u003Ch3>🔐 Key Features:\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Cstrong>Advanced Web Application Firewall (WAF)\u003C\u002Fstrong>\u003Cbr \u002F>\nIntercepts and filters all incoming traffic before it reaches WordPress. Blocks SQL injection, XSS, RFI, LFI, and other attack vectors.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Brute Force Attack Protection\u003C\u002Fstrong>\u003Cbr \u002F>\nBlocks repeated login attempts by limiting login frequency and analyzing IP reputation.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>2-Factor Authentication (2FA)\u003C\u002Fstrong>\u003Cbr \u002F>\nAdds an extra layer of login security for admin users, using time-based one-time passwords (TOTP).\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Real-Time Activity Logs\u003C\u002Fstrong>\u003Cbr \u002F>\nTrack login attempts, blocked IPs, suspicious requests, and system actions with detailed logs. View statistics by day, week, or month.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Custom IP Whitelisting & Blacklisting\u003C\u002Fstrong>\u003Cbr \u002F>\nControl access to your site by adding IPs or IP ranges to allow or deny lists. Includes temporary blocking for failed login attempts.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>GeoIP Blocking\u003C\u002Fstrong>\u003Cbr \u002F>\nBlock or allow access from specific countries using the MaxMind GeoIP2 database integration.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Bot Access Control\u003C\u002Fstrong>\u003Cbr \u002F>\nDetect and manage access from known bots, scrapers, and fake crawlers. Option to block non-human traffic.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Anti-PHP Injection & File Access Blocking\u003C\u002Fstrong>\u003Cbr \u002F>\nPrevents direct access to PHP files in sensitive directories such as \u003Ccode>\u002Fwp-includes\u002F\u003C\u002Fcode> and \u003Ccode>\u002Fwp-content\u002Fuploads\u002F\u003C\u002Fcode>.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Block Plugin and Theme Installation\u003C\u002Fstrong>\u003Cbr \u002F>\nRestrict installation of new plugins and themes via the WordPress dashboard — even by administrators. This helps prevent unauthorized or accidental installation of insecure components. Manual installation via FTP remains possible.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Block Theme Editor\u003C\u002Fstrong>\u003Cbr \u002F>\nDisable access to the Theme Editor (\u003Ccode>\u002Fwp-admin\u002Ftheme-editor.php\u003C\u002Fcode>) to prevent direct file editing. This minimizes the risk of malicious code injection or unintentional file corruption.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Forbidden Comment Words Filter\u003C\u002Fstrong>\u003Cbr \u002F>\nAutomatically mark comments as spam if they contain forbidden words or patterns (e.g., \u003Ccode>http\u003C\u002Fcode>, \u003Ccode>viagra\u003C\u002Fcode>, \u003Ccode>casino\u003C\u002Fcode>, \u003Ccode>porn\u003C\u002Fcode>). Helps drastically reduce comment spam by detecting common keywords and links.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Auto Block IPs in .htaccess\u003C\u002Fstrong>\u003Cbr \u002F>\nWhen enabled, IPs that exceed the rate limit are automatically added to the \u003Ccode>.htaccess\u003C\u002Fcode> file for permanent blocking. This server-level block prevents any further requests. Use with care, as shared or corporate IPs may be affected.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Email Notifications\u003C\u002Fstrong>\u003Cbr \u002F>\nStay informed with email alerts about critical security events, such as admin login attempts or IP bans.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Customizable Firewall Rules\u003C\u002Fstrong>\u003Cbr \u002F>\nAdvanced users can fine-tune rules with regex filters, HTTP method checks, user-agent filters, and more.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>User-Friendly Admin Interface\u003C\u002Fstrong>\u003Cbr \u002F>\nGuardify features a modern and intuitive UI built using native WordPress design language.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Clean Uninstall\u003C\u002Fstrong>\u003Cbr \u002F>\nAutomatically cleans up all data, logs, and settings when uninstalled—leaving your database clean.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n","Guardify is a powerful WordPress firewall plugin designed to protect your website from a wide range of threats, including brute force attacks, SQL inj &hellip;",480,"2025-06-04T19:22:00.000Z","5.0","",[173,21,174,22,24],"brute-force-protection","ip-blocking","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fguardify.1.1.2.zip",{"slug":177,"name":178,"version":179,"author":180,"author_profile":181,"description":182,"short_description":183,"active_installs":147,"downloaded":184,"rating":13,"num_ratings":185,"last_updated":186,"tested_up_to":131,"requires_at_least":187,"requires_php":133,"tags":188,"homepage":171,"download_link":190,"security_score":13,"vuln_count":29,"unpatched_count":29,"last_vuln_date":38,"fetched_at":31},"proactive-security-suite","Proactive Security Suite","1.5.9.9","ITCS","https:\u002F\u002Fprofiles.wordpress.org\u002Fdimath99\u002F","\u003Cp>Welcome to the \u003Cem>ProActive Security Suite\u003C\u002Fem> Plugin Wiki\u003C\u002Fp>\n\u003Cp>     Enhance your WordPress website’s security with the \u003Cstrong>ProActive Security Suite\u003C\u002Fstrong>. This powerful plugin offers advanced security features including automatic IP blocking, an advanced rule builder, traffic analysis, and seamless integration with services like \u003Cstrong>Cloudflare\u003C\u002Fstrong>, \u003Cstrong>AbuseIPDB\u003C\u002Fstrong>,  and \u003Cstrong>Whatismybrowser.com\u003C\u002Fstrong>. ProActive Security Suite provides proactive defense mechanisms to protect your site from malicious traffic and potential threats before they reach your server. \u003C\u002Fp>\n\u003Cp>     Table of Contents     \u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"#introduction\" rel=\"nofollow ugc\">Introduction\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#features\" rel=\"nofollow ugc\">Features\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cul>\n\u003Cli>\u003Ca href=\"#free-features\" rel=\"nofollow ugc\">Free Features\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#premium-features\" rel=\"nofollow ugc\">Premium Features\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cli>\u003Ca href=\"#installation\" rel=\"nofollow ugc\">Installation\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#configuration\" rel=\"nofollow ugc\">Configuration\u003C\u002Fa>\u003C\u002Fli>\n\u003Cul>\n\u003Cli>\u003Ca href=\"#cloudflare-settings\" rel=\"nofollow ugc\">Cloudflare Settings\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#abuseipdb-integration\" rel=\"nofollow ugc\">AbuseIPDB Integration\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#whatismybrowsercom-integration\" rel=\"nofollow ugc\">WhatIsMyBrowser.com Integration\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cli>\u003Ca href=\"#usage\" rel=\"nofollow ugc\">Usage\u003C\u002Fa>\u003C\u002Fli>\n\u003Cul>\n\u003Cli>\u003Ca href=\"#automatic-ip-synchronization\" rel=\"nofollow ugc\">Automatic IP Synchronization\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#manual-synchronization\" rel=\"nofollow ugc\">Manual Synchronization\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#captured-traffic-data\" rel=\"nofollow ugc\">Captured Traffic Data\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#advanced-rule-builder\" rel=\"nofollow ugc\">Advanced Rule Builder\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#rule-details-in-blocked-ips\" rel=\"nofollow ugc\">Rule Details in Blocked IPs\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cli>\u003Ca href=\"#advanced-settings\" rel=\"nofollow ugc\">Advanced Settings\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#faq\" rel=\"nofollow ugc\">Frequently Asked Questions\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#support\" rel=\"nofollow ugc\">Support and Contribution\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#license\" rel=\"nofollow ugc\">License\u003C\u002Fa>\u003C\u002Fli>\n\u003Cp>Introduction\u003C\u002Fp>\n\u003Cp>     Welcome to the \u003Cstrong>ProActive Security Suite\u003C\u002Fstrong> plugin! This comprehensive security solution enhances your website’s protection by combining advanced threat detection, automated rule-based actions, and integration with services like \u003Cstrong>Cloudflare\u003C\u002Fstrong> and \u003Cstrong>AbuseIPDB\u003C\u002Fstrong>. By proactively analyzing traffic and applying custom security rules, ProActive Security Suite stops malicious traffic before it reaches your server, reducing load and enhancing performance. \u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fitcssec\u002FProActiveSecuritySuite\u002Freleases\" rel=\"nofollow ugc\">Download Latest Release\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Features\u003C\u002Fp>\n\u003Ch3>Free Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Automatic IP Synchronization:\u003C\u002Fstrong> Effortlessly sync blocked IPs to Cloudflare’s firewall.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Customizable Settings:\u003C\u002Fstrong> Tailor the plugin to your needs with adjustable settings:\n\u003Cul>\n\u003Cli>Blocked Hits Threshold\u003C\u002Fli>\n\u003Cli>Block Scope (Domain or Account)\u003C\u002Fli>\n\u003Cli>Block Mode (e.g., Block, Managed Challenge)\u003C\u002Fli>\n\u003Cli>Cron Interval\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Manual Synchronization:\u003C\u002Fstrong> Trigger synchronization manually when immediate action is needed.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>AbuseIPDB Integration:\u003C\u002Fstrong> Optional integration to fetch detailed information about IPs:\n\u003Cul>\n\u003Cli>Country Code\u003C\u002Fli>\n\u003Cli>Usage Type\u003C\u002Fli>\n\u003Cli>ISP Information\u003C\u002Fli>\n\u003Cli>Confidence Score\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Premium Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Advanced Rule Builder:\u003C\u002Fstrong> Create custom security rules based on various criteria such as confidence score, whitelisted status, abusive status, and more. Automate actions like blocking or challenging IPs based on these rules.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Rule Priorities:\u003C\u002Fstrong> Assign priorities to your rules to control the order of evaluation. Higher priority numbers are evaluated first, allowing critical rules to take precedence.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Automatic Action Application:\u003C\u002Fstrong> The plugin automatically applies actions to IPs that match your defined rules immediately after capturing traffic data.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Rule Details in Blocked IPs:\u003C\u002Fstrong> View detailed information about which rules caused IPs to be blocked, including criteria and actions taken.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Captured Traffic Data:\u003C\u002Fstrong> Log and analyze incoming traffic for enhanced security insights.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Exclude User Roles:\u003C\u002Fstrong> Exclude specific WordPress user roles from traffic logging.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>WhatIsMyBrowser.com API Integration:\u003C\u002Fstrong> Advanced user agent analysis and detection capabilities.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enhanced AbuseIPDB Integration:\u003C\u002Fstrong> Automatic updates for all entries with the same IP address.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Priority Support:\u003C\u002Fstrong> Access dedicated support for assistance and troubleshooting.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Cloudflare Custom WAF Rule & List Management:\u003C\u002Fstrong> Optionally create a Cloudflare custom list and associated WAF rule. Manage entries directly from the plugin and get notified if Cloudflare reports issues such as a full list.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>     \u003Cstrong>Note:\u003C\u002Fstrong> The premium features require an active premium license. Upgrade to access these advanced functionalities. \u003C\u002Fp>\n\u003Cp>Installation\u003C\u002Fp>\n\u003Col>\n\u003Cli>\u003Cstrong>Download the Plugin:\u003C\u002Fstrong> Clone the repository or \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fitcssec\u002FProActiveSecuritySuite\u002Freleases\" rel=\"nofollow ugc\">download the latest release\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Upload to WordPress:\u003C\u002Fstrong> Upload the `proactive-security-suite` directory to `\u002Fwp-content\u002Fplugins\u002F`.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Activate the Plugin:\u003C\u002Fstrong> In your WordPress dashboard, navigate to \u003Cem>Plugins\u003C\u002Fem> and activate \u003Cem>ProActive Security Suite\u003C\u002Fem>.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Configuration\u003C\u002Fp>\n\u003Ch3>Cloudflare Settings\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\u003Cstrong>Obtain Cloudflare Credentials:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>\u003Cstrong>Email:\u003C\u002Fstrong> Your Cloudflare account email.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>API Key:\u003C\u002Fstrong> Your Global API Key or an API Token with necessary permissions.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Zone ID:\u003C\u002Fstrong> Found in your Cloudflare dashboard under the domain’s overview.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Account ID:\u003C\u002Fstrong> Located in your Cloudflare profile settings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Configure Plugin Settings:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>Navigate to \u003Cem>Settings > ProActive Security Suite\u003C\u002Fem>.\u003C\u002Fli>\n\u003Cli>Enter your Cloudflare credentials securely.\u003C\u002Fli>\n\u003Cli>Adjust settings like Blocked Hits Threshold, Block Scope, and Block Mode.\u003C\u002Fli>\n\u003Cli>Enable \u003Cem>Custom WAF Rule\u003C\u002Fem> and supply a rule name to allow the plugin to create and maintain a Cloudflare custom list and matching WAF rule. List entries can be viewed, added, or removed from within the plugin.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>AbuseIPDB Integration\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\u003Cstrong>Sign Up for AbuseIPDB:\u003C\u002Fstrong> Visit \u003Ca href=\"https:\u002F\u002Fwww.abuseipdb.com\u002F\" rel=\"nofollow ugc\">AbuseIPDB\u003C\u002Fa> and sign up for an API key.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enable Integration:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>In the plugin settings, enter your AbuseIPDB API key.\u003C\u002Fli>\n\u003Cli>Enable the \u003Cem>AbuseIPDB Lookup\u003C\u002Fem> option.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>WhatIsMyBrowser.com Integration (Premium)\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\u003Cstrong>Obtain API Key:\u003C\u002Fstrong> Register at \u003Ca href=\"https:\u002F\u002Fdevelopers.whatismybrowser.com\u002Fapi\u002F\" rel=\"nofollow ugc\">WhatIsMyBrowser.com\u003C\u002Fa> for an API key.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Configure Integration:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>Enter the API key in the plugin’s settings under \u003Cem>WhatIsMyBrowser API Key\u003C\u002Fem>.\u003C\u002Fli>\n\u003Cli>Enable the integration features as desired.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Usage\u003C\u002Fp>\n\u003Ch3>Automatic IP Synchronization\u003C\u002Fh3>\n\u003Cp>     The plugin automatically syncs blocked IPs based on your configured cron interval. IPs exceeding the Blocked Hits Threshold are added to Cloudflare’s firewall or acted upon based on your defined rules. \u003C\u002Fp>\n\u003Ch3>Manual Synchronization\u003C\u002Fh3>\n\u003Cp>     Navigate to \u003Cem>Settings > ProActive Security Suite\u003C\u002Fem> and click the \u003Cstrong>Run Process\u003C\u002Fstrong> button to trigger synchronization and rule evaluation immediately. \u003C\u002Fp>\n\u003Ch3>Captured Traffic Data (Premium)\u003C\u002Fh3>\n\u003Cp>     Access detailed logs under the \u003Cem>Captured Traffic Data\u003C\u002Fem> tab. Analyze user agents, request methods, and more. Exclude specific user roles from logging in the settings. \u003C\u002Fp>\n\u003Ch3>Advanced Rule Builder (Premium)\u003C\u002Fh3>\n\u003Cp>     The plugin features a powerful \u003Cstrong>Rule Builder\u003C\u002Fstrong> that allows you to create custom security rules based on various criteria. You can define rules using conditions such as: \u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Confidence Score:\u003C\u002Fstrong> Set thresholds using operators like greater than, less than, equal to, etc.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Is Whitelisted:\u003C\u002Fstrong> Check if an IP is marked as whitelisted in AbuseIPDB.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Is Abusive:\u003C\u002Fstrong> Determine if an IP is associated with abusive behavior.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Custom Criteria:\u003C\u002Fstrong> Add other criteria based on the data captured.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>     Each rule can be assigned an \u003Cstrong>Action\u003C\u002Fstrong> (e.g., Block, Managed Challenge) that will be applied to IPs matching the rule. You can also assign a \u003Cstrong>Priority\u003C\u002Fstrong> to control the order in which rules are evaluated. \u003C\u002Fp>\n\u003Ch3>Rule Details in Blocked IPs (Premium)\u003C\u002Fh3>\n\u003Cp>     The \u003Cstrong>Blocked IPs\u003C\u002Fstrong> tab now includes a \u003Cem>Rule Details\u003C\u002Fem> column that displays comprehensive information about the rules that caused IPs to be blocked. This includes: \u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Criteria:\u003C\u002Fstrong> The specific conditions that were met, such as confidence score thresholds, whitelisted status, and more.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Action:\u003C\u002Fstrong> The action taken by the rule (e.g., Block, Managed Challenge).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>     This enhancement allows administrators to easily identify which rules are triggering blocks and understand the reasons behind each IP being blocked. It provides greater transparency and aids in fine-tuning security settings. \u003C\u002Fp>\n\u003Cp>Advanced Settings\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Blocked Hits Threshold:\u003C\u002Fstrong> Define the minimum number of blocked hits before an IP is synchronized or evaluated by rules.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Block Scope:\u003C\u002Fstrong> Choose between domain-specific or account-wide blocking.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Block Mode:\u003C\u002Fstrong> Select the action for Cloudflare to take (e.g., Block, Challenge).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Cron Interval:\u003C\u002Fstrong> Set how frequently the plugin checks for new blocked IPs and evaluates rules.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Rule Priorities:\u003C\u002Fstrong> Assign priorities to your rules to control the order of evaluation. Higher priority numbers are evaluated first.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>User Role Exclusions:\u003C\u002Fstrong> Exclude specific WordPress user roles from traffic logging and rule evaluation.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Frequently Asked Questions\u003C\u002Fp>\n\u003Ch3>How do I obtain my Cloudflare Zone ID and Account ID?\u003C\u002Fh3>\n\u003Cp>     \u003Cstrong>Zone ID:\u003C\u002Fstrong> Log into Cloudflare, select your domain, and find the Zone ID on the Overview page.\u003Cbr \u002F>     \u003Cstrong>Account ID:\u003C\u002Fstrong> Click on your profile in Cloudflare; the Account ID is listed there. \u003C\u002Fp>\n\u003Ch3>Can I use an API Token instead of the Global API Key?\u003C\u002Fh3>\n\u003Cp>     Yes, ensure the API Token has the necessary permissions for firewall access. \u003C\u002Fp>\n\u003Ch3>Is the plugin compatible with IPv6 addresses?\u003C\u002Fh3>\n\u003Cp>     Absolutely, the plugin supports both IPv4 and IPv6 addresses. \u003C\u002Fp>\n\u003Ch3>How does the plugin handle my API keys?\u003C\u002Fh3>\n\u003Cp>     All API keys are securely stored using WordPress’s options API and are never exposed in plain text. \u003C\u002Fp>\n\u003Ch3>How do rule priorities work?\u003C\u002Fh3>\n\u003Cp>     Rule priorities determine the order in which your rules are evaluated. Rules with higher priority numbers are evaluated first. If traffic data matches a rule, the corresponding action is applied, and no further rules are evaluated for that IP address. \u003C\u002Fp>\n\u003Ch3>Can I see which rule blocked an IP?\u003C\u002Fh3>\n\u003Cp>     Yes, with the \u003Cstrong>Rule Details in Blocked IPs\u003C\u002Fstrong> feature, you can view the exact rule criteria and action that caused an IP to be blocked. This information is displayed in the Blocked IPs tab under the Rule Details column. \u003C\u002Fp>\n\u003Ch3>How does the automatic action application work?\u003C\u002Fh3>\n\u003Cp>     When traffic data is captured, the plugin immediately evaluates it against your defined rules. If a rule matches, the specified action is applied to the IP address without any manual intervention. \u003C\u002Fp>\n\u003Cp>Support and Contribution\u003C\u002Fp>\n\u003Cp>     \u003Cstrong>Support:\u003C\u002Fstrong> For assistance, please open an issue on our \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fitcssec\u002FProActiveSecuritySuite\u002Fissues\" rel=\"nofollow ugc\">GitHub Issues\u003C\u002Fa> page or contact us at \u003Ca href=\"mailto:info@itcs.services\" rel=\"nofollow ugc\">info@itcs.services\u003C\u002Fa>. \u003C\u002Fp>\n\u003Cp>License\u003C\u002Fp>\n\u003Cp>     This project is licensed under the \u003Ca href=\"https:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-3.0.html\" rel=\"nofollow ugc\">GNU General Public License v3.0\u003C\u002Fa>. \u003C\u002Fp>\n\u003Cp>     \u003Cem>Thank you for using ProActive Security Suite!\u003C\u002Fem>  \u003C\u002Fp>\n\u003Ch3>External Services\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>Cloudflare\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Usage\u003C\u002Fstrong>: We send visitor IPs (and optionally country\u002FISP data) to create Firewall rules.\u003Cbr \u002F>\n– \u003Cstrong>Data Sent\u003C\u002Fstrong>: IP address, associated rule details.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwww.cloudflare.com\u002Fterms\u002F\" rel=\"nofollow ugc\">Cloudflare Terms of Service\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.cloudflare.com\u002Fprivacypolicy\u002F\" rel=\"nofollow ugc\">Cloudflare Privacy Policy\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>AbuseIPDB\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Usage\u003C\u002Fstrong>: We check IP reputation, fetching country code, ISP, and confidence score.\u003Cbr \u002F>\n– \u003Cstrong>Data Sent\u003C\u002Fstrong>: IP address.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwww.abuseipdb.com\u002Flegal\" rel=\"nofollow ugc\">AbuseIPDB Terms of Service\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.abuseipdb.com\u002Fprivacy\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WhatIsMyBrowser\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Usage\u003C\u002Fstrong>: We send user agent strings to detect software (browser), OS, and if it’s abusive.\u003Cbr \u002F>\n– \u003Cstrong>Data Sent\u003C\u002Fstrong>: User agent strings.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fdevelopers.whatismybrowser.com\u002Fapi\u002Fabout\u002Flegal\u002F\" rel=\"nofollow ugc\">WhatIsMyBrowser Terms of Service\u003C\u002Fa> |\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdevelopers.whatismybrowser.com\u002Fapi\u002Fabout\u002Flegal\u002F\" rel=\"nofollow ugc\">Legal\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>IPData\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Usage\u003C\u002Fstrong>: We fetch detailed threat intelligence (Tor, proxy, known attacker, etc.).\u003Cbr \u002F>\n– \u003Cstrong>Data Sent\u003C\u002Fstrong>: IP address.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fipdata.co\u002Fterms-of-service.html\" rel=\"nofollow ugc\">IPData Terms\u003C\u002Fa> |\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fipdata.co\u002Fprivacy.html\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>\u003C\u002Fp>\n","Welcome to the ProActive Security Suite Plugin Wiki      Enhance your WordPress website's security with the ProActive Security Suite.",904,1,"2025-08-24T19:26:00.000Z","5.2",[135,21,22,189,24],"wordfence","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fproactive-security-suite.1.5.9.9.zip",{"attackSurface":192,"codeSignals":247,"taintFlows":274,"riskAssessment":333,"analyzedAt":342},{"hooks":193,"ajaxHandlers":232,"restRoutes":243,"shortcodes":244,"cronEvents":245,"entryPointCount":246,"unprotectedCount":246},[194,200,203,206,210,213,217,220,225,229],{"type":195,"name":196,"callback":197,"priority":147,"file":198,"line":199},"action","wp_login","ig_user_last_login","functions.php",218,{"type":195,"name":196,"callback":201,"priority":147,"file":198,"line":202},"closure",308,{"type":195,"name":204,"callback":201,"file":198,"line":205},"wp_logout",313,{"type":207,"name":208,"callback":201,"file":198,"line":209},"filter","manage_users_columns",327,{"type":207,"name":211,"callback":201,"priority":147,"file":198,"line":212},"manage_users_custom_column",334,{"type":195,"name":214,"callback":215,"priority":185,"file":198,"line":216},"init","ig_track_user_session_ping",441,{"type":195,"name":218,"callback":215,"priority":185,"file":198,"line":219},"admin_init",442,{"type":195,"name":221,"callback":222,"file":223,"line":224},"admin_menu","ig_menu","index.php",181,{"type":195,"name":226,"callback":227,"file":223,"line":228},"admin_enqueue_scripts","register_ig_styles",183,{"type":195,"name":214,"callback":230,"priority":185,"file":223,"line":231},"ig_start",193,[233,237,240],{"action":234,"nopriv":235,"callback":201,"hasNonce":235,"hasCapCheck":235,"file":198,"line":236},"ig_load_capability_audit",false,387,{"action":238,"nopriv":235,"callback":238,"hasNonce":235,"hasCapCheck":235,"file":223,"line":239},"ig_update",185,{"action":241,"nopriv":235,"callback":241,"hasNonce":235,"hasCapCheck":235,"file":223,"line":242},"ig_update_bulk_backlist",186,[],[],[],3,{"dangerousFunctions":248,"sqlUsage":249,"outputEscaping":251,"fileOperations":246,"externalRequests":185,"nonceChecks":246,"capabilityChecks":14,"bundledLibraries":273},[],{"prepared":14,"raw":29,"locations":250},[],{"escaped":252,"rawEcho":253,"locations":254},56,8,[255,258,260,262,264,266,269,271],{"file":198,"line":256,"context":257},128,"raw output",{"file":198,"line":259,"context":257},430,{"file":261,"line":28,"context":257},"ig_settings.php",{"file":261,"line":263,"context":257},111,{"file":261,"line":265,"context":257},121,{"file":267,"line":268,"context":257},"templates\\dashboard.php",15,{"file":267,"line":270,"context":257},22,{"file":267,"line":272,"context":257},188,[],[275,299,321],{"entryPoint":276,"graph":277,"unsanitizedCount":129,"severity":298},"ig_update (functions.php:117)",{"nodes":278,"edges":295},[279,284,288],{"id":280,"type":281,"label":282,"file":198,"line":283},"n0","source","$_POST (x2)",150,{"id":285,"type":286,"label":287,"file":198,"line":283},"n1","transform","→ update_blacklisted()",{"id":289,"type":290,"label":291,"file":292,"line":293,"wp_function":294},"n2","sink","update_option() [Settings Manipulation]","guard.php",206,"update_option",[296,297],{"from":280,"to":285,"sanitized":235},{"from":285,"to":289,"sanitized":235},"low",{"entryPoint":300,"graph":301,"unsanitizedCount":14,"severity":298},"\u003Cfunctions> (functions.php:0)",{"nodes":302,"edges":316},[303,306,310,312,314],{"id":280,"type":281,"label":304,"file":198,"line":305},"$_GET",397,{"id":285,"type":290,"label":307,"file":198,"line":308,"wp_function":309},"get_results() [SQLi]",400,"get_results",{"id":289,"type":281,"label":311,"file":198,"line":283},"$_POST (x4)",{"id":313,"type":286,"label":287,"file":198,"line":283},"n3",{"id":315,"type":290,"label":291,"file":292,"line":293,"wp_function":294},"n4",[317,319,320],{"from":280,"to":285,"sanitized":318},true,{"from":289,"to":313,"sanitized":235},{"from":313,"to":315,"sanitized":235},{"entryPoint":322,"graph":323,"unsanitizedCount":29,"severity":298},"\u003Cig_settings> (ig_settings.php:0)",{"nodes":324,"edges":331},[325,328],{"id":280,"type":281,"label":326,"file":261,"line":327},"$_SERVER['REQUEST_URI']",20,{"id":285,"type":290,"label":329,"file":261,"line":327,"wp_function":330},"echo() [XSS]","echo",[332],{"from":280,"to":285,"sanitized":318},{"summary":334,"deductions":335},"The \"injection-guard\" plugin v1.3.0 exhibits a mixed security posture.  While it demonstrates good practices in using prepared statements for all SQL queries and a high percentage of properly escaped output, several significant concerns exist. The static analysis reveals three AJAX handlers that lack authorization checks, directly contributing to a potential attack surface. Furthermore, the taint analysis highlights two flows with unsanitized paths, which, though not classified as critical or high severity, represent a risk of input manipulation leading to unexpected behavior or vulnerabilities.\n\nThe plugin's vulnerability history is particularly concerning, with five known medium-severity CVEs, including Cross-Site Scripting, Missing Authorization, and CSRF. The fact that all previously known vulnerabilities are marked as patched is a positive sign, but the sheer number and variety of past issues suggest a pattern of security weaknesses that require diligent ongoing maintenance and auditing. The most recent vulnerability was as recent as July 2025, indicating that this is not a historical issue. While the current version appears to have addressed past issues, the historical context necessitates a cautious approach.\n\nIn conclusion, the plugin has strengths in its database interaction and output handling. However, the unprotected AJAX endpoints, unsanitized input paths, and a history of numerous medium-severity vulnerabilities, especially those related to authorization and input validation, present a notable risk. Continued vigilance and thorough testing are essential to mitigate these ongoing concerns.",[336,338,340],{"reason":337,"points":268},"3 AJAX handlers without auth checks",{"reason":339,"points":147},"2 flows with unsanitized paths",{"reason":341,"points":268},"5 medium severity CVEs in history","2026-03-16T18:56:10.128Z",{"wat":344,"direct":365},{"assetPaths":345,"generatorPatterns":354,"scriptPaths":355,"versionParams":356},[346,347,348,349,350,351,352,353],"\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002Fcss\u002Fbootstrap-responsive.min.css","\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002Fcss\u002Fbootstrap.icon-large.min.css","\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002Fcss\u002Fbootstrap.min.css","\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002Fcss\u002Ffontawesome.min.css","\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002Fcss\u002Fstyle.css","\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002Fjs\u002Fbootstrap.min.js","\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002Fjs\u002Fjquery.blockUI.js","\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002Fjs\u002Fscript.js",[],[351,352,353],[357,358,359,360,361,362,363,364],"injection-guard\u002Fcss\u002Fstyle.css?ver=","injection-guard\u002Fcss\u002Ffontawesome.min.css?ver=","injection-guard\u002Fcss\u002Fbootstrap.min.css?ver=","injection-guard\u002Fcss\u002Fbootstrap-responsive.min.css?ver=","injection-guard\u002Fcss\u002Fbootstrap.icon-large.min.css?ver=","injection-guard\u002Fjs\u002Fbootstrap.min.js?ver=","injection-guard\u002Fjs\u002Fjquery.blockUI.js?ver=","injection-guard\u002Fjs\u002Fscript.js?ver=",{"cssClasses":366,"htmlComments":367,"htmlAttributes":368,"restEndpoints":369,"jsGlobals":370,"shortcodeOutput":373},[],[],[],[],[371,372],"ig_obj","ig_translation",[]]