[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f4_JebTC5lkcnj8Tq1Ny4ONROYdMcxVrVcOH02X4NiuE":3,"$fwX1aKxNoVNAa7qWhPiCd27bev6USvEeqrkf7YW-DkLE":398,"$f3ViKLK7YvTVLIBZs6jwJI5V9U5aVUnMHJal9sqDM03Q":402},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":29,"last_vuln_date":30,"fetched_at":31,"discovery_status":32,"vulnerabilities":33,"developer":108,"crawl_stats":39,"alternatives":115,"analysis":207,"fingerprints":378},"login-as-customer-or-user","Login as User or Customer","3.9.1","wp-buy","https:\u002F\u002Fprofiles.wordpress.org\u002Fwp-buy\u002F","\u003Cp>This plugin allows you to quickly swap between user accounts in WordPress (in one click). This is very helpful for admins or customer support users to access any user account in one click. You can quickly switch between user accounts and act as the customer in your store.\u003C\u002Fp>\n\u003Cp>With this tool, you can add a product to the cart and create an order for your customer. This can be very useful if you are placing orders over the phone and providing technical support and assistance to your customer accounts.\u003C\u002Fp>\n\u003Ch3>Video Description\u003C\u002Fh3>\n\u003Cdiv class=\"embed-vimeo\" style=\"text-align: center;\">\u003Ciframe loading=\"lazy\" src=\"https:\u002F\u002Fplayer.vimeo.com\u002Fvideo\u002F584505898\" width=\"750\" height=\"422\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen>\u003C\u002Fiframe>\u003C\u002Fdiv>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>The ability to access any user account without having the user password (Just click the button Login as in the user’s list)\u003C\u002Fli>\n\u003Cli>The ability to access any user account from the user’s profile also\u003C\u002Fli>\n\u003Cli>Two-factor authentication (2FA) support\u003C\u002Fli>\n\u003Cli>Manage user cart (WooCommerce Customers)\u003C\u002Fli>\n\u003Cli>Instantly switch back to your originating account\u003C\u002Fli>\n\u003Cli>The Login as user button appears beside each customer to help you provide better support (In the WooCommerce orders page for the last 10 orders)\u003C\u002Fli>\n\u003Cli>Switching between users is secure\u003C\u002Fli>\n\u003Cli>Only users with the ability to edit other users can switch between accounts.\u003C\u002Fli>\n\u003Cli>Uses the WordPress nonce security system which means that only users that intends to switch user accounts can execute the user switching functions in the plugin.\u003C\u002Fli>\n\u003Cli>When you have switched to another user, a descriptive text will remind you that you are logged in as another user.\u003C\u002Fli>\n\u003Cli>Click on the Log out link to switch back to the account you where originally logged in as.\u003C\u002Fli>\n\u003Cli>Compatible with WordPress, WordPress Multisite, WooCommerce\u003C\u002Fli>\n\u003Cli>Simple options page\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This plugin does not send data to any third party, nor does it include any third party resources, nor will it ever do so.\u003C\u002Fp>\n\u003Ch3>Languages\u003C\u002Fh3>\n\u003Col>\n\u003Cli>English\u003C\u002Fli>\n\u003Cli>Spanish (Argentina)\u003C\u002Fli>\n\u003Cli>Arabic\u003C\u002Fli>\n\u003C\u002Fol>\n","This plugin allows you to quickly swap between user accounts in WordPress (in one click). This is very helpful for admins or customer support users to &hellip;",100,13269,60,13,"2026-03-19T13:03:00.000Z","6.9.4","4.6","5.4",[20,21,22,23,24],"force-login","login","message-cart","user-switching","view-as-user","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.3.9.1.zip",70,5,1,"2024-02-27 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[34,51,67,81,96],{"id":35,"url_slug":36,"title":37,"description":38,"plugin_slug":4,"theme_slug":39,"affected_versions":40,"patched_in_version":39,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":30,"updated_date":45,"references":46,"days_to_patch":39,"patch_diff_files":48,"patch_trac_url":39,"research_status":39,"research_verified":49,"research_rounds_completed":50,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":49,"poc_model_used":39,"poc_verification_depth":39},"CVE-2023-7247","login-as-user-or-customer-unauthenticated-limited-admin-account-compromise","Login as User or Customer \u003C= 3.8 - Unauthenticated Limited Admin Account Compromise","The Login as User or Customer plugin for WordPress is vulnerable to admin account compromise in version 3.8. This is due to the plugin not validating that the user switching back to the administrative account is the user who initiated the original login as another user. This makes it possible for unauthenticated attackers to access administrative user accounts when user switching is in progress by an administrator. Please note that this would be extremely difficult to exploit as it relies on the administrator switching to another user and the attacker knowing the admin users ID and the user ID of the user the admin switched to. It may be possible with social engineering.",null,">=3.8 \u003C=3.8","high",8.1,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Authentication Bypass Using an Alternate Path or Channel","2024-02-27 14:41:24",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F2a97f59d-c4b1-4544-8cef-37a01cc6f7ec?source=api-prod",[],false,0,{"id":52,"url_slug":53,"title":54,"description":55,"plugin_slug":4,"theme_slug":39,"affected_versions":56,"patched_in_version":6,"severity":57,"cvss_score":58,"cvss_vector":59,"vuln_type":60,"published_date":61,"updated_date":62,"references":63,"days_to_patch":65,"patch_diff_files":66,"patch_trac_url":39,"research_status":39,"research_verified":49,"research_rounds_completed":50,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":49,"poc_model_used":39,"poc_verification_depth":39},"CVE-2023-51484","login-as-user-or-customer-user-switching-authentication-bypass","Login as User or Customer (User Switching) \u003C= 3.8 - Authentication Bypass","The Login as User or Customer plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.8. This makes it possible for unauthenticated attackers to login as another user and escalate their privileges.","\u003C=3.8","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Authentication","2023-12-27 00:00:00","2026-05-11 19:38:18",[64],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5b07ea6a-511d-44ab-b0b7-5124702ad47d?source=api-prod",867,[],{"id":68,"url_slug":69,"title":70,"description":71,"plugin_slug":4,"theme_slug":39,"affected_versions":72,"patched_in_version":73,"severity":57,"cvss_score":58,"cvss_vector":59,"vuln_type":74,"published_date":75,"updated_date":76,"references":77,"days_to_patch":79,"patch_diff_files":80,"patch_trac_url":39,"research_status":39,"research_verified":49,"research_rounds_completed":50,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":49,"poc_model_used":39,"poc_verification_depth":39},"CVE-2022-4305","login-as-user-or-customer-privilege-escalation","Login as User or Customer \u003C= 3.2 - Privilege Escalation","The Login as User or Customer plugin for WordPress is vulnerable to authorization bypass due to improper authorization checks on the loginas_return_admin() function in versions up to, and including, 3.2. This makes it possible for unauthenticated attackers to log in as administrators on the vulnerable site. A similar vulnerability is present in the my_action function which allows subscriber-level users and higher to log in as administrators.","\u003C=3.2","3.3","Improper Authorization","2022-12-27 00:00:00","2024-01-22 19:56:02",[78],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ffca20535-d033-45d5-acc3-72ad53d34b4f?source=api-prod",392,[],{"id":82,"url_slug":83,"title":84,"description":85,"plugin_slug":4,"theme_slug":39,"affected_versions":86,"patched_in_version":87,"severity":41,"cvss_score":88,"cvss_vector":89,"vuln_type":90,"published_date":91,"updated_date":76,"references":92,"days_to_patch":94,"patch_diff_files":95,"patch_trac_url":39,"research_status":39,"research_verified":49,"research_rounds_completed":50,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":49,"poc_model_used":39,"poc_verification_depth":39},"WF-c873d838-58e8-4f69-bccb-6d1de8d91877-login-as-customer-or-user","login-as-user-or-customer-cross-site-request-forgery-to-arbitrary-plugin-installationactivation","Login as User or Customer \u003C= 2.1 - Cross-Site Request Forgery to Arbitrary Plugin Installation\u002FActivation","The Login as User or Customer Plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1. This is due to missing or incorrect nonce validation on the 'cp_plugins_do_button_job_later_callback' AJAX action. This makes it possible for unauthenticated attackers to install and activate other plugins via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.","\u003C=1.9","2.1",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Cross-Site Request Forgery (CSRF)","2021-04-22 00:00:00",[93],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc873d838-58e8-4f69-bccb-6d1de8d91877?source=api-prod",1006,[],{"id":97,"url_slug":98,"title":99,"description":100,"plugin_slug":4,"theme_slug":39,"affected_versions":101,"patched_in_version":102,"severity":41,"cvss_score":88,"cvss_vector":103,"vuln_type":104,"published_date":91,"updated_date":76,"references":105,"days_to_patch":94,"patch_diff_files":107,"patch_trac_url":39,"research_status":39,"research_verified":49,"research_rounds_completed":50,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":49,"poc_model_used":39,"poc_verification_depth":39},"CVE-2021-24195","login-as-user-or-customer-missing-authorization-to-arbitrary-plugin-installationactivation","Login as User or Customer \u003C 1.8 - Missing Authorization to Arbitrary Plugin Installation\u002FActivation","Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the Login as User or Customer (User Switching) WordPress plugin before 1.8, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE.","\u003C1.8","1.8","CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Missing Authorization",[106],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe7d7ec5b-0616-4895-b5bf-be25ac37fb17?source=api-prod",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":109,"total_installs":110,"avg_security_score":111,"avg_patch_time_days":112,"trust_score":113,"computed_at":114},15,345360,92,879,73,"2026-05-19T21:19:56.025Z",[116,133,150,170,189],{"slug":117,"name":118,"version":119,"author":120,"author_profile":121,"description":122,"short_description":123,"active_installs":124,"downloaded":125,"rating":11,"num_ratings":28,"last_updated":126,"tested_up_to":16,"requires_at_least":17,"requires_php":127,"tags":128,"homepage":25,"download_link":132,"security_score":11,"vuln_count":50,"unpatched_count":50,"last_vuln_date":39,"fetched_at":31},"passe-partout","Passe-partout, login as a different user","0.0.1","Jose Mortellaro","https:\u002F\u002Fprofiles.wordpress.org\u002Fgiuse\u002F","\u003Cp>The administrators having the email which is set in Settings => General => Administration Email Address, using their own password will be able to log in with whatever username that is registered on the website.\u003C\u002Fp>\n\u003Cp>This is useful if you are the main administrator and want to see the website with the eyes of other logged users, but without knowing their passwords.\u003C\u002Fp>\n\u003Cp>Pass-partout isn’t a user switcher plugin. Once you have logged in you can’t switch to a different user. If you need it, you have to log out and log in again with a different user.\u003Cbr \u002F>\nWe suggest you use different browsers for the different users.\u003C\u002Fp>\n\u003Cp>If you need a plugin to switch the user while you are logged in, you can use \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fuser-switching\u002F\" rel=\"ugc\">User Switching\u003C\u002Fa>, or \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Flogin-as-user\u002F\" rel=\"ugc\">Login As User\u003C\u002Fa>.\u003Cbr \u002F>\nHowever, with \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fuser-switching\u002F\" rel=\"ugc\">User Switching\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Flogin-as-user\u002F\" rel=\"ugc\">Login As User\u003C\u002Fa> you will not be able to test the login form submission as a different user.\u003Cbr \u002F>\nOnly with Pass-partout you can log in as a different user starting from the login form submission. You may need it if for example you want to test a learning management system, or the account of a user who bought on your shop, or in whatever situation you need to see what other logged-in users see when they log in.\u003C\u002Fp>\n\u003Ch3>How a main administrator can test the login of different users without knowing their password\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Install \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fpasse-partout\u002F\" rel=\"ugc\">Passe-partout\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Log in with the password of the main administrator\u003C\u002Fli>\n\u003Cli>Done!\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Extremely lightweight. The current version of the plugin has 15 lines of PHP code and nothing else. No JavaScript, no CSS, no database queries.\u003Cbr \u002F>\nIt just accepts the password of the main administrator when you log in with a different user.\u003C\u002Fli>\n\u003Cli>Totally safe even though the main administrators will be able to log in as different users, they will never know their password.\u003C\u002Fli>\n\u003Cli>Perfect if you want to test the login form submission and what other users see when they are logged in.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Security\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Passe-partout is totally safe. If you are the main administrator you could in any case see what other users see. This plugin just simplifies everything.\u003C\u002Fli>\n\u003Cli>Users who aren’t the main administrator are absolutely not able to log in with a different user.\u003C\u002Fli>\n\u003Cli>The main administrator will never know the password of other users because of this plugin.\u003C\u002Fli>\n\u003C\u002Ful>\n","The main administrators with their own password will be able to log in with whatever registered user account.",50,1498,"2025-12-10T09:27:00.000Z","7.2",[21,129,130,131,23],"passkey","password","switch-user","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fpasse-partout.0.0.1.zip",{"slug":134,"name":135,"version":136,"author":137,"author_profile":138,"description":139,"short_description":140,"active_installs":141,"downloaded":142,"rating":50,"num_ratings":50,"last_updated":143,"tested_up_to":144,"requires_at_least":145,"requires_php":25,"tags":146,"homepage":148,"download_link":149,"security_score":111,"vuln_count":50,"unpatched_count":50,"last_vuln_date":39,"fetched_at":31},"force-user-login-by-webline","Force Login by Webline","1.0.10","WeblineIndia","https:\u002F\u002Fprofiles.wordpress.org\u002Fweblineindia\u002F","\u003Cp>This plugin provides a feature to make your site restricted and user is required to login to view protected pages. It has two setting in admin, which are as below:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Enable Force Login : This will enable force login feature for your site.\u003C\u002Fli>\n\u003Cli>Page to Redirect After login: You can select page from the list of added page, user will land to selected page after login. If not selected then it will redirect user to home page\u003C\u002Fli>\n\u003C\u002Ful>\n","This plugin provides a feature to make your site restricted and user is required to login to view protected pages.",40,3867,"2024-12-10T12:53:00.000Z","6.7.5","3.2",[20,147],"login-restriction","http:\u002F\u002Fwww.weblineindia.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fforce-user-login-by-webline.1.0.10.zip",{"slug":151,"name":151,"version":152,"author":153,"author_profile":154,"description":155,"short_description":156,"active_installs":157,"downloaded":158,"rating":50,"num_ratings":50,"last_updated":159,"tested_up_to":160,"requires_at_least":6,"requires_php":25,"tags":161,"homepage":167,"download_link":168,"security_score":169,"vuln_count":50,"unpatched_count":50,"last_vuln_date":39,"fetched_at":31},"dpabadbotwp","1.27 [20200927]","peter achutha","https:\u002F\u002Fprofiles.wordpress.org\u002Fpeter-achutha\u002F","\u003Cp>The Bad Bot Exterminator Pro is a php program that was developed to block hacker attacks on WordPress websites. Please visit the website at https:\u002F\u002Fwww.drpeterscode.com for more details on the Bad bot Exterminator that blocks hackers, stops brute force login attempts and defends against ddos attacks.\u003C\u002Fp>\n\u003Cp>As of 2018 there are two versions of the Bad Bot Exterminator – the Free Version and the Pro Version which is within the budget of most people. There have been many improvements over the last 5.5 years and is much easier to use. The Free version has been discontinued.\u003C\u002Fp>\n\u003Cp>This plugin, dpabadbotwp works with both the Bad Bot Exterminator Pro & Free versions. The Bad Bot Exterminator is a firewall to protect your WordPress website and is not a plugin but an independent PHP program that runs in parallel with WordPress.\u003C\u002Fp>\n\u003Cp>With the Bad Bot Exterminator\u003Cbr \u002F>\ni. you can lock up your WordPress site so that no one can login to your site.\u003Cbr \u002F>\nii. will track and record every visitor and decides who should be allowed to access your website. It tries to block hackers, bad bots, scrappers, crawlers, spiders, … It can block by IP address or by name of web crawler (in Lenient mode).\u003C\u002Fp>\n\u003Cp>This WordPress plugin, dpaBadBotWP was developed to tell the Bad Bot Exterminator when you are working on your WordPress site and allows you to carry on working by sending your IP address to Bad Bot Exterminator and thereby allowing you unlimited access to your website. By its self this plugin will not be useful if you have not a installed Bad Bot Exterminator.\u003C\u002Fp>\n\u003Cp>It now stops automatic WordPress core updates so that the Bad Bot Exterminator will not be erased.\u003C\u002Fp>\n\u003Cp>Do visit our site https:\u002F\u002Fwww.drpeterscode.com\u002Findex.php for more information on the Bad Bot Exterminator\u003C\u002Fp>\n\u003Ch3>1.01\u003C\u002Fh3>\n\u003Cp>Previous version forgot to check ip address when logged into WordPress control panel. This version corrects that. The moment you are logged in, your current IP address is sent to dpaBadBot.\u003C\u002Fp>\n\u003Ch3>1.02\u003C\u002Fh3>\n\u003Cp>Added a better description of products offered by Software Propulsion with links to respective websites\u003C\u002Fp>\n\u003Ch3>1.03\u003C\u002Fh3>\n\u003Cp>Changed all file names to lower case so that they will be compatible with all servers. If you are upgrading and the plugin has problems accessing files, DELETE this plugin and reinstall the plugin.\u003C\u002Fp>\n\u003Ch3>1.04\u003C\u002Fh3>\n\u003Cp>dpaBadBot PHP program was upgraded to allow you to preview your edited posts. So this plugin had extra security feature added to work with these dpaBadBot upgrades.\u003C\u002Fp>\n\u003Ch3>1.05\u003C\u002Fh3>\n\u003Cp>Removed the check for logout as not a good idea.\u003C\u002Fp>\n\u003Ch3>1.06\u003C\u002Fh3>\n\u003Cp>Changed which ip address is saved. Only latest IP address is saved and all older one’s are deleted.\u003C\u002Fp>\n\u003Ch3>1.07\u003C\u002Fh3>\n\u003Cp>Added multiuser tracking. This version to be used with version 1.06 or later or the Bad Bot Exterminator.\u003C\u002Fp>\n\u003Ch3>1.08\u003C\u002Fh3>\n\u003Cp>Stops automatic WordPress core updates by setting filter ‘auto_update_core’ to ‘__return_false’.\u003C\u002Fp>\n\u003Ch3>1.09\u003C\u002Fh3>\n\u003Cp>Made the PHP code more compatible with the WordPress style by using the debug setting in wp-config.php\u003C\u002Fp>\n\u003Ch3>1.10\u003C\u002Fh3>\n\u003Cp>Corrected some bugs. The directory name can now end with or without ‘\u002F’.\u003C\u002Fp>\n\u003Ch3>1.11\u003C\u002Fh3>\n\u003Cp>Undid some of the upgrades in 1.09 to make it less prone to spurios memory problems.\u003C\u002Fp>\n\u003Ch3>1.12\u003C\u002Fh3>\n\u003Cp>Made some code more compatible with WordPress and checked if file existed.\u003C\u002Fp>\n\u003Ch3>1.13\u003C\u002Fh3>\n\u003Cp>Found out that when you upgrade any plugin, WordPress will delete the existing plugin before downloading the upgrade version. Since this plugin saves all settings in the plugin directory all settings were lost upon upgrading. With version 1.13 a separate directory is created …\u002Fwp-contents\u002Fplugins\u002Fdpabadbotwpdata\u002F and all settings are saved in the altrnative sub-directory. Thus even after upgrading the original seetings are still available.\u003C\u002Fp>\n\u003Cp>Changed all variable names to begin with $spmywp_.\u003C\u002Fp>\n\u003Ch3>1.14\u003C\u002Fh3>\n\u003Cp>changed permission of …\u002Fwp-content\u002Fplugins\u002Fdpabadbotwpdata\u002F sub-directory to 0775 & stop recording visitors not logged in\u003C\u002Fp>\n\u003Ch3>1.15\u003C\u002Fh3>\n\u003Cp>added display of memory in MB too.\u003C\u002Fp>\n\u003Ch3>1.16\u003C\u002Fh3>\n\u003Cp>corrected the link to two other websites.\u003C\u002Fp>\n\u003Ch3>1.17\u003C\u002Fh3>\n\u003Cp>Added display ID and username of those who logged in and moved data directory to \u002Fuploads\u002F directory in line with WordPress standard. As of 2017 March 09, it shows which pages, posts or WP files were accessed. This if for you to look at who logged in and what they did to your copy of WordPress.\u003C\u002Fp>\n\u003Ch3>1.18\u003C\u002Fh3>\n\u003Cp>This plugin now tracks which pages, posts or WP files were accessed. This if for you to look at who logged in and what they did to your copy of WordPress.\u003C\u002Fp>\n\u003Ch3>1.19\u003C\u002Fh3>\n\u003Cp>Version 1.18 had a array assigned wrongly. Its fixed with this version. The table showing who logged and where they went was corrected.\u003C\u002Fp>\n\u003Ch3>1.20\u003C\u002Fh3>\n\u003Cp>Version 1.19 had a searched file name wrong. Its corrected.\u003C\u002Fp>\n\u003Ch3>1.21\u003C\u002Fh3>\n\u003Cp>Removed session start as it was closing the Bad Bot Exterminator when logging out of WordPress. Changed the comments.\u003C\u002Fp>\n\u003Ch3>1.22\u003C\u002Fh3>\n\u003Cp>Tracing of pages added. Removed ‘\u002F’ from data sent to The Bad Bot Exterminator.\u003C\u002Fp>\n\u003Ch3>1.23\u003C\u002Fh3>\n\u003Cp>Tried to improve PHP code speed \u002F effeciency. Declared undefined variables. Added Speed Check for WordPress webpages through the Bad Bot Exterminator Pro. Changed all links to new website at https:\u002F\u002Fwww.drpeterscode.com\u003C\u002Fp>\n\u003Ch3>1.24\u003C\u002Fh3>\n\u003Cp>added .htaccess file to uploads directory\u003C\u002Fp>\n\u003Ch3>1.25\u003C\u002Fh3>\n\u003Cp>added code to generate sitemap data\u003C\u002Fp>\n\u003Ch3>1.26\u003C\u002Fh3>\n\u003Cp>correcter variable name is php shutdown function and improved speed test\u003C\u002Fp>\n\u003Ch3>1.27\u003C\u002Fh3>\n\u003Cp>corrected detection of undefined array\u003C\u002Fp>\n","This plugin, dpaBadBotWP, automatically tells Bad Bot Exterminator firewall software, your current IP address and you will not be blocked from working &hellip;",10,3614,"2020-09-27T08:27:00.000Z","5.5.18",[162,163,164,165,166],"bad-bot","block-hackers","brute-force-login","hack","security","https:\u002F\u002Fwww.drpeterscode.com\u002Fbad-bot-exterminator-protects-wordpress-sites-from-hackers-cyber-ddos-dos-attacks.php","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdpabadbotwp.zip",85,{"slug":171,"name":172,"version":173,"author":174,"author_profile":175,"description":176,"short_description":177,"active_installs":157,"downloaded":178,"rating":50,"num_ratings":50,"last_updated":179,"tested_up_to":180,"requires_at_least":181,"requires_php":182,"tags":183,"homepage":25,"download_link":188,"security_score":169,"vuln_count":50,"unpatched_count":50,"last_vuln_date":39,"fetched_at":31},"ervan-limit-login","Prevent Brute Force Login","1.1.0","ervannur","https:\u002F\u002Fprofiles.wordpress.org\u002Fervannur\u002F","\u003Cp>Limit the number of login attempts by ip address. By default, user can try brute force username and password from login page with unlimited attempts. This plugin help you by hiding login form after some failed logins in a short period of time from an ip address. The Unlock form will show up to help real users to unlock only their ip address immediately if their ip address range locked.\u003C\u002Fp>\n\u003Cp>Features\u003Cbr \u002F>\n* Limit the number of failed logins in a short period of time before the ip address range locked.\u003Cbr \u002F>\n* Send email notification to the admin when a user locked out (customized)\u003Cbr \u002F>\n* Show unlock form to help real user to unlock only their ip address.\u003Cbr \u002F>\n* Send email notification with unlock key (customized)\u003C\u002Fp>\n","Limit the number of login attempts by ip address.",1208,"2020-01-25T04:19:00.000Z","5.3.21","4.9","5.6.3",[184,185,21,186,187],"brute-force","lockout","prevent-brute-force","prevent-brute-force-login","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fervan-limit-login.zip",{"slug":190,"name":191,"version":192,"author":193,"author_profile":194,"description":195,"short_description":196,"active_installs":157,"downloaded":197,"rating":11,"num_ratings":29,"last_updated":198,"tested_up_to":199,"requires_at_least":200,"requires_php":25,"tags":201,"homepage":25,"download_link":206,"security_score":169,"vuln_count":50,"unpatched_count":50,"last_vuln_date":39,"fetched_at":31},"login-mandatory-pages","Login Mandatory Pages","1.2","dinesh224","https:\u002F\u002Fprofiles.wordpress.org\u002Fdinesh224\u002F","\u003Cp>Login Mandatory pages is a good handy and free solution for everyone who is looking to convert their simple pages to only accessible for logged in user.\u003Cbr \u002F>\nIt also provides setting to users to modify text on selected pages and also users can set their “login” page link.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>Login Mandatory pages\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Easy to install\u003C\u002Fli>\n\u003Cli>Select the pages which you want to inaccessible for guest users\u003C\u002Fli>\n\u003Cli>You can set message on selected pages.\u003C\u002Fli>\n\u003Cli>You can also add a link of your website’s login page.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fblockquote>\n","Login Mandatory pages is a WordPress plugin that allows you to make pages accessible for only logged in users.",1346,"2017-10-04T11:21:00.000Z","4.8.28","4.0",[202,20,203,204,205],"control-pages","login-page","login-pages","user-access-control","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-mandatory-pages.1.2.zip",{"attackSurface":208,"codeSignals":296,"taintFlows":340,"riskAssessment":366,"analyzedAt":377},{"hooks":209,"ajaxHandlers":284,"restRoutes":292,"shortcodes":293,"cronEvents":294,"entryPointCount":295,"unprotectedCount":50},[210,217,222,225,228,232,236,239,243,248,251,254,259,263,267,271,275,278,281],{"type":211,"name":212,"callback":213,"priority":214,"file":215,"line":216},"filter","manage_edit-shop_order_columns","custom_shop_order_column",20,"admin\u002Forder-page.php",11,{"type":218,"name":219,"callback":220,"priority":214,"file":215,"line":221},"action","manage_shop_order_posts_custom_column","custom_orders_list_column_content",12,{"type":218,"name":223,"callback":224,"file":215,"line":14},"admin_footer","my_action_javascript",{"type":218,"name":226,"callback":227,"file":215,"line":109},"restrict_manage_posts","restrict_manage_movie_sort_by_genre",{"type":218,"name":229,"callback":230,"file":215,"line":231},"add_meta_boxes","login_as_order_box",16,{"type":218,"name":233,"callback":234,"file":235,"line":157},"admin_menu","loginas_options_page","admin\u002Fsetting.php",{"type":218,"name":237,"callback":238,"file":235,"line":216},"admin_init","loginas_settings_init",{"type":218,"name":240,"callback":241,"file":235,"line":242},"admin_print_styles","loginas_hkdc_admin_styles",396,{"type":211,"name":244,"callback":245,"file":246,"line":247},"manage_users_columns","new_modify_user_table","admin\u002Fusers.php",9,{"type":211,"name":249,"callback":250,"priority":157,"file":246,"line":157},"manage_users_custom_column","new_modify_user_table_row",{"type":211,"name":252,"callback":253,"priority":157,"file":246,"line":216},"admin_head","admin_head_css",{"type":218,"name":255,"callback":256,"file":257,"line":258},"plugins_loaded","loginasfree_load_textdomain","loginas.php",55,{"type":218,"name":260,"callback":261,"priority":29,"file":257,"line":262},"init","loginas_cleanup_legacy_state",296,{"type":211,"name":264,"callback":265,"priority":157,"file":257,"line":266},"plugin_row_meta","loginasfree_row_meta",330,{"type":218,"name":237,"callback":268,"file":269,"line":270},"free_review_notice","notification.php",162,{"type":218,"name":272,"callback":273,"file":274,"line":247},"wp_footer","home_page_template","template.php",{"type":218,"name":276,"callback":277,"file":274,"line":157},"wp_enqueue_scripts","my_enqueue_ajax_home",{"type":218,"name":279,"callback":280,"file":274,"line":221},"wp_logout","action_wp_logout",{"type":211,"name":282,"callback":283,"file":274,"line":14},"show_admin_bar","maybe_hide_admin_bar",[285,290],{"action":286,"nopriv":49,"callback":287,"hasNonce":288,"hasCapCheck":288,"file":215,"line":289},"my_action_loginas","my_action",true,14,{"action":291,"nopriv":49,"callback":291,"hasNonce":288,"hasCapCheck":49,"file":274,"line":216},"loginas_return_admin",[],[],[],2,{"dangerousFunctions":297,"sqlUsage":298,"outputEscaping":300,"fileOperations":50,"externalRequests":50,"nonceChecks":337,"capabilityChecks":338,"bundledLibraries":339},[],{"prepared":29,"raw":50,"locations":299},[],{"escaped":113,"rawEcho":301,"locations":302},17,[303,306,308,309,311,313,315,317,319,321,323,325,327,329,331,333,335],{"file":215,"line":304,"context":305},155,"raw output",{"file":215,"line":307,"context":305},161,{"file":215,"line":270,"context":305},{"file":235,"line":310,"context":305},266,{"file":235,"line":312,"context":305},273,{"file":235,"line":314,"context":305},279,{"file":235,"line":316,"context":305},286,{"file":235,"line":318,"context":305},293,{"file":235,"line":320,"context":305},299,{"file":235,"line":322,"context":305},306,{"file":235,"line":324,"context":305},313,{"file":235,"line":326,"context":305},320,{"file":235,"line":328,"context":305},327,{"file":235,"line":330,"context":305},333,{"file":235,"line":332,"context":305},340,{"file":235,"line":334,"context":305},347,{"file":269,"line":336,"context":305},241,4,6,[],[341,358],{"entryPoint":342,"graph":343,"unsanitizedCount":50,"severity":357},"my_action_javascript (admin\u002Forder-page.php:144)",{"nodes":344,"edges":355},[345,350],{"id":346,"type":347,"label":348,"file":215,"line":349},"n0","source","$_SERVER",149,{"id":351,"type":352,"label":353,"file":215,"line":304,"wp_function":354},"n1","sink","echo() [XSS]","echo",[356],{"from":346,"to":351,"sanitized":288},"low",{"entryPoint":359,"graph":360,"unsanitizedCount":50,"severity":357},"\u003Corder-page> (admin\u002Forder-page.php:0)",{"nodes":361,"edges":364},[362,363],{"id":346,"type":347,"label":348,"file":215,"line":349},{"id":351,"type":352,"label":353,"file":215,"line":304,"wp_function":354},[365],{"from":346,"to":351,"sanitized":288},{"summary":367,"deductions":368},"The \"login-as-customer-or-user\" v3.9.1 plugin presents a mixed security posture.  While the static analysis indicates a relatively small attack surface with no unprotected entry points and a strong adherence to prepared statements for SQL queries, the plugin's history is a significant concern. The presence of 5 known CVEs, with 2 critically severe and unpatched vulnerabilities, suggests a pattern of recurring security flaws.  These historical issues, including authentication bypass, improper authentication\u002Fauthorization, and CSRF, highlight potential weaknesses in how the plugin handles user access and session management.  Despite the current static analysis showing no critical taint flows and good output escaping, the past vulnerability record indicates that these aspects may have been compromised in previous versions, and the current version might still harbor latent risks or be susceptible to similar attack vectors.",[369,371,373,375],{"reason":370,"points":214},"Unpatched Critical Vulnerabilities",{"reason":372,"points":214},"Significant Vulnerability History (5 CVEs)",{"reason":374,"points":214},"High rate of Critical\u002FHigh severity CVEs",{"reason":376,"points":157},"Potential for previously exploited vulnerabilities","2026-04-16T11:02:56.399Z",{"wat":379,"direct":388},{"assetPaths":380,"generatorPatterns":383,"scriptPaths":384,"versionParams":385},[381,382],"\u002Fwp-content\u002Fplugins\u002Flogin-as-customer-or-user\u002Fassets\u002Fcss\u002Floginas.css","\u002Fwp-content\u002Fplugins\u002Flogin-as-customer-or-user\u002Fassets\u002Fjs\u002Floginas.js",[],[382],[386,387],"login-as-customer-or-user\u002Fassets\u002Fcss\u002Floginas.css?ver=","login-as-customer-or-user\u002Fassets\u002Fjs\u002Floginas.js?ver=",{"cssClasses":389,"htmlComments":391,"htmlAttributes":392,"restEndpoints":394,"jsGlobals":395,"shortcodeOutput":397},[390],"loginas_button",[],[393],"data-loginas-user-id",[],[396],"loginas_vars",[],{"error":288,"url":399,"statusCode":400,"statusMessage":401,"message":401},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Flogin-as-customer-or-user\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":403,"versions":404},18,[405,411,420,429,438,447,455,464,474,484,494,504,514,524,534,544,554,566],{"version":6,"download_url":26,"svn_tag_url":406,"released_at":39,"has_diff":49,"diff_files_changed":407,"diff_lines":39,"trac_diff_url":408,"vulnerabilities":409,"is_current":288},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F3.9.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F3.8&new_path=%2Flogin-as-customer-or-user%2Ftags%2F3.9.1",[410],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"version":412,"download_url":413,"svn_tag_url":414,"released_at":39,"has_diff":49,"diff_files_changed":415,"diff_lines":39,"trac_diff_url":416,"vulnerabilities":417,"is_current":49},"3.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.3.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F3.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F3.7&new_path=%2Flogin-as-customer-or-user%2Ftags%2F3.8",[418,419],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"version":421,"download_url":422,"svn_tag_url":423,"released_at":39,"has_diff":49,"diff_files_changed":424,"diff_lines":39,"trac_diff_url":425,"vulnerabilities":426,"is_current":49},"3.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.3.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F3.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F3.6&new_path=%2Flogin-as-customer-or-user%2Ftags%2F3.7",[427,428],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"version":430,"download_url":431,"svn_tag_url":432,"released_at":39,"has_diff":49,"diff_files_changed":433,"diff_lines":39,"trac_diff_url":434,"vulnerabilities":435,"is_current":49},"3.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.3.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F3.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F3.5&new_path=%2Flogin-as-customer-or-user%2Ftags%2F3.6",[436,437],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"version":439,"download_url":440,"svn_tag_url":441,"released_at":39,"has_diff":49,"diff_files_changed":442,"diff_lines":39,"trac_diff_url":443,"vulnerabilities":444,"is_current":49},"3.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.3.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F3.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F3.3&new_path=%2Flogin-as-customer-or-user%2Ftags%2F3.5",[445,446],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"version":73,"download_url":448,"svn_tag_url":449,"released_at":39,"has_diff":49,"diff_files_changed":450,"diff_lines":39,"trac_diff_url":451,"vulnerabilities":452,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.3.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F3.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F3.2&new_path=%2Flogin-as-customer-or-user%2Ftags%2F3.3",[453,454],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"version":145,"download_url":456,"svn_tag_url":457,"released_at":39,"has_diff":49,"diff_files_changed":458,"diff_lines":39,"trac_diff_url":459,"vulnerabilities":460,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.3.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F3.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F3.1&new_path=%2Flogin-as-customer-or-user%2Ftags%2F3.2",[461,462,463],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":465,"download_url":466,"svn_tag_url":467,"released_at":39,"has_diff":49,"diff_files_changed":468,"diff_lines":39,"trac_diff_url":469,"vulnerabilities":470,"is_current":49},"3.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.3.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F3.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F2.9&new_path=%2Flogin-as-customer-or-user%2Ftags%2F3.1",[471,472,473],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":475,"download_url":476,"svn_tag_url":477,"released_at":39,"has_diff":49,"diff_files_changed":478,"diff_lines":39,"trac_diff_url":479,"vulnerabilities":480,"is_current":49},"2.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.2.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F2.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F2.8&new_path=%2Flogin-as-customer-or-user%2Ftags%2F2.9",[481,482,483],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":485,"download_url":486,"svn_tag_url":487,"released_at":39,"has_diff":49,"diff_files_changed":488,"diff_lines":39,"trac_diff_url":489,"vulnerabilities":490,"is_current":49},"2.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.2.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F2.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F2.7&new_path=%2Flogin-as-customer-or-user%2Ftags%2F2.8",[491,492,493],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":495,"download_url":496,"svn_tag_url":497,"released_at":39,"has_diff":49,"diff_files_changed":498,"diff_lines":39,"trac_diff_url":499,"vulnerabilities":500,"is_current":49},"2.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.2.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F2.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F2.6&new_path=%2Flogin-as-customer-or-user%2Ftags%2F2.7",[501,502,503],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":505,"download_url":506,"svn_tag_url":507,"released_at":39,"has_diff":49,"diff_files_changed":508,"diff_lines":39,"trac_diff_url":509,"vulnerabilities":510,"is_current":49},"2.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.2.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F2.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F2.5&new_path=%2Flogin-as-customer-or-user%2Ftags%2F2.6",[511,512,513],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":515,"download_url":516,"svn_tag_url":517,"released_at":39,"has_diff":49,"diff_files_changed":518,"diff_lines":39,"trac_diff_url":519,"vulnerabilities":520,"is_current":49},"2.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.2.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F2.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F2.4&new_path=%2Flogin-as-customer-or-user%2Ftags%2F2.5",[521,522,523],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":525,"download_url":526,"svn_tag_url":527,"released_at":39,"has_diff":49,"diff_files_changed":528,"diff_lines":39,"trac_diff_url":529,"vulnerabilities":530,"is_current":49},"2.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.2.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F2.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F2.3&new_path=%2Flogin-as-customer-or-user%2Ftags%2F2.4",[531,532,533],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":535,"download_url":536,"svn_tag_url":537,"released_at":39,"has_diff":49,"diff_files_changed":538,"diff_lines":39,"trac_diff_url":539,"vulnerabilities":540,"is_current":49},"2.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.2.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F2.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F2.2&new_path=%2Flogin-as-customer-or-user%2Ftags%2F2.3",[541,542,543],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":545,"download_url":546,"svn_tag_url":547,"released_at":39,"has_diff":49,"diff_files_changed":548,"diff_lines":39,"trac_diff_url":549,"vulnerabilities":550,"is_current":49},"2.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.2.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F2.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F1.6&new_path=%2Flogin-as-customer-or-user%2Ftags%2F2.2",[551,552,553],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":555,"download_url":556,"svn_tag_url":557,"released_at":39,"has_diff":49,"diff_files_changed":558,"diff_lines":39,"trac_diff_url":559,"vulnerabilities":560,"is_current":49},"1.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.1.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F1.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flogin-as-customer-or-user%2Ftags%2F1.3&new_path=%2Flogin-as-customer-or-user%2Ftags%2F1.6",[561,562,563,564,565],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":88,"vuln_type":90,"patched_in_version":87},{"id":97,"url_slug":98,"title":99,"severity":41,"cvss_score":88,"vuln_type":104,"patched_in_version":102},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73},{"version":567,"download_url":568,"svn_tag_url":569,"released_at":39,"has_diff":49,"diff_files_changed":570,"diff_lines":39,"trac_diff_url":39,"vulnerabilities":571,"is_current":49},"1.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-as-customer-or-user.1.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flogin-as-customer-or-user\u002Ftags\u002F1.3\u002F",[],[572,573,574,575,576],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":39},{"id":52,"url_slug":53,"title":54,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":6},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":88,"vuln_type":90,"patched_in_version":87},{"id":97,"url_slug":98,"title":99,"severity":41,"cvss_score":88,"vuln_type":104,"patched_in_version":102},{"id":68,"url_slug":69,"title":70,"severity":57,"cvss_score":58,"vuln_type":74,"patched_in_version":73}]