[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f7C7Ny_nQUE2xVpHYykqYznJh87HZUiiHBzaFQhuR7Bg":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":24,"download_link":25,"security_score":26,"vuln_count":27,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"vulnerabilities":31,"developer":134,"crawl_stats":37,"alternatives":142,"analysis":249,"fingerprints":1348},"loginizer","Loginizer","2.0.6","Softaculous","https:\u002F\u002Fprofiles.wordpress.org\u002Fsoftaculous\u002F","\u003Cp>Loginizer is a WordPress plugin which helps you fight against bruteforce attack by blocking login for the IP after it reaches maximum retries allowed. You can blacklist or whitelist IPs for login using Loginizer. You can use various other features like Two Factor Auth, reCAPTCHA, PasswordLess Login, etc. to improve security of your website.\u003C\u002Fp>\n\u003Cp>Loginizer is actively used by more than 1000000+ WordPress websites.\u003C\u002Fp>\n\u003Cp>You can find our official documentation at \u003Ca href=\"https:\u002F\u002Floginizer.com\u002Fdocs\" rel=\"nofollow ugc\">https:\u002F\u002Floginizer.com\u002Fdocs\u003C\u002Fa>. We are also active in our community support forums on \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Floginizer\" rel=\"ugc\">wordpress.org\u003C\u002Fa> if you are one of our free users. Our Premium Support Ticket System is at \u003Ca href=\"https:\u002F\u002Floginizer.deskuss.com\" rel=\"nofollow ugc\">https:\u002F\u002Floginizer.deskuss.com\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Free Features :\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Brute force protection. IPs trying to brute force your website will be blocked for 15 minutes after 3 failed login attempts. After multiple lockouts the IP is blocked for 24 hours. This is the default configuration and can be changed from Loginizer -> Brute force page in WordPress admin panel.\u003C\u002Fli>\n\u003Cli>Failed login attempts logs.\u003C\u002Fli>\n\u003Cli>Blacklist IPs\u003C\u002Fli>\n\u003Cli>Whitelist IPs\u003C\u002Fli>\n\u003Cli>Custom error messages on failed login.\u003C\u002Fli>\n\u003Cli>Permission check for important files and folders.\u003C\u002Fli>\n\u003Cli>Allow only Trusted IP.\u003C\u002Fli>\n\u003Cli>Blocked Screen in place of the Login page.\u003C\u002Fli>\n\u003Cli>Email Notification on successful login.\u003C\u002Fli>\n\u003Cli>Let users login with LinkedIn\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Get Support and Pro Features\u003C\u002Fh4>\n\u003Cp>Get professional support from our experts and pro features to take your site’s security to the next level with \u003Ca href=\"https:\u002F\u002Floginizer.com\u002Fpricing\" rel=\"nofollow ugc\">Loginizer-Security\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Pro Features :\u003C\u002Fp>\n\u003Cul>\n\u003Cli>MD5 Checksum – of Core WordPress Files. The admin can check and ignore files as well.\u003C\u002Fli>\n\u003Cli>PasswordLess Login – At the time of Login, the username \u002F email address will be asked and an email will be sent to the email address of that account with a temporary link to login.\u003C\u002Fli>\n\u003Cli>Two Factor Auth via Email – On login, an email will be sent to the email address of that account with a temporary 6 digit code to complete the login.\u003C\u002Fli>\n\u003Cli>Two Factor Auth via App – The user can configure the account with a 2FA App like Google Authenticator, Authy, etc.\u003C\u002Fli>\n\u003Cli>Login Challenge Question – The user can setup a Challenge Question and Answer as an additional security layer. After Login, the user will need to answer the question to complete the login.\u003C\u002Fli>\n\u003Cli>reCAPTCHA – Google’s reCAPTCHA v3\u002Fv2, Cloudflare Turnstile, hCAPTCHA can be configured for the Login screen, Comments Section, Registration Form, etc. to prevent automated brute force attacks. Supports WooCommerce as well.\u003C\u002Fli>\n\u003Cli>Rename Login Page – The Admin can rename the login URL (slug) to something different from wp-login.php to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Rename WP-Admin URL – The Admin area in WordPress is accessed via wp-admin. With loginizer you can change it to anything e.g. site-admin\u003C\u002Fli>\n\u003Cli>CSRF Protection – This helps in preventing CSRF attacks as it updates the admin URL with a session string which makes it difficult and nearly impossible for the attacker to predict the URL.\u003C\u002Fli>\n\u003Cli>Rename Login with Secrecy – If set, then all Login URL’s will still point to wp-login.php and users will have to access the New Login Slug by typing it in the browser.\u003C\u002Fli>\n\u003Cli>Disable XML-RPC – An option to simply disable XML-RPC in WordPress. Most of the WordPress users don’t need XML-RPC and can disable it to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Rename XML-RPC – The Admin can rename the XML-RPC to something different from xmlrpc.php to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Username Auto Blacklist – Attackers generally use common usernames like admin, administrator, or variations of your domain name \u002F business name. You can specify such username here and Loginizer will auto-blacklist the IP Address(s) of clients who try to use such username(s).\u003C\u002Fli>\n\u003Cli>New Registration Domain Blacklist – If you would like to ban new registrations from a particular domain, you can use this utility to do so.\u003C\u002Fli>\n\u003Cli>Change the Admin Username – The Admin can rename the admin username to something more difficult.\u003C\u002Fli>\n\u003Cli>Auto Blacklist IPs – IPs will be auto blacklisted, if certain usernames saved by the Admin are used to login by malicious bots \u002F users.\u003C\u002Fli>\n\u003Cli>Disable Pingbacks – Simple way to disable PingBacks.\u003C\u002Fli>\n\u003Cli>SSO – Single Sign-on, let any user access to your WordPress Dashboard without the need to share username or password.\u003C\u002Fli>\n\u003Cli>Limit Concurrent Logins – It prevents user to login from different devices concurrently, you can define how many devices you want to allow, and how you want to restrict the user when concurrent limit is reached.\u003C\u002Fli>\n\u003Cli>Social Login – Users can login or register with their Google, Github, Facebook, X (Twitter), Discord, Twitch, LinkedIn, Microsoft with support for WooCommerce and Ultimate Member.\u003C\u002Fli>\n\u003Cli>Key Less Social Login – Use Loginizer’s Social Auth for easy key less Social login configuration, now supports Google, GitHub, X, LinkedIn more to be added later\u003C\u002Fli>\n\u003Cli>Country Blocking – Block IPs from specific countries to restrict access to your website.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Features in Loginizer include:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Blocks IP after maximum retries allowed\u003C\u002Fli>\n\u003Cli>Extended Lockout after maximum lockouts allowed\u003C\u002Fli>\n\u003Cli>Email notification to admin after max lockouts\u003C\u002Fli>\n\u003Cli>Blacklist IP\u002FIP range\u003C\u002Fli>\n\u003Cli>Whitelist IP\u002FIP range\u003C\u002Fli>\n\u003Cli>Check logs of failed attempts\u003C\u002Fli>\n\u003Cli>Create IP ranges\u003C\u002Fli>\n\u003Cli>Delete IP ranges\u003C\u002Fli>\n\u003Cli>Licensed under LGPLv2.1\u003C\u002Fli>\n\u003Cli>Safe & Secure\u003C\u002Fli>\n\u003C\u002Ful>\n","Loginizer is a WordPress security plugin which helps you fight against bruteforce attacks.",1000000,29791210,96,1020,"2026-03-02T12:38:00.000Z","6.9.4","3.0","5.5",[20,21,22,4,23],"access","admin","login","security","https:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Floginizer\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Floginizer.2.0.6.zip",87,8,0,"2024-11-04 00:00:00","2026-03-15T15:16:48.613Z",[32,48,64,78,88,103,114,125],{"id":33,"url_slug":34,"title":35,"description":36,"plugin_slug":4,"theme_slug":37,"affected_versions":38,"patched_in_version":39,"severity":40,"cvss_score":41,"cvss_vector":42,"vuln_type":43,"published_date":29,"updated_date":44,"references":45,"days_to_patch":47},"CVE-2024-10097","loginizer-security-and-loginizer-authentication-bypass-via-wordpresscom-oauth-provider","Loginizer Security and Loginizer \u003C= 1.9.2 - Authentication Bypass via WordPress.com OAuth provider","The Loginizer Security and Loginizer plugins for WordPress are vulnerable to authentication bypass in all versions up to, and including, 1.9.2. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.",null,"\u003C=1.9.2","1.9.3","high",8.1,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Authentication","2025-02-19 17:41:19",[46],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5db00b22-d766-4fde-86fe-98d90936028c?source=api-prod",108,{"id":49,"url_slug":50,"title":51,"description":52,"plugin_slug":4,"theme_slug":37,"affected_versions":53,"patched_in_version":54,"severity":55,"cvss_score":56,"cvss_vector":57,"vuln_type":58,"published_date":59,"updated_date":60,"references":61,"days_to_patch":63},"CVE-2023-2296","loginizer-reflected-cross-site-scripting-via-limitsessioncount","Loginizer \u003C= 1.7.8 - Reflected Cross-Site Scripting via 'limit_session[count]'","The Loginizer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘limit_session[count]’ parameter in versions up to, and including, 1.7.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.","\u003C=1.7.8","1.7.9","medium",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2023-05-02 00:00:00","2024-01-22 19:56:02",[62],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F4e6ef932-975c-423b-b780-b38449eec577?source=api-prod",266,{"id":65,"url_slug":66,"title":67,"description":68,"plugin_slug":4,"theme_slug":37,"affected_versions":69,"patched_in_version":70,"severity":55,"cvss_score":71,"cvss_vector":72,"vuln_type":73,"published_date":74,"updated_date":60,"references":75,"days_to_patch":77},"CVE-2022-45079","loginizer-cross-site-request-forgery","Loginizer \u003C= 1.7.5 - Cross-Site Request Forgery","The Loginizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.5. This is due to missing or incorrect nonce validation on the loginizer_backuply_promo() function. This makes it possible for unauthenticated attackers to install the backuply plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.","\u003C1.7.6","1.7.6",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Cross-Site Request Forgery (CSRF)","2022-12-05 00:00:00",[76],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F11bdcf58-be0c-4fdb-ac15-ee4c3afe7275?source=api-prod",414,{"id":79,"url_slug":80,"title":81,"description":82,"plugin_slug":4,"theme_slug":37,"affected_versions":83,"patched_in_version":70,"severity":55,"cvss_score":56,"cvss_vector":57,"vuln_type":58,"published_date":84,"updated_date":60,"references":85,"days_to_patch":87},"CVE-2022-45084","loginizer-reflected-cross-site-scripting-via-name","Loginizer \u003C= 1.7.5 - Reflected Cross-Site Scripting via 'name'","The Loginizer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘name’ parameter in versions up to, and including, 1.7.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.","\u003C=1.7.5","2022-05-12 00:00:00",[86],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F410ae0f1-a4ed-4631-9f80-86b7a403ce0d?source=api-prod",621,{"id":89,"url_slug":90,"title":91,"description":92,"plugin_slug":4,"theme_slug":37,"affected_versions":93,"patched_in_version":94,"severity":95,"cvss_score":96,"cvss_vector":97,"vuln_type":98,"published_date":99,"updated_date":60,"references":100,"days_to_patch":102},"CVE-2020-27615","loginizer-sql-injection","Loginizer \u003C= 1.6.3 - SQL Injection","The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.","\u003C1.6.4","1.6.4","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2020-10-21 00:00:00",[101],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F58f8bba4-1be5-4111-aa41-d076a6f06948?source=api-prod",1189,{"id":104,"url_slug":105,"title":106,"description":107,"plugin_slug":4,"theme_slug":37,"affected_versions":108,"patched_in_version":109,"severity":55,"cvss_score":56,"cvss_vector":57,"vuln_type":58,"published_date":110,"updated_date":60,"references":111,"days_to_patch":113},"CVE-2018-11366","loginizer-unauthenticated-stored-cross-site-scripting","Loginizer 1.3.8-1.3.9 - Unauthenticated Stored Cross-Site Scripting","init.php in the Loginizer plugin 1.3.8 through 1.3.9 for WordPress has Unauthenticated Stored Cross-Site Scripting (XSS) because logging is mishandled. This is fixed in 1.4.0.",">=1.3.8 \u003C=1.3.9","1.4.0","2018-05-22 00:00:00",[112],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa05b1d00-386f-4914-80e6-92d3e9721dc5?source=api-prod",2072,{"id":115,"url_slug":116,"title":117,"description":118,"plugin_slug":4,"theme_slug":37,"affected_versions":119,"patched_in_version":120,"severity":95,"cvss_score":96,"cvss_vector":97,"vuln_type":98,"published_date":121,"updated_date":60,"references":122,"days_to_patch":124},"CVE-2017-12650","loginizer-blind-sql-injection","Loginizer \u003C= 1.3.5 - Blind SQL Injection","SQL Injection exists in the Loginizer plugin before 1.3.6 for WordPress via the X-Forwarded-For HTTP header.","\u003C1.3.6","1.3.6","2017-08-08 00:00:00",[123],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F595fac73-c583-4712-ad37-fbd0fa3eb147?source=api-prod",2359,{"id":126,"url_slug":127,"title":128,"description":129,"plugin_slug":4,"theme_slug":37,"affected_versions":119,"patched_in_version":120,"severity":40,"cvss_score":130,"cvss_vector":131,"vuln_type":73,"published_date":121,"updated_date":60,"references":132,"days_to_patch":124},"CVE-2017-12651","loginizer-cross-site-request-forgery-2","Loginizer \u003C= 1.3.5 - Cross-Site Request Forgery","Cross Site Request Forgery (CSRF) exists in the Blacklist and Whitelist IP Wizard in init.php in the Loginizer plugin before 1.3.6 for WordPress because the HTTP Referer header is not checked.",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:H\u002FI:H\u002FA:H",[133],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe91c0935-4213-4376-86ec-7ff78808fb9e?source=api-prod",{"slug":135,"display_name":7,"profile_url":8,"plugin_count":136,"total_installs":137,"avg_security_score":138,"avg_patch_time_days":139,"trust_score":140,"computed_at":141},"softaculous",10,4114000,95,333,76,"2026-04-04T02:11:27.997Z",[143,163,187,207,231],{"slug":144,"name":145,"version":146,"author":147,"author_profile":148,"description":149,"short_description":150,"active_installs":136,"downloaded":151,"rating":28,"num_ratings":28,"last_updated":152,"tested_up_to":153,"requires_at_least":154,"requires_php":152,"tags":155,"homepage":152,"download_link":160,"security_score":161,"vuln_count":28,"unpatched_count":28,"last_vuln_date":37,"fetched_at":162},"secure-admin-access","Secure Admin Access","1.0","maheshkathiriya","https:\u002F\u002Fprofiles.wordpress.org\u002Fmaheshkathiriya\u002F","\u003Cp>If you run a WordPress website, you should absolutely use “Secure-Admin-Access” to secure it against hackers.\u003C\u002Fp>\n\u003Cp>Secure Admin Access fixes a glaring security hole in the WordPress community: the well-known problem of the admin panel URL.\u003Cbr \u002F>\nEveryone knows where the admin panel, and this includes hackers as well.\u003C\u002Fp>\n\u003Cp>Secure Admin Access helps solve this problem by allowing webmasters to customize their admin panel URL and blocking the default links.\u003C\u002Fp>\n\u003Cp>After you setup Secure Admin Access, webmasters will be able to change the “yourwebsitename.com\u002Fwp-admin” link into something like “yourwebsitename.com\u002Fyour-custom-string”.\u003Cbr \u002F>\nAll queries for the classic “\u002Fwp-admin\u002F” and “wp-login.php” files will be redirected to the homepage, while access to the WP backend will be allowed only for the custom URL.\u003C\u002Fp>\n\u003Cp>The plugin also comes with some access filters, allowing webmasters to restrict guest and registered users access to wp-admin, just in case you want some of your editors to log in the classic way.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>NOTE :Back up your database before beginning the activate plugin.\u003C\u002Fstrong>\u003Cbr \u002F>\nIt is extremely important to back up your database before beginning the activate plugin. If, for some reason, you find it necessary to restore your database from these backups. Plugin will not work for IIS.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Limit Dashboard access to admins only, admins + editors, admins + editors + authors, or limit by specific capability.\u003C\u002Fli>\n\u003Cli>Create your own redirect URL\u003C\u002Fli>\n\u003Cli>Optionally allow user profile access\u003C\u002Fli>\n\u003Cli>Define custom wp-admin url(Like http:\u002F\u002Fyourdomain.com\u002Fmypanel)\u003C\u002Fli>\n\u003Cli>Define custom Logo OR change default logo on login page\u003C\u002Fli>\n\u003Cli>Define body background color on login page \u003C\u002Fli>\n\u003Cli>SEO friendly URL for “Register” page (Like http:\u002F\u002Fyourdomain.com\u002Fmypanel\u002Fregister)\u003C\u002Fli>\n\u003Cli>SEO friendly URL for “Lost Password” page (Like http:\u002F\u002Fyourdomain.com\u002Fmypanel\u002Flostpassword)\u003C\u002Fli>\n\u003Cli>Restrict guest users for access to wp-admin\u003C\u002Fli>\n\u003Cli>Restrict registered non-admin users from wp-admin\u003C\u002Fli>\n\u003Cli>Allow admin access to non-admin users by define comma seprate multiple ids users \u003C\u002Fli>\n\u003Cli>Login Security \u003C\u002Fli>\n\u003Cli>Limit Login Attempts and track user login attempts\u003C\u002Fli>\n\u003Cli>Login attempts and block IP temporarily\u003C\u002Fli>\n\u003Cli>Much more!\u003C\u002Fli>\n\u003C\u002Ful>\n","Secure Your Website Admin And Dashboard Access & Modify Login Page Design & Login Attempts for login protection",1188,"","4.7.32","3.3",[156,157,158,159,144],"limit-login-attempts","login-attempt","login-attempts","login-security","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsecure-admin-access.zip",100,"2026-03-15T10:48:56.248Z",{"slug":164,"name":165,"version":166,"author":167,"author_profile":168,"description":169,"short_description":170,"active_installs":171,"downloaded":172,"rating":173,"num_ratings":174,"last_updated":175,"tested_up_to":16,"requires_at_least":176,"requires_php":177,"tags":178,"homepage":182,"download_link":183,"security_score":184,"vuln_count":185,"unpatched_count":28,"last_vuln_date":186,"fetched_at":30},"hide-my-wp","WP Ghost (Hide My WP Ghost) – Security & Firewall","5.5.02","John Darrel","https:\u002F\u002Fprofiles.wordpress.org\u002Fjohndarrel\u002F","\u003Cp>Level up your WordPress security with the WP Ghost plugin! \u003Ca href=\"https:\u002F\u002Fwpghost.com\u002Fkb\u002F99-fewer-hacker-attacks-on-wordpress-sites\u002F\" rel=\"nofollow ugc\">99% Fewer Hacker Attacks on WordPress Sites\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WP Ghost\u003C\u002Fstrong> (formerly Hide My WP Ghost) is a \u003Cstrong>comprehensive hack-prevention security solution for WordPress\u003C\u002Fstrong> websites. It adds \u003Cstrong>multiple layers of security to block hacker bots and prevent unauthorized access\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>It works by changing and hiding common vulnerabilities, making it difficult for bots and hackers to exploit weak points in plugins, themes, and the WordPress core itself.\u003C\u002Fp>\n\u003Cp>WP Ghost Network Stats: \u003Cstrong>blocked over 10 million monthly brute-force attempts\u003C\u002Fstrong> and \u003Cstrong>prevented over 100 million monthly threats\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>Key features include powerful protection against:\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cul>\n\u003Cli>Brute Force Attacks\u003C\u002Fli>\n\u003Cli>SQL Injection Attacks\u003C\u002Fli>\n\u003Cli>Script Injection Attacks\u003C\u002Fli>\n\u003Cli>Vulnerability Exploit\u003C\u002Fli>\n\u003Cli>Malware Injection\u003C\u002Fli>\n\u003Cli>XML-RPC attacks\u003C\u002Fli>\n\u003Cli>File Inclusion Exploits\u003C\u002Fli>\n\u003Cli>Directory Traversal Attacks\u003C\u002Fli>\n\u003Cli>Default WP Paths Exploits\u003C\u002Fli>\n\u003Cli>Cross-Site Scripting (XSS)\u003C\u002Fli>\n\u003Cli>Throttling of Access Attempts to Entry Points\u003C\u002Fli>\n\u003Cli>and more\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fblockquote>\n\u003Cp>Protect your site today! WP Ghost hides and secures all common paths, plugins, and themes from hacker bots and spammers.\u003C\u002Fp>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FQMdoSN8dk1c?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003Cbr \u002F>\nYouTube – Why You Must Have \u003Ca href=\"https:\u002F\u002Fwpghost.com\" rel=\"nofollow ugc\">Hide My WP\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>WP Ghost is packed with over 65 security-free features:\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>Change and Hide Paths:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Hide WordPress wp-admin, and show 404 error or a custom page\u003C\u002Fli>\n\u003Cli>Hide WordPress wp-login.php, and show 404 error or a custom page\u003C\u002Fli>\n\u003Cli>Hide WordPress Common Paths\u003C\u002Fli>\n\u003Cli>Hide WordPress Common Files\u003C\u002Fli>\n\u003Cli>Change the wp-admin and wp-login URLs\u003C\u002Fli>\n\u003Cli>Change lost password URL\u003C\u002Fli>\n\u003Cli>Change register URL\u003C\u002Fli>\n\u003Cli>Change logout URL\u003C\u002Fli>\n\u003Cli>Change activation URL\u003C\u002Fli>\n\u003Cli>Change admin-ajax URL\u003C\u002Fli>\n\u003Cli>Change wp-content URL\u003C\u002Fli>\n\u003Cli>Change wp-includes URL\u003C\u002Fli>\n\u003Cli>Change uploads URL\u003C\u002Fli>\n\u003Cli>Change comments URL\u003C\u002Fli>\n\u003Cli>Change author URL\u003C\u002Fli>\n\u003Cli>Change plugins URL\u003C\u002Fli>\n\u003Cli>Change plugins name\u003C\u002Fli>\n\u003Cli>Change themes URL\u003C\u002Fli>\n\u003Cli>Change themes name\u003C\u002Fli>\n\u003Cli>Custom themes style.css name\u003C\u002Fli>\n\u003Cli>Change REST API wp-json URL\u003C\u002Fli>\n\u003Cli>Change category URL\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Change tags URL\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Custom login redirects based on user role\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Custom logout redirects based on user role\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Change URLs from Relative to Absolute\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>Change URLs in Ajax calls\u003C\u002Fli>\n\u003Cli>Change URLs for Logged Users\u003C\u002Fli>\n\u003Cli>Change URLs in Cache Files\u003C\u002Fli>\n\u003Cli>Change paths in Sitemap.xml\u003C\u002Fli>\n\u003Cli>Change paths in Robots.txt\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Firewall:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Two-factor Authentication By Code (2FA)\u003C\u002Fli>\n\u003Cli>Two-factor Authentication By Email (2FA)\u003C\u002Fli>\n\u003Cli>Two-factor Authentication By Passkey (2FA)\u003C\u002Fli>\n\u003Cli>Security Headers against XSS & Code Injections\u003C\u002Fli>\n\u003Cli>Security Header Strict-Transport-Security\u003C\u002Fli>\n\u003Cli>Security Header Content-Security-Policy\u003C\u002Fli>\n\u003Cli>Security Header X-XSS-Protection\u003C\u002Fli>\n\u003Cli>Security Header X-Content-Type-Options\u003C\u002Fli>\n\u003Cli>Security Header X-Frame-Options\u003C\u002Fli>\n\u003Cli>Firewall against Script Injections and SQL Injection\u003C\u002Fli>\n\u003Cli>7G Firewall Security Filter\u003C\u002Fli>\n\u003Cli>8G Firewall Security Filter\u003C\u002Fli>\n\u003Cli>Block by IP Addresses\u003C\u002Fli>\n\u003Cli>Block by User Agents\u003C\u002Fli>\n\u003Cli>Block by Referrers\u003C\u002Fli>\n\u003Cli>Block by Hostnames\u003C\u002Fli>\n\u003Cli>Hide Website from Theme Detectors\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Hide Options:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Hide \u002Fwp-admin path\u003C\u002Fli>\n\u003Cli>Hide \u002Fwp-login path\u003C\u002Fli>\n\u003Cli>Hide \u002Flogin path\u003C\u002Fli>\n\u003Cli>Hide REST API wp-json path\u003C\u002Fli>\n\u003Cli>Hide Admin Toolbar based on user role\u003C\u002Fli>\n\u003Cli>Hide style IDs and META IDs\u003C\u002Fli>\n\u003Cli>Hide WordPress HTML comments\u003C\u002Fli>\n\u003Cli>Hide Version and WordPress Tags\u003C\u002Fli>\n\u003Cli>Hide DNS Prefetch WordPress link\u003C\u002Fli>\n\u003Cli>Hide WordPress Generator Meta\u003C\u002Fli>\n\u003Cli>Hide RSD (Really Simple Directory) header\u003C\u002Fli>\n\u003Cli>Hide Emoticons if you don’t use them\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Disable Options:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Disable REST API access\u003C\u002Fli>\n\u003Cli>Disable XML-RPC access\u003C\u002Fli>\n\u003Cli>Disable Embed scripts\u003C\u002Fli>\n\u003Cli>Disable DB-Debug in Frontend\u003C\u002Fli>\n\u003Cli>Disable WLW Manifest scripts\u003C\u002Fli>\n\u003Cli>Disable Select All – Ctrl+A (Windows and Linux), ⌘+A (macOS)\u003C\u002Fli>\n\u003Cli>Disable Copy – Ctrl+C (Windows and Linux), ⌘+C (macOS)\u003C\u002Fli>\n\u003Cli>Disable Cut – Ctrl+X (Windows and Linux), ⌘+X (macOS)\u003C\u002Fli>\n\u003Cli>Disable Paste – Ctrl+V (Windows and Linux), ⌘+V (macOS)\u003C\u002Fli>\n\u003Cli>Disable Save – Ctrl+S (Windows and Linux), ⌘+S (macOS)\u003C\u002Fli>\n\u003Cli>Disable Inspect Element\u002FDeveloper Tool –  Ctrl+Shift+I (Windows and Linux), ⌘+⌥+I (macOS)\u003C\u002Fli>\n\u003Cli>Disable View Source – Ctrl+U (Windows and Linux), ⌘+U (macOS)\u003C\u002Fli>\n\u003Cli>Disable Right Click\u003C\u002Fli>\n\u003Cli>Disable Drag-Drop\u003C\u002Fli>\n\u003Cli>Disable Image Dragging by Mouse\u003C\u002Fli>\n\u003Cli>Disable Text Selection\u003C\u002Fli>\n\u003Cli>Disable Directory Browsing\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Mapping Text and URLs: \u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Change URLs using URL Mapping\u003C\u002Fli>\n\u003Cli>Change classes using Text Mapping\u003C\u002Fli>\n\u003Cli>Change CDN URLs using CDN Mapping\u003C\u002Fli>\n\u003Cli>Change paths in the cache files\u003C\u002Fli>\n\u003Cli>Change paths in the Feed link\u003C\u002Fli>\n\u003Cli>Change paths in the Sitemap XML\u003C\u002Fli>\n\u003Cli>Change paths in the Robots.txt\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Brute Force Protection: \u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Brute Force Protection with Math reCaptcha\u003C\u002Fli>\n\u003Cli>Brute Force Protection with Google reCaptcha V2\u003C\u002Fli>\n\u003Cli>Brute Force Protection with Google reCaptcha V3\u003C\u002Fli>\n\u003Cli>Brute Force Protection with Google Enterprise reCaptcha\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Login\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Password Lost\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Signup\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Comment\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Woocommerce Login\u003C\u002Fli>\n\u003Cli>Brute Force Protection shortcode [hmwp_bruteforce]\u003C\u002Fli>\n\u003Cli>Custom attempts, timeout, message\u003C\u002Fli>\n\u003Cli>Manage Blacklist and Whitelist IPs\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Extra Features: \u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Magic Link Login Without Password\u003C\u002Fli>\n\u003Cli>Temporary Logins Without Password\u003C\u002Fli>\n\u003Cli>Fix relative URLs\u003C\u002Fli>\n\u003Cli>Backup and Restore settings\u003C\u002Fli>\n\u003Cli>Change classes on source code using Text Mapping\u003C\u002Fli>\n\u003Cli>Change URLs on source code using URL Mapping\u003C\u002Fli>\n\u003Cli>Cache CSS, JS, and Images to optimize the loading speed\u003C\u002Fli>\n\u003Cli>Weekly security checks and reports\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Integrations:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Support for WP Multisite\u003C\u002Fli>\n\u003Cli>Support for Nginx\u003C\u002Fli>\n\u003Cli>Support for IIS\u003C\u002Fli>\n\u003Cli>Support for LiteSpeed\u003C\u002Fli>\n\u003Cli>Support for Apache\u003C\u002Fli>\n\u003Cli>Support for Siteground\u003C\u002Fli>\n\u003Cli>Support for WP Engine\u003C\u002Fli>\n\u003Cli>Support for AWS Hosting\u003C\u002Fli>\n\u003Cli>Support for Inmotion Hosting\u003C\u002Fli>\n\u003Cli>Support for Hostgator Hosting\u003C\u002Fli>\n\u003Cli>Support for Godaddy Hosting\u003C\u002Fli>\n\u003Cli>Support for Host1plus\u003C\u002Fli>\n\u003Cli>Support for Payperhost\u003C\u002Fli>\n\u003Cli>Support for Fastcomet\u003C\u002Fli>\n\u003Cli>Support for Dreamhost\u003C\u002Fli>\n\u003Cli>Support for Bitnami Apache\u003C\u002Fli>\n\u003Cli>Support for Bitnami Nginx\u003C\u002Fli>\n\u003Cli>Support for Google Cloud Hosting\u003C\u002Fli>\n\u003Cli>Support for Litespeed Hosting\u003C\u002Fli>\n\u003Cli>Support for Flywheels Local\u003C\u002Fli>\n\u003Cli>Support for Flywheels Hosting\u003C\u002Fli>\n\u003Cli>Support for Ploi Hosting\u003C\u002Fli>\n\u003Cli>Support for Namecheap Hosting\u003C\u002Fli>\n\u003Cli>Support for RunCloud Hosting\u003C\u002Fli>\n\u003Cli>Support for WPEngine Hosting\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Support for CloudPanel Hosting\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Recommended by Wp Rocket\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>Recommended by WPML\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Premium Security Features (over 80):\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>WordPress Hardening\u003C\u002Fli>\n\u003Cli>Hide WordPress Common Paths by Extension\u003C\u002Fli>\n\u003Cli>Hide WordPress Files like wp-config.php, wp-config-sample.php, wp-load.php, wp-settings.php, wp-blog-header.php, readme.html, readme.txt, install.php, license.txt, php.ini, hidemywp.conf, bb-config.php, error_log, debug.log\u003C\u002Fli>\n\u003Cli>Security Threats Monitoring\u003C\u002Fli>\n\u003Cli>Events\u002FActions Monitoring\u003C\u002Fli>\n\u003Cli>Brute Force Monitoring\u003C\u002Fli>\n\u003Cli>Geo Security\u003C\u002Fli>\n\u003Cli>Country Blocking\u003C\u002Fli>\n\u003Cli>Vulnerability Management\u003C\u002Fli>\n\u003Cli>Files Permission Fix\u003C\u002Fli>\n\u003Cli>Database Prefix Change\u003C\u002Fli>\n\u003Cli>SALT Keys Change\u003C\u002Fli>\n\u003Cli>Premium Support\u003C\u002Fli>\n\u003Cli>and more\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fwpghost.com\u002Ffeatures\u002F\" rel=\"nofollow ugc\">Hide My WP Premium Feature\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fblockquote>\n\u003Cp>Compatible server types: \u003Cstrong>WP Multisite, Apache, Litespeed, Nginx, and Windows IIS\u003C\u002Fstrong>.\u003Cbr \u002F>\nHosting Compatibility checked: \u003Cstrong>WP Engine, Inmotion Hosting, Hostgator Hosting, Godaddy Hosting, Host1plus, Payperhost, Fastcomet, Dreamhost, Bitnami Apache, Bitnami Nginx, Google Cloud Hosting, Amazon AWS Lightsail, Litespeed Hosting, Flywheels Hosting, Kinsta Hosting, Ploi.io, CloudPanel, RunCloud, Rocket Domain, Yunohost\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Plugins Compatibility updates: \u003Cstrong>Woocommerce, WPML, WPMUDEV, W3 Total Cache, Gravity, WP Super Cache, WP Fastest Cache, Hummingbird Cache, Cachify Cache, Litespeed Cache, SiteGround Optimizer, Nitropack,\u003Cbr \u002F>\nCache Enabler, CDN Enabler, WOT Cache, Autoptimize, Jetpack by WordPress, Contact Form 7, bbPress, Manage WP,\u003Cbr \u002F>\nAll In One SEO, Rank Math, Yoast SEO, Squirrly SEO, WP-Rocket, Minify HTML, Solid Security, Sucuri Security, Really Simple SSL, WordFence Security, WP Cerber Security, BBQ Firewall, Anti-Malware Security,\u003Cbr \u002F>\nBack-Up WordPress, Elementor Page Builder, Divi Builder, Weglot Translate, AddToAny Share Btn, Limit Login Attempts Reloaded, Loginizer, Shield Security, Asset CleanUp, WP Hide & Security Enhancer, and more\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Compatibility Plugins List: \u003Ca href=\"https:\u002F\u002Fwpghost.com\u002Fkb\u002Fwp-ghost-compatibility-plugins-list\u002F\" rel=\"nofollow ugc\">Hide My WP Compatibility Plugins\u003C\u002Fa>\u003Cbr \u002F>\nCompatibility Theme List: \u003Ca href=\"https:\u002F\u002Fwpghost.com\u002Fkb\u002Fwp-ghost-compatibility-themes-list\u002F\" rel=\"nofollow ugc\">Hide My WP Compatibility Themes\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>WP Ghost changes and hides WP common paths, admin & login paths, plugin paths, and theme paths, protecting your site from hacker bots.\u003C\u002Fp>\n\u003Cp>Note! No files or directories are physically altered. All changes are implemented through server rewrite rules, ensuring no impact on SEO or loading speed.\u003C\u002Fp>\n\u003Cp>The plugin works with other security plugins and adds a layer of security to your WordPress website against hacker bots.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>Check the Demo Website source code:\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002F\u003C\u002Fa>\u003Cbr \u002F>\n  (the elementor is changed in files and classes)\u003C\u002Fp>\n\u003Cp>Check the Redirected URLs in Demo Website (all are redirected to Front Page):\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-admin\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-admin\u003C\u002Fa>\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-login\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-login\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Check the Hidden Common Paths in Demo Website (all show 404 Page Not Found):\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u003C\u002Fa>\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002Fplugins\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002Fplugins\u003C\u002Fa>\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002Fthemes\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002Fthemes\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cp>Over 90,000 hacking attacks per minute strike WordPress sites and WordPress hosting around the world, hitting not only large corporate websites packed with sensitive data, but also sites belonging to small businesses, independent entrepreneurs, and individuals running personal blogs.\u003C\u002Fp>\n\u003Cp>Security of WordPress sites typically tops the list of concerns for new and experienced website owners alike.\u003C\u002Fp>\n\u003Cp>For owners of WordPress sites, statistics like that one raises particular worries about the security not just of individual WordPress sites, but of WordPress itself.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Is your website secure?\u003C\u002Fstrong> Check your website with \u003Ca href=\"https:\u002F\u002Fwpplugins.tips\u002Fwordpress-vulnerability-detector\u002F\" rel=\"nofollow ugc\">Free Website Security Check\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Protect your WordPress website by hiding the authentication paths like wp-admin, wp-login.php, login, wp-signup.php, and change the common WordPress paths like wp-content, wp-includes, uploads, and more.\u003C\u002Fp>\n\u003Cp>Being able to protect the common paths is critical because you get to keep hacker bots away from sensitive website data.\u003C\u002Fp>\n\u003Cp>This is crucial, and it will provide you with a great experience and perfect results in the long term.\u003C\u002Fp>\n\u003Cp>It will surely be worth it, not to mention that hiding the common paths will make hacking a lot harder as well.\u003C\u002Fp>\n\u003Cp>If you don’t protect yourself, you will end up having a hacked website sooner or later.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>This is a free version of the plugin, so you can use it for all your websites without any restrictions.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Secure your website in just minutes with the WP Ghost plugin. Protect your WordPress site against hacker bots and spammers!\u003C\u002Fp>\n\u003Cp>GitHub version: \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fjohndarrel\u002Fhide-my-wp\" rel=\"nofollow ugc\">https:\u002F\u002Fgithub.com\u002Fjohndarrel\u002Fhide-my-wp\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Thank you all for your trust, support, and positive reviews!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Important!\u003C\u002Fstrong> This is not the Hide My WP Nulled version of the Hide My WP Codecanyon plugin.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Ready To Protect Your Website From Hackers With The Most USER-FRIENDLY WordPress Security Plugin?\u003C\u002Fstrong>\u003C\u002Fp>\n","Hide and Secure WP paths, wp-login, wp-admin, and more. Hack Prevention, Security, Brute Force protection, 8G Firewall, 2FA Passkey Login, and more.",100000,2453125,90,369,"2026-02-26T19:29:00.000Z","5.3","7.0",[179,180,22,23,181],"firewall","hide","wp-admin","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fhide-my-wp\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhide-my-wp.5.5.02.zip",92,7,"2025-03-19 00:00:00",{"slug":188,"name":189,"version":190,"author":191,"author_profile":192,"description":193,"short_description":194,"active_installs":195,"downloaded":196,"rating":184,"num_ratings":197,"last_updated":198,"tested_up_to":199,"requires_at_least":200,"requires_php":176,"tags":201,"homepage":205,"download_link":206,"security_score":184,"vuln_count":28,"unpatched_count":28,"last_vuln_date":37,"fetched_at":30},"remove-dashboard-access-for-non-admins","Remove Dashboard Access","1.2.1","TrustedLogin","https:\u002F\u002Fprofiles.wordpress.org\u002Ftrustedlogin\u002F","\u003Cp>The easiest and safest way to restrict access to your WordPress site’s Dashboard and administrative menus. Remove Dashboard Access is a lightweight plugin that automatically redirects users who shouldn’t have access to the Dashboard to a custom URL of your choosing. Redirects can also be configured on a per-role\u002Fper-capability basis, allowing you to keep certain users out of the Dashboard, while retaining access for others.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limit Dashboard access to user roles:\n\u003Cul>\n\u003Cli>Admins only\u003C\u002Fli>\n\u003Cli>Admins + editors\u003C\u002Fli>\n\u003Cli>Admins, editors, and authors\u003C\u002Fli>\n\u003Cli>or restrict by specific user capability\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Choose your own redirect URL\u003C\u002Fli>\n\u003Cli>Optionally allow users to edit their profiles\u003C\u002Fli>\n\u003Cli>Display a message on the login screen so users know why they’re being redirected\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Blocking access to the Dashboard is a great way to prevent clients from breaking their sites, prevent users from seeing things they shouldn’t, and to keep your site’s backend more secure.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Allow only users with roles or capabilities:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>You can restrict Dashboard access to Admins only, Editors or above, Authors or above, or by selecting a specific user capability.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Grant access to user profiles:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Optionally allow all users the ability to edit their profiles in the Dashboard. Users lacking the chosen capability won’t be able to access any other sections of the Dashboard.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Show a custom login message:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Supply a message to display on the login screen. Leaving this blank disables the message.\u003C\u002Fli>\n\u003C\u002Ful>\n","Disable Dashboard access for users of a specific role or capability. Disallowed users are redirected to a chosen URL. Get set up in seconds.",30000,467245,78,"2024-11-29T20:13:00.000Z","6.7.5","3.1.0",[20,202,203,22,204],"administration","dashboard","restrict","https:\u002F\u002Fwww.trustedlogin.com\u002Fremove-dashboard-access\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fremove-dashboard-access-for-non-admins.1.2.1.zip",{"slug":208,"name":209,"version":210,"author":211,"author_profile":212,"description":213,"short_description":214,"active_installs":215,"downloaded":216,"rating":184,"num_ratings":217,"last_updated":218,"tested_up_to":219,"requires_at_least":220,"requires_php":221,"tags":222,"homepage":225,"download_link":226,"security_score":227,"vuln_count":228,"unpatched_count":229,"last_vuln_date":230,"fetched_at":30},"wp-limit-login-attempts","WP Limit Login Attempts","2.6.5","Arshid","https:\u002F\u002Fprofiles.wordpress.org\u002Farshidkv12\u002F","\u003Cp>Limit Login Attempts for login protection, protect site from brute force attacks.Brute Force Attack aims at being the simplest kind of method to gain access to a site: it tries usernames and passwords, over and over again, until it gets in. WP Limit Login Attempts plugin limit rate of login attempts and block IP temporarily. It is detecting bots by captcha verification.\u003C\u002Fp>\n\u003Cp>Go to \u003Ccode>Settings > WP Limit Login\u003C\u002Fcode>.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Login Security – Limit Login Attempts and track user login attempts\u003C\u002Fli>\n\u003Cli>Captcha Verification \u003C\u002Fli>\n\u003Cli>Light weight plugin \u003C\u002Fli>\n\u003Cli>Mechanism for slow down brute force attack \u003C\u002Fli>\n\u003Cli>Redirect to home page, when abnormal request (It will stop hacking tools)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>GDPR\u003C\u002Fstrong> compliant. With this feature turned on, all logged IPs get obfuscated (md5-hashed).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Limit Login Attempts\u003C\u002Fh4>\n\u003Cp>A brute force attack is a trial-and-error mеthоd uѕеd tо оbtаin infоrmаtiоn such аѕ a user раѕѕwоrd оr реrѕоnаl idеntifiсаtiоn number (PIN). In a brute force attack, аutоmаtеd software iѕ uѕеd tо gеnеrаtе a lаrgе numbеr оf соnѕесutivе guesses аѕ to thе value of thе desired data. Brute force attack may bе uѕеd by сriminаlѕ tо crack еnсrурtеd dаtа, оr bу security аnаlуѕtѕ to tеѕt an оrgаnizаtiоn’ѕ nеtwоrk security.\u003C\u002Fp>\n\u003Cp>If уоu аdорt thе use оf this plugin, it will limit thе number оf timеѕ a uѕеr can аttеmрt tо log intо уоur ассоunt. Aftеr a сарtсhа verification would have bееn rеԛuеѕtеd, thе mесhаniѕm will ѕlоw dоwn brutе fоrсе аttасk hаving thе роwеr tо redirect tо home page аnd соmрlеtеlу аvоid intruder intо уоur рrесiоuѕ ассоunt.\u003C\u002Fp>\n\u003Ch4>Captcha Verification\u003C\u002Fh4>\n\u003Cp>WP Limit Login Attempts plugin provides an extra protection by Captcha.\u003Cbr \u002F>\nCaptcha Verification in seven attempts. It will be highly helpful for removing bots.\u003C\u002Fp>\n\u003Cp>For more service ,\u003Ca href=\"http:\u002F\u002Fwww.ciphercoin.com\" rel=\"nofollow ugc\">Please visit\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Donations\u003C\u002Fh4>\n\u003Cp>WP Limit Login Attempts plugin protecting your admin. Please make donation, I really appreciate it .\u003C\u002Fp>\n\u003Ch4>Support\u003C\u002Fh4>\n\u003Cp>http:\u002F\u002Fwww.ciphercoin.com\u002Fcontact\u002F\u003C\u002Fp>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002F_T8SWmMcawo?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n","Limit rate of login attempts and block IP temporarily. Brute force attack protection. GDPR compliant. Captcha enabled.",10000,441779,300,"2024-08-04T01:13:00.000Z","6.6.5","6.0","5.6",[223,224,22,4,23],"authentication","hack","https:\u002F\u002Fciphercoin.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-limit-login-attempts.zip",68,2,1,"2022-12-27 00:00:00",{"slug":232,"name":233,"version":234,"author":235,"author_profile":236,"description":237,"short_description":238,"active_installs":239,"downloaded":240,"rating":161,"num_ratings":241,"last_updated":242,"tested_up_to":16,"requires_at_least":243,"requires_php":244,"tags":245,"homepage":152,"download_link":248,"security_score":161,"vuln_count":28,"unpatched_count":28,"last_vuln_date":37,"fetched_at":30},"easy-basic-authentication","Easy Basic Authentication – Add basic auth to site or admin area","3.9.1","Matteo Enna","https:\u002F\u002Fprofiles.wordpress.org\u002Fmatteoenna\u002F","\u003Cp>The Easy Basic Authentication plugin provides a simple method to add basic authentication to your WordPress site. You can enable basic authentication for the entire site or only for the admin area by setting a custom username and password. Secure your site by restricting access only to authorized users.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Try it on a free mock site: \u003Ca href=\"https:\u002F\u002Ftastewp.org\u002Fplugins\u002Feasy-basic-authentication\u002F\" rel=\"nofollow ugc\">click here\u003C\u002Fa>\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Ch3>Key Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Cstrong>Simple Configuration:\u003C\u002Fstrong> With Easy Basic Authentication, you can easily set up basic authentication for your entire website or specifically for the admin area. Set a custom username and password to ensure secure access.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Admin Area Protection:\u003C\u002Fstrong> If you wish to restrict access to your WordPress admin area, Easy Basic Authentication allows you to do so quickly and effectively. Only users with the correct credentials will be able to access this critical part of your site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Entire site protection:\u003C\u002Fstrong> If you wish, there is an option to extend the access limitation to the entire site and not just for your WordPress admin area, Easy Basic authentication allows you to do this quickly and effectively. Only users with the correct credentials will be able to access this critical part of your site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Failed Access Logging:\u003C\u002Fstrong> The plugin keeps track of failed login attempts, helping you identify unauthorized access attempts. This is particularly useful for monitoring your site’s security.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Access Log:\u003C\u002Fstrong> If you choose to enable this feature, Easy Basic Authentication allows you to log successful logins, providing a comprehensive overview of login activities on your site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Easy Management:\u003C\u002Fstrong> The plugin’s intuitive interface makes it simple to manage basic authentication settings. You can easily enable or disable basic authentication and adjust credentials to suit your needs.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Email Alert Functionality:\u003C\u002Fstrong> Easy Basic Authentication includes an email alert feature to notify you of unauthorized access attempts. You can receive email alerts when someone tries to access your site without proper credentials.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>White List Functionality:\u003C\u002Fstrong> Easy Basic Authentication now includes a White List feature, allowing you to specify trusted IP addresses exempt from basic authentication. Configure this list to grant immediate access to known users or systems without requiring credentials, enhancing convenience while maintaining security.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Protect your WordPress site with basic authentication quickly and reliably. Easy Basic Authentication gives you control to ensure that only authorized users can access your online resources. Maintain your site’s security and prevent unwanted access today with Easy Basic Authentication.\u003C\u002Fp>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Visit the plugin settings page to configure your desired basic authentication options.\u003C\u002Fli>\n\u003Cli>Choose whether to enable basic authentication for the entire site or just the admin area.\u003C\u002Fli>\n\u003Cli>Set a custom username and password for secure access.\u003C\u002Fli>\n\u003Cli>Monitor failed access attempts and access logs for added security.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Troubleshooting: Resetting Basic Authentication\u003C\u002Fh3>\n\u003Cp>If you’re having trouble logging in due to the basic authentication, you can reset it and regain access by following these steps:\u003C\u002Fp>\n\u003Cp>1 \u003Cstrong>Connect to your website via FTP.\u003C\u002Fstrong>\u003Cbr \u002F>\n2 \u003Cstrong>Navigate to the plugin directory:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cpre>wp-content\u002Fplugins\u002Feasy-basic-authentication\u002Fclass\u002F\u003C\u002Fpre>\n\u003Cp>3 \u003Cstrong>Locate the file:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cpre>easy-basic-authentication-class.php\u003C\u002Fpre>\n\u003Cp>4 \u003Cstrong>Find the following line:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cpre>add_action( 'init', array($this,'basic_auth_admin') );\u003C\u002Fpre>\n\u003Cp>5 \u003Cstrong>Comment out that line\u003C\u002Fstrong> by adding a \u003Ccode>#\u003C\u002Fcode> at the beginning:\u003C\u002Fp>\n\u003Cpre>#add_action( 'init', array($this,'basic_auth_admin') );\u003C\u002Fpre>\n\u003Cp>6 \u003Cstrong>Save the file\u003C\u002Fstrong> and re-upload it to your server.\u003C\u002Fp>\n\u003Cp>This will disable the basic authentication temporarily, allowing you to log in. Once logged in, you can adjust the plugin settings as needed.\u003C\u002Fp>\n\u003Cp>If you need further assistance, feel free to reach out.\u003C\u002Fp>\n\u003Ch3>GitHub Repository\u003C\u002Fh3>\n\u003Cp>You can find the source code and contribute to the project on GitHub: \u003Ca href=\"https:\u002F\u002Fgithub.com\u002FEllusu\u002Feasy-basic-authentication\" rel=\"nofollow ugc\">Easy Basic Authentication on GitHub\u003C\u002Fa>\u003C\u002Fp>\n","Secure your WordPress site with easy and effective basic authentication. Restrict access, monitor attempts, and enhance security.",600,11185,3,"2025-12-03T06:03:00.000Z","5.0","7.2.5",[246,223,22,23,247],"access-control","wordpress-security","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Feasy-basic-authentication.3.9.1.zip",{"attackSurface":250,"codeSignals":372,"taintFlows":1252,"riskAssessment":1336,"analyzedAt":1347},{"hooks":251,"ajaxHandlers":338,"restRoutes":369,"shortcodes":370,"cronEvents":371,"entryPointCount":136,"unprotectedCount":28},[252,258,262,268,272,276,280,284,287,290,294,297,301,305,309,312,316,319,322,325,328,331,334],{"type":253,"name":254,"callback":255,"file":256,"line":257},"action","plugins_loaded","loginizer_load_plugin","init.php",230,{"type":253,"name":259,"callback":260,"priority":28,"file":256,"line":261},"init","loginizer_load_translation_vars",276,{"type":263,"name":264,"callback":265,"priority":266,"file":256,"line":267},"filter","authenticate","loginizer_wp_authenticate",10001,326,{"type":253,"name":269,"callback":270,"file":256,"line":271},"wp_login_failed","loginizer_login_failed",330,{"type":253,"name":273,"callback":274,"priority":266,"file":256,"line":275},"wp_login_errors","loginizer_error_handler",334,{"type":253,"name":277,"callback":278,"priority":266,"file":256,"line":279},"woocommerce_login_failed","loginizer_woocommerce_error_handler",335,{"type":253,"name":281,"callback":282,"priority":136,"file":256,"line":283},"wp_login","loginizer_login_success",336,{"type":253,"name":269,"callback":285,"priority":266,"file":256,"line":286},"loginizer_ultimatemember_error_handler",339,{"type":263,"name":273,"callback":288,"priority":215,"file":256,"line":289},"loginizer_social_login_error_handler",343,{"type":253,"name":291,"callback":292,"file":256,"line":293},"login_form","loginizer_social_btn_login",350,{"type":253,"name":259,"callback":295,"file":256,"line":296},"loginizer_social_login_load",368,{"type":253,"name":259,"callback":298,"priority":28,"file":299,"line":300},"loginizer_load_plugin_textdomain","loginizer.php",64,{"type":253,"name":302,"callback":303,"file":304,"line":27},"admin_menu","loginizer_admin_menu","main\\admin.php",{"type":253,"name":306,"callback":307,"file":304,"line":308},"admin_notices","loginizer_social_login_url_alert",9,{"type":253,"name":310,"callback":311,"file":304,"line":136},"admin_footer","loginizer_social_interim_js",{"type":253,"name":313,"callback":314,"file":304,"line":315},"admin_init","loginizer_admin_actions",11,{"type":253,"name":306,"callback":317,"file":304,"line":318},"loginizer_promo",35,{"type":253,"name":306,"callback":320,"file":304,"line":321},"loginizer_csrf_promo",39,{"type":253,"name":306,"callback":323,"file":304,"line":324},"loginizer_plugin_update_notice",75,{"type":263,"name":326,"callback":327,"file":304,"line":140},"softaculous_plugin_update_notice","loginizer_update_notice_filter",{"type":253,"name":306,"callback":329,"file":304,"line":330},"loginizer_check_expires",101,{"type":253,"name":306,"callback":332,"file":304,"line":333},"loginizer_softwp_upgrader_notice",115,{"type":263,"name":335,"callback":336,"priority":136,"file":304,"line":337},"install_plugin_complete_actions","loginizer_backuply_install_complete_actions",296,[339,344,346,348,351,354,357,360,363,366],{"action":340,"nopriv":341,"callback":340,"hasNonce":342,"hasCapCheck":342,"file":343,"line":308},"loginizer_dismiss_csrf",false,true,"main\\ajax.php",{"action":345,"nopriv":341,"callback":345,"hasNonce":342,"hasCapCheck":342,"file":343,"line":136},"loginizer_dismiss_backuply",{"action":347,"nopriv":341,"callback":347,"hasNonce":342,"hasCapCheck":342,"file":343,"line":315},"loginizer_dismiss_social_alert",{"action":349,"nopriv":341,"callback":349,"hasNonce":342,"hasCapCheck":342,"file":343,"line":350},"loginizer_dismiss_newsletter",12,{"action":352,"nopriv":341,"callback":352,"hasNonce":342,"hasCapCheck":342,"file":343,"line":353},"loginizer_failed_login_export",13,{"action":355,"nopriv":341,"callback":355,"hasNonce":342,"hasCapCheck":342,"file":343,"line":356},"loginizer_export",14,{"action":358,"nopriv":341,"callback":358,"hasNonce":342,"hasCapCheck":342,"file":343,"line":359},"loginizer_social_order",15,{"action":361,"nopriv":341,"callback":361,"hasNonce":342,"hasCapCheck":342,"file":343,"line":362},"loginizer_dismiss_license_alert",16,{"action":364,"nopriv":341,"callback":364,"hasNonce":342,"hasCapCheck":342,"file":343,"line":365},"loginizer_dismiss_softwp_alert",17,{"action":367,"nopriv":341,"callback":367,"hasNonce":342,"hasCapCheck":342,"file":343,"line":368},"loginizer_close_update_notice",18,[],[],[],{"dangerousFunctions":373,"sqlUsage":374,"outputEscaping":382,"fileOperations":136,"externalRequests":229,"nonceChecks":1246,"capabilityChecks":1247,"bundledLibraries":1248},[],{"prepared":136,"raw":228,"locations":375},[376,379],{"file":256,"line":377,"context":378},187,"$wpdb->query() with variable interpolation",{"file":380,"line":381,"context":378},"main\\settings\\brute-force.php",213,{"escaped":383,"rawEcho":384,"locations":385},165,478,[386,390,392,394,396,398,400,401,403,405,407,409,411,413,415,417,419,421,423,425,427,429,431,433,436,438,440,441,442,444,445,447,449,451,453,455,457,459,460,461,463,465,467,469,471,473,475,477,479,481,483,485,487,489,491,493,495,497,498,500,502,503,505,507,509,511,513,515,517,519,521,523,525,527,529,531,533,535,537,538,540,542,543,545,547,548,550,552,554,556,558,560,562,564,566,568,570,572,573,575,577,579,581,583,585,587,589,590,591,593,595,597,599,600,602,604,606,607,609,611,613,615,617,618,620,622,624,626,628,630,632,634,636,638,640,641,642,643,645,647,649,651,653,655,657,659,661,663,665,667,669,671,673,675,677,679,681,683,685,687,688,690,692,693,695,697,698,700,702,704,706,708,710,712,714,716,718,720,722,724,726,727,729,731,732,734,736,737,739,741,743,745,747,749,751,753,755,757,759,761,763,765,767,769,771,773,775,777,779,781,783,785,787,789,791,793,795,797,799,801,803,805,807,809,811,813,815,817,820,821,823,825,827,829,830,832,834,835,837,839,841,843,845,847,848,850,852,854,856,858,859,860,862,863,865,868,870,872,874,876,878,880,882,884,885,887,889,891,893,894,896,897,899,901,903,905,907,909,911,912,914,916,918,920,922,924,926,927,929,931,933,934,936,937,940,942,943,944,946,947,948,949,950,951,952,954,955,957,959,961,963,965,967,969,970,971,973,974,976,977,979,981,983,984,986,988,990,992,994,996,997,999,1001,1003,1005,1006,1008,1010,1012,1013,1015,1016,1018,1020,1022,1024,1026,1027,1029,1031,1033,1035,1037,1039,1041,1043,1045,1046,1048,1049,1051,1053,1054,1056,1057,1059,1061,1063,1066,1068,1070,1071,1073,1074,1076,1078,1079,1081,1083,1084,1086,1087,1088,1089,1090,1091,1093,1094,1096,1098,1099,1100,1102,1103,1104,1105,1106,1107,1108,1109,1111,1113,1115,1117,1119,1121,1123,1124,1126,1127,1128,1130,1132,1133,1134,1135,1137,1138,1140,1142,1143,1145,1147,1148,1150,1152,1154,1156,1158,1160,1162,1164,1166,1168,1170,1172,1174,1175,1177,1179,1181,1183,1185,1186,1187,1189,1191,1193,1195,1197,1199,1200,1203,1205,1207,1209,1210,1211,1213,1214,1215,1217,1219,1221,1223,1225,1227,1228,1229,1230,1231,1233,1235,1237,1239,1241,1243,1245],{"file":387,"line":388,"context":389},"functions.php",154,"raw output",{"file":387,"line":391,"context":389},181,{"file":387,"line":393,"context":389},304,{"file":387,"line":395,"context":389},323,{"file":304,"line":397,"context":389},144,{"file":304,"line":399,"context":389},221,{"file":304,"line":63,"context":389},{"file":304,"line":402,"context":389},306,{"file":304,"line":404,"context":389},341,{"file":304,"line":406,"context":389},367,{"file":304,"line":408,"context":389},388,{"file":304,"line":410,"context":389},412,{"file":304,"line":412,"context":389},444,{"file":304,"line":414,"context":389},492,{"file":304,"line":416,"context":389},503,{"file":304,"line":418,"context":389},618,{"file":304,"line":420,"context":389},835,{"file":304,"line":422,"context":389},884,{"file":304,"line":424,"context":389},929,{"file":304,"line":426,"context":389},940,{"file":304,"line":428,"context":389},987,{"file":343,"line":430,"context":389},94,{"file":343,"line":432,"context":389},147,{"file":434,"line":435,"context":389},"main\\settings\\2fa.php",313,{"file":434,"line":437,"context":389},324,{"file":434,"line":439,"context":389},329,{"file":434,"line":271,"context":389},{"file":434,"line":139,"context":389},{"file":434,"line":443,"context":389},338,{"file":434,"line":286,"context":389},{"file":434,"line":446,"context":389},342,{"file":434,"line":448,"context":389},347,{"file":434,"line":450,"context":389},348,{"file":434,"line":452,"context":389},351,{"file":434,"line":454,"context":389},359,{"file":434,"line":456,"context":389},360,{"file":434,"line":458,"context":389},363,{"file":434,"line":296,"context":389},{"file":434,"line":174,"context":389},{"file":434,"line":462,"context":389},372,{"file":434,"line":464,"context":389},376,{"file":434,"line":466,"context":389},383,{"file":434,"line":468,"context":389},411,{"file":434,"line":470,"context":389},422,{"file":434,"line":472,"context":389},423,{"file":434,"line":474,"context":389},428,{"file":434,"line":476,"context":389},429,{"file":434,"line":478,"context":389},433,{"file":434,"line":480,"context":389},438,{"file":434,"line":482,"context":389},439,{"file":434,"line":484,"context":389},443,{"file":434,"line":486,"context":389},458,{"file":434,"line":488,"context":389},461,{"file":434,"line":490,"context":389},465,{"file":434,"line":492,"context":389},475,{"file":434,"line":494,"context":389},486,{"file":434,"line":496,"context":389},487,{"file":434,"line":414,"context":389},{"file":434,"line":499,"context":389},493,{"file":434,"line":501,"context":389},502,{"file":434,"line":416,"context":389},{"file":434,"line":504,"context":389},512,{"file":434,"line":506,"context":389},513,{"file":434,"line":508,"context":389},522,{"file":434,"line":510,"context":389},523,{"file":434,"line":512,"context":389},532,{"file":434,"line":514,"context":389},533,{"file":434,"line":516,"context":389},541,{"file":434,"line":518,"context":389},551,{"file":434,"line":520,"context":389},562,{"file":434,"line":522,"context":389},567,{"file":434,"line":524,"context":389},568,{"file":434,"line":526,"context":389},571,{"file":434,"line":528,"context":389},576,{"file":434,"line":530,"context":389},648,{"file":434,"line":532,"context":389},654,{"file":434,"line":534,"context":389},659,{"file":434,"line":536,"context":389},661,{"file":434,"line":536,"context":389},{"file":434,"line":539,"context":389},665,{"file":434,"line":541,"context":389},667,{"file":434,"line":541,"context":389},{"file":434,"line":544,"context":389},671,{"file":434,"line":546,"context":389},672,{"file":434,"line":546,"context":389},{"file":434,"line":549,"context":389},679,{"file":434,"line":551,"context":389},680,{"file":434,"line":553,"context":389},681,{"file":434,"line":555,"context":389},682,{"file":434,"line":557,"context":389},686,{"file":434,"line":559,"context":389},694,{"file":434,"line":561,"context":389},727,{"file":434,"line":563,"context":389},738,{"file":434,"line":565,"context":389},745,{"file":434,"line":567,"context":389},758,{"file":380,"line":569,"context":389},36,{"file":380,"line":571,"context":389},50,{"file":380,"line":432,"context":389},{"file":380,"line":574,"context":389},164,{"file":380,"line":576,"context":389},176,{"file":380,"line":578,"context":389},192,{"file":380,"line":580,"context":389},204,{"file":380,"line":582,"context":389},215,{"file":380,"line":584,"context":389},244,{"file":380,"line":586,"context":389},284,{"file":380,"line":588,"context":389},322,{"file":380,"line":408,"context":389},{"file":380,"line":484,"context":389},{"file":380,"line":592,"context":389},472,{"file":380,"line":594,"context":389},511,{"file":380,"line":596,"context":389},517,{"file":380,"line":598,"context":389},526,{"file":380,"line":528,"context":389},{"file":380,"line":601,"context":389},578,{"file":380,"line":603,"context":389},579,{"file":380,"line":605,"context":389},582,{"file":380,"line":605,"context":389},{"file":380,"line":608,"context":389},584,{"file":380,"line":610,"context":389},585,{"file":380,"line":612,"context":389},597,{"file":380,"line":614,"context":389},598,{"file":380,"line":616,"context":389},599,{"file":380,"line":239,"context":389},{"file":380,"line":619,"context":389},601,{"file":380,"line":621,"context":389},602,{"file":380,"line":623,"context":389},607,{"file":380,"line":625,"context":389},616,{"file":380,"line":627,"context":389},647,{"file":380,"line":629,"context":389},649,{"file":380,"line":631,"context":389},651,{"file":380,"line":633,"context":389},653,{"file":380,"line":635,"context":389},663,{"file":380,"line":637,"context":389},673,{"file":380,"line":639,"context":389},675,{"file":380,"line":639,"context":389},{"file":380,"line":549,"context":389},{"file":380,"line":553,"context":389},{"file":380,"line":644,"context":389},685,{"file":380,"line":646,"context":389},687,{"file":380,"line":648,"context":389},691,{"file":380,"line":650,"context":389},693,{"file":380,"line":652,"context":389},697,{"file":380,"line":654,"context":389},699,{"file":380,"line":656,"context":389},703,{"file":380,"line":658,"context":389},705,{"file":380,"line":660,"context":389},706,{"file":380,"line":662,"context":389},710,{"file":380,"line":664,"context":389},712,{"file":380,"line":666,"context":389},716,{"file":380,"line":668,"context":389},718,{"file":380,"line":670,"context":389},723,{"file":380,"line":672,"context":389},725,{"file":380,"line":674,"context":389},730,{"file":380,"line":676,"context":389},735,{"file":380,"line":678,"context":389},739,{"file":380,"line":680,"context":389},851,{"file":380,"line":682,"context":389},857,{"file":380,"line":684,"context":389},863,{"file":380,"line":686,"context":389},865,{"file":380,"line":686,"context":389},{"file":380,"line":689,"context":389},869,{"file":380,"line":691,"context":389},871,{"file":380,"line":691,"context":389},{"file":380,"line":694,"context":389},875,{"file":380,"line":696,"context":389},876,{"file":380,"line":696,"context":389},{"file":380,"line":699,"context":389},887,{"file":380,"line":701,"context":389},890,{"file":380,"line":703,"context":389},900,{"file":380,"line":705,"context":389},901,{"file":380,"line":707,"context":389},909,{"file":380,"line":709,"context":389},910,{"file":380,"line":711,"context":389},911,{"file":380,"line":713,"context":389},912,{"file":380,"line":715,"context":389},916,{"file":380,"line":717,"context":389},924,{"file":380,"line":719,"context":389},956,{"file":380,"line":721,"context":389},962,{"file":380,"line":723,"context":389},967,{"file":380,"line":725,"context":389},969,{"file":380,"line":725,"context":389},{"file":380,"line":728,"context":389},973,{"file":380,"line":730,"context":389},975,{"file":380,"line":730,"context":389},{"file":380,"line":733,"context":389},979,{"file":380,"line":735,"context":389},980,{"file":380,"line":735,"context":389},{"file":380,"line":738,"context":389},991,{"file":380,"line":740,"context":389},994,{"file":380,"line":742,"context":389},1004,{"file":380,"line":744,"context":389},1005,{"file":380,"line":746,"context":389},1012,{"file":380,"line":748,"context":389},1013,{"file":380,"line":750,"context":389},1014,{"file":380,"line":752,"context":389},1015,{"file":380,"line":754,"context":389},1019,{"file":380,"line":756,"context":389},1027,{"file":380,"line":758,"context":389},1054,{"file":380,"line":760,"context":389},1064,{"file":380,"line":762,"context":389},1067,{"file":380,"line":764,"context":389},1071,{"file":380,"line":766,"context":389},1074,{"file":380,"line":768,"context":389},1078,{"file":380,"line":770,"context":389},1081,{"file":380,"line":772,"context":389},1085,{"file":380,"line":774,"context":389},1088,{"file":380,"line":776,"context":389},1092,{"file":380,"line":778,"context":389},1095,{"file":380,"line":780,"context":389},1099,{"file":380,"line":782,"context":389},1102,{"file":380,"line":784,"context":389},1106,{"file":380,"line":786,"context":389},1114,{"file":380,"line":788,"context":389},1123,{"file":380,"line":790,"context":389},1124,{"file":380,"line":792,"context":389},1127,{"file":380,"line":794,"context":389},1134,{"file":380,"line":796,"context":389},1135,{"file":380,"line":798,"context":389},1138,{"file":380,"line":800,"context":389},1144,{"file":380,"line":802,"context":389},1147,{"file":380,"line":804,"context":389},1153,{"file":380,"line":806,"context":389},1154,{"file":380,"line":808,"context":389},1167,{"file":380,"line":810,"context":389},1168,{"file":380,"line":812,"context":389},1184,{"file":380,"line":814,"context":389},1185,{"file":380,"line":816,"context":389},1208,{"file":818,"line":819,"context":389},"main\\settings\\checksum.php",142,{"file":818,"line":432,"context":389},{"file":818,"line":822,"context":389},185,{"file":818,"line":824,"context":389},195,{"file":818,"line":826,"context":389},196,{"file":818,"line":828,"context":389},199,{"file":818,"line":580,"context":389},{"file":818,"line":831,"context":389},205,{"file":818,"line":833,"context":389},208,{"file":818,"line":381,"context":389},{"file":818,"line":836,"context":389},214,{"file":818,"line":838,"context":389},220,{"file":818,"line":840,"context":389},228,{"file":818,"line":842,"context":389},229,{"file":818,"line":844,"context":389},249,{"file":818,"line":846,"context":389},253,{"file":818,"line":846,"context":389},{"file":818,"line":849,"context":389},263,{"file":818,"line":851,"context":389},285,{"file":818,"line":853,"context":389},297,{"file":818,"line":855,"context":389},309,{"file":818,"line":857,"context":389},318,{"file":818,"line":439,"context":389},{"file":818,"line":446,"context":389},{"file":818,"line":861,"context":389},357,{"file":818,"line":174,"context":389},{"file":818,"line":864,"context":389},378,{"file":866,"line":867,"context":389},"main\\settings\\dashboard.php",86,{"file":866,"line":869,"context":389},98,{"file":866,"line":871,"context":389},105,{"file":866,"line":873,"context":389},119,{"file":866,"line":875,"context":389},130,{"file":866,"line":877,"context":389},133,{"file":866,"line":879,"context":389},135,{"file":866,"line":881,"context":389},212,{"file":866,"line":883,"context":389},235,{"file":866,"line":584,"context":389},{"file":866,"line":886,"context":389},252,{"file":866,"line":888,"context":389},286,{"file":866,"line":890,"context":389},398,{"file":866,"line":892,"context":389},409,{"file":866,"line":484,"context":389},{"file":895,"line":227,"context":389},"main\\settings\\passwordless.php",{"file":895,"line":161,"context":389},{"file":895,"line":898,"context":389},110,{"file":895,"line":900,"context":389},112,{"file":895,"line":902,"context":389},117,{"file":895,"line":904,"context":389},118,{"file":895,"line":906,"context":389},123,{"file":895,"line":908,"context":389},124,{"file":895,"line":910,"context":389},128,{"file":895,"line":877,"context":389},{"file":895,"line":913,"context":389},134,{"file":895,"line":915,"context":389},138,{"file":895,"line":917,"context":389},148,{"file":895,"line":919,"context":389},150,{"file":895,"line":921,"context":389},155,{"file":895,"line":923,"context":389},156,{"file":895,"line":925,"context":389},159,{"file":895,"line":383,"context":389},{"file":895,"line":928,"context":389},166,{"file":895,"line":930,"context":389},184,{"file":895,"line":932,"context":389},191,{"file":895,"line":578,"context":389},{"file":895,"line":935,"context":389},209,{"file":895,"line":582,"context":389},{"file":938,"line":939,"context":389},"main\\settings\\recaptcha.php",288,{"file":938,"line":941,"context":389},293,{"file":938,"line":435,"context":389},{"file":938,"line":395,"context":389},{"file":938,"line":945,"context":389},327,{"file":938,"line":443,"context":389},{"file":938,"line":286,"context":389},{"file":938,"line":446,"context":389},{"file":938,"line":289,"context":389},{"file":938,"line":450,"context":389},{"file":938,"line":293,"context":389},{"file":938,"line":953,"context":389},354,{"file":938,"line":454,"context":389},{"file":938,"line":956,"context":389},366,{"file":938,"line":958,"context":389},371,{"file":938,"line":960,"context":389},379,{"file":938,"line":962,"context":389},384,{"file":938,"line":964,"context":389},393,{"file":938,"line":966,"context":389},394,{"file":938,"line":968,"context":389},395,{"file":938,"line":890,"context":389},{"file":938,"line":890,"context":389},{"file":938,"line":972,"context":389},399,{"file":938,"line":972,"context":389},{"file":938,"line":975,"context":389},400,{"file":938,"line":975,"context":389},{"file":938,"line":978,"context":389},404,{"file":938,"line":980,"context":389},405,{"file":938,"line":982,"context":389},408,{"file":938,"line":892,"context":389},{"file":938,"line":985,"context":389},413,{"file":938,"line":987,"context":389},415,{"file":938,"line":989,"context":389},419,{"file":938,"line":991,"context":389},424,{"file":938,"line":993,"context":389},431,{"file":938,"line":995,"context":389},436,{"file":938,"line":484,"context":389},{"file":938,"line":998,"context":389},448,{"file":938,"line":1000,"context":389},456,{"file":938,"line":1002,"context":389},457,{"file":938,"line":1004,"context":389},463,{"file":938,"line":592,"context":389},{"file":938,"line":1007,"context":389},473,{"file":938,"line":1009,"context":389},482,{"file":938,"line":1011,"context":389},485,{"file":938,"line":494,"context":389},{"file":938,"line":1014,"context":389},490,{"file":938,"line":414,"context":389},{"file":938,"line":1017,"context":389},496,{"file":938,"line":1019,"context":389},501,{"file":938,"line":1021,"context":389},509,{"file":938,"line":1023,"context":389},514,{"file":938,"line":1025,"context":389},521,{"file":938,"line":598,"context":389},{"file":938,"line":1028,"context":389},535,{"file":938,"line":1030,"context":389},536,{"file":938,"line":1032,"context":389},539,{"file":938,"line":1034,"context":389},544,{"file":938,"line":1036,"context":389},545,{"file":938,"line":1038,"context":389},548,{"file":938,"line":1040,"context":389},553,{"file":938,"line":1042,"context":389},554,{"file":938,"line":1044,"context":389},557,{"file":938,"line":520,"context":389},{"file":938,"line":1047,"context":389},563,{"file":938,"line":522,"context":389},{"file":938,"line":1050,"context":389},589,{"file":938,"line":1052,"context":389},592,{"file":938,"line":625,"context":389},{"file":938,"line":1055,"context":389},652,{"file":938,"line":532,"context":389},{"file":938,"line":1058,"context":389},658,{"file":938,"line":1060,"context":389},660,{"file":938,"line":1062,"context":389},664,{"file":1064,"line":1065,"context":389},"main\\settings\\security.php",289,{"file":1064,"line":1067,"context":389},321,{"file":1064,"line":1069,"context":389},331,{"file":1064,"line":283,"context":389},{"file":1064,"line":1072,"context":389},337,{"file":1064,"line":452,"context":389},{"file":1064,"line":1075,"context":389},352,{"file":1064,"line":1077,"context":389},355,{"file":1064,"line":456,"context":389},{"file":1064,"line":1080,"context":389},361,{"file":1064,"line":1082,"context":389},364,{"file":1064,"line":174,"context":389},{"file":1064,"line":1085,"context":389},370,{"file":1064,"line":958,"context":389},{"file":1064,"line":962,"context":389},{"file":1064,"line":972,"context":389},{"file":1064,"line":892,"context":389},{"file":1064,"line":77,"context":389},{"file":1064,"line":1092,"context":389},417,{"file":1064,"line":470,"context":389},{"file":1064,"line":1095,"context":389},425,{"file":1064,"line":1097,"context":389},430,{"file":1064,"line":993,"context":389},{"file":1064,"line":480,"context":389},{"file":1064,"line":1101,"context":389},488,{"file":1064,"line":1017,"context":389},{"file":1064,"line":1019,"context":389},{"file":1064,"line":1023,"context":389},{"file":1064,"line":598,"context":389},{"file":1064,"line":1028,"context":389},{"file":1064,"line":516,"context":389},{"file":1064,"line":516,"context":389},{"file":1064,"line":1110,"context":389},546,{"file":1064,"line":1112,"context":389},547,{"file":1064,"line":1114,"context":389},555,{"file":1064,"line":1116,"context":389},556,{"file":1064,"line":1118,"context":389},559,{"file":1064,"line":1120,"context":389},564,{"file":1064,"line":1122,"context":389},565,{"file":1064,"line":524,"context":389},{"file":1064,"line":1125,"context":389},577,{"file":1064,"line":601,"context":389},{"file":1064,"line":605,"context":389},{"file":1064,"line":1129,"context":389},586,{"file":1064,"line":1131,"context":389},614,{"file":1064,"line":625,"context":389},{"file":1064,"line":541,"context":389},{"file":1064,"line":656,"context":389},{"file":1064,"line":1136,"context":389},713,{"file":1064,"line":668,"context":389},{"file":1064,"line":1139,"context":389},719,{"file":1064,"line":1141,"context":389},722,{"file":1064,"line":561,"context":389},{"file":1064,"line":1144,"context":389},728,{"file":1064,"line":1146,"context":389},731,{"file":1064,"line":676,"context":389},{"file":1064,"line":1149,"context":389},736,{"file":1064,"line":1151,"context":389},760,{"file":1064,"line":1153,"context":389},770,{"file":1064,"line":1155,"context":389},775,{"file":1064,"line":1157,"context":389},776,{"file":1064,"line":1159,"context":389},796,{"file":1064,"line":1161,"context":389},802,{"file":1064,"line":1163,"context":389},806,{"file":1064,"line":1165,"context":389},825,{"file":1064,"line":1167,"context":389},840,{"file":1064,"line":1169,"context":389},841,{"file":1064,"line":1171,"context":389},861,{"file":1064,"line":1173,"context":389},867,{"file":1064,"line":691,"context":389},{"file":1064,"line":1176,"context":389},882,{"file":1064,"line":1178,"context":389},892,{"file":1064,"line":1180,"context":389},897,{"file":1064,"line":1182,"context":389},898,{"file":1064,"line":1184,"context":389},906,{"file":1064,"line":709,"context":389},{"file":1064,"line":713,"context":389},{"file":1064,"line":1188,"context":389},917,{"file":1064,"line":1190,"context":389},918,{"file":1064,"line":1192,"context":389},927,{"file":1064,"line":1194,"context":389},928,{"file":1064,"line":1196,"context":389},951,{"file":1064,"line":1198,"context":389},1001,{"file":1064,"line":750,"context":389},{"file":1201,"line":1202,"context":389},"main\\settings\\social_login.php",46,{"file":1201,"line":1204,"context":389},120,{"file":1201,"line":1206,"context":389},203,{"file":1201,"line":1208,"context":389},246,{"file":1201,"line":844,"context":389},{"file":1201,"line":393,"context":389},{"file":1201,"line":1212,"context":389},358,{"file":1201,"line":406,"context":389},{"file":1201,"line":1085,"context":389},{"file":1201,"line":1216,"context":389},387,{"file":1201,"line":1218,"context":389},406,{"file":1201,"line":1220,"context":389},418,{"file":1201,"line":1222,"context":389},452,{"file":1201,"line":1224,"context":389},468,{"file":1201,"line":1226,"context":389},476,{"file":1201,"line":1011,"context":389},{"file":1201,"line":598,"context":389},{"file":1201,"line":512,"context":389},{"file":1201,"line":1050,"context":389},{"file":1201,"line":1232,"context":389},595,{"file":1201,"line":1234,"context":389},636,{"file":1201,"line":1236,"context":389},662,{"file":1238,"line":930,"context":389},"main\\settings\\sso.php",{"file":1238,"line":1240,"context":389},251,{"file":1238,"line":1242,"context":389},265,{"file":1244,"line":923,"context":389},"main\\social-base.php",{"file":1244,"line":925,"context":389},22,24,[1249],{"name":1250,"version":37,"knownCves":1251},"Guzzle",[],[1253,1271,1279,1290,1298,1316,1326],{"entryPoint":1254,"graph":1255,"unsanitizedCount":28,"severity":1270},"loginizer_social_order (main\\ajax.php:179)",{"nodes":1256,"edges":1268},[1257,1262],{"id":1258,"type":1259,"label":1260,"file":343,"line":1261},"n0","source","$_POST",188,{"id":1263,"type":1264,"label":1265,"file":343,"line":1266,"wp_function":1267},"n1","sink","update_option() [Settings Manipulation]",190,"update_option",[1269],{"from":1258,"to":1263,"sanitized":342},"low",{"entryPoint":1272,"graph":1273,"unsanitizedCount":28,"severity":1270},"\u003Cajax> (main\\ajax.php:0)",{"nodes":1274,"edges":1277},[1275,1276],{"id":1258,"type":1259,"label":1260,"file":343,"line":1261},{"id":1263,"type":1264,"label":1265,"file":343,"line":1266,"wp_function":1267},[1278],{"from":1258,"to":1263,"sanitized":342},{"entryPoint":1280,"graph":1281,"unsanitizedCount":28,"severity":1270},"loginizer_page_security (main\\settings\\security.php:8)",{"nodes":1282,"edges":1288},[1283,1286],{"id":1258,"type":1259,"label":1284,"file":1064,"line":1285},"$_POST (x3)",198,{"id":1263,"type":1264,"label":1265,"file":1064,"line":1287,"wp_function":1267},216,[1289],{"from":1258,"to":1263,"sanitized":342},{"entryPoint":1291,"graph":1292,"unsanitizedCount":28,"severity":1270},"\u003Csecurity> (main\\settings\\security.php:0)",{"nodes":1293,"edges":1296},[1294,1295],{"id":1258,"type":1259,"label":1284,"file":1064,"line":1285},{"id":1263,"type":1264,"label":1265,"file":1064,"line":1287,"wp_function":1267},[1297],{"from":1258,"to":1263,"sanitized":342},{"entryPoint":1299,"graph":1300,"unsanitizedCount":28,"severity":1270},"loginizer_social_login (main\\settings\\social_login.php:7)",{"nodes":1301,"edges":1313},[1302,1305,1308],{"id":1258,"type":1259,"label":1303,"file":1201,"line":1304},"$_GET",53,{"id":1263,"type":1306,"label":1307,"file":1201,"line":1304},"transform","→ loginizer_provider_settings()",{"id":1309,"type":1264,"label":1310,"file":1201,"line":1311,"wp_function":1312},"n2","call_user_func() [RCE]",320,"call_user_func",[1314,1315],{"from":1258,"to":1263,"sanitized":341},{"from":1263,"to":1309,"sanitized":342},{"entryPoint":1317,"graph":1318,"unsanitizedCount":28,"severity":1270},"\u003Csocial_login> (main\\settings\\social_login.php:0)",{"nodes":1319,"edges":1323},[1320,1321,1322],{"id":1258,"type":1259,"label":1303,"file":1201,"line":1304},{"id":1263,"type":1306,"label":1307,"file":1201,"line":1304},{"id":1309,"type":1264,"label":1310,"file":1201,"line":1311,"wp_function":1312},[1324,1325],{"from":1258,"to":1263,"sanitized":341},{"from":1263,"to":1309,"sanitized":342},{"entryPoint":1327,"graph":1328,"unsanitizedCount":28,"severity":1270},"\u003Csso> (main\\settings\\sso.php:0)",{"nodes":1329,"edges":1334},[1330,1331],{"id":1258,"type":1259,"label":1260,"file":1238,"line":571},{"id":1263,"type":1264,"label":1332,"file":1238,"line":586,"wp_function":1333},"echo() [XSS]","echo",[1335],{"from":1258,"to":1263,"sanitized":342},{"summary":1337,"deductions":1338},"Loginizer v2.0.6 presents a mixed security posture.  The static analysis indicates a good foundation with 100% of identified entry points (AJAX handlers, REST API routes, shortcodes, cron events) having authorization checks.  Furthermore, a significant majority of SQL queries utilize prepared statements (83%), and the plugin demonstrates good practice with 22 nonce checks and 24 capability checks, suggesting developers are aware of common WordPress security mechanisms.  However, a low percentage of output escaping (26%) is a significant concern, indicating a high potential for Cross-Site Scripting (XSS) vulnerabilities where user-provided data is rendered without proper sanitization.\n\nThe vulnerability history is concerning, with 8 known CVEs, including 2 critical and 2 high severity issues. The common vulnerability types such as Improper Authentication, CSRF, XSS, and SQL Injection highlight recurring security weaknesses within the plugin's development. While there are currently no unpatched vulnerabilities, the history suggests a pattern of security flaws that have required past fixes. The presence of the Guzzle library as a bundled dependency could also introduce risks if not kept up-to-date, though its version is not specified.\n\nIn conclusion, while Loginizer v2.0.6 has implemented some strong security practices, particularly around access control for entry points, the low rate of output escaping and the historical prevalence of critical and high-severity vulnerabilities warrant caution. The plugin's attack surface is well-protected at the entry point level, but the potential for XSS due to insufficient output sanitization remains a significant risk. Users should be aware of this history and monitor for future updates that address the identified weaknesses, especially in output handling.",[1339,1341,1343,1345],{"reason":1340,"points":359},"Low output escaping rate",{"reason":1342,"points":136},"History of critical vulnerabilities",{"reason":1344,"points":27},"History of high vulnerabilities",{"reason":1346,"points":241},"Bundled library (potential risk)","2026-03-16T16:57:16.110Z",{"wat":1349,"direct":1362},{"assetPaths":1350,"generatorPatterns":1355,"scriptPaths":1356,"versionParams":1357},[1351,1352,1353,1354],"\u002Fwp-content\u002Fplugins\u002Floginizer\u002Fcss\u002Floginizer.css","\u002Fwp-content\u002Fplugins\u002Floginizer\u002Fcss\u002Floginizer-admin.css","\u002Fwp-content\u002Fplugins\u002Floginizer\u002Fjs\u002Floginizer.js","\u002Fwp-content\u002Fplugins\u002Floginizer\u002Fjs\u002Floginizer-admin.js",[],[1353,1354],[1358,1359,1360,1361],"loginizer\u002Fcss\u002Floginizer.css?ver=","loginizer\u002Fcss\u002Floginizer-admin.css?ver=","loginizer\u002Fjs\u002Floginizer.js?ver=","loginizer\u002Fjs\u002Floginizer-admin.js?ver=",{"cssClasses":1363,"htmlComments":1367,"htmlAttributes":1370,"restEndpoints":1372,"jsGlobals":1373,"shortcodeOutput":1375},[1364,1365,1366],"loginizer-wrap","loginizer-form","loginizer-message",[1368,1369],"\u003C!-- Loginizer -->","\u003C!-- Loginizer Pro -->",[1371],"data-loginizer-nonce",[],[1374],"loginizer_ajax_object",[]]