[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fx5AYh939YBT7J1phRjXcj3XgRVSkg-Ihn_FKC2Gt5T8":3,"$f5PncibTICIxBaouWeoD92CMuZfgld-oc5kj7DASviT8":94,"$fCFr7v7BbfdTvj_yJkUDbHtqiRbR5OHJW4ts0-_hk9bA":99},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":19,"download_link":20,"security_score":21,"vuln_count":13,"unpatched_count":13,"last_vuln_date":22,"fetched_at":23,"discovery_status":24,"vulnerabilities":25,"developer":26,"crawl_stats":22,"alternatives":33,"analysis":34,"fingerprints":81},"logpress","LogPress","1.0.0","Bimal Poudel","https:\u002F\u002Fprofiles.wordpress.org\u002Fpbimal\u002F","\u003Cp>Plugin to analyze and monitor access log.\u003C\u002Fp>\n","Keeps a short history of access logs.",10,1093,0,"2018-10-12T23:14:00.000Z","4.9.29","4.9.8","5.2.7",[],"#","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogpress.zip",85,null,"2026-04-16T10:56:18.058Z","no_bundle",[],{"slug":27,"display_name":7,"profile_url":8,"plugin_count":28,"total_installs":29,"avg_security_score":21,"avg_patch_time_days":30,"trust_score":31,"computed_at":32},"pbimal",13,840,30,84,"2026-05-20T02:03:14.210Z",[],{"attackSurface":35,"codeSignals":50,"taintFlows":68,"riskAssessment":69,"analyzedAt":80},{"hooks":36,"ajaxHandlers":46,"restRoutes":47,"shortcodes":48,"cronEvents":49,"entryPointCount":13,"unprotectedCount":13},[37,42],{"type":38,"name":39,"callback":39,"file":40,"line":41},"action","admin_menu","logpress.php",64,{"type":38,"name":43,"callback":44,"priority":13,"file":40,"line":45},"init","log_access",65,[],[],[],[],{"dangerousFunctions":51,"sqlUsage":52,"outputEscaping":55,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":67},[],{"prepared":53,"raw":13,"locations":54},1,[],{"escaped":13,"rawEcho":56,"locations":57},4,[58,62,64,65],{"file":59,"line":60,"context":61},"logpress-report.php",24,"raw output",{"file":59,"line":63,"context":61},25,{"file":59,"line":63,"context":61},{"file":59,"line":66,"context":61},26,[],[],{"summary":70,"deductions":71},"The static analysis of LogPress v1.0.0 reveals a generally strong security posture, with no identified dangerous functions, file operations, or external HTTP requests.  The plugin also demonstrates good practice by using prepared statements for its single SQL query.  Furthermore, the lack of reported CVEs and a clean vulnerability history suggest a developer who is either very diligent about security or has not historically been a target for significant vulnerabilities. The absence of any identified taint flows is also a positive indicator, meaning there are no immediately apparent pathways for malicious data to be processed without proper sanitization.\n\nHowever, there are notable concerns that temper this positive outlook. The complete lack of nonce and capability checks across all entry points, including the zero unprotected AJAX handlers, REST API routes, and shortcodes, represents a significant weakness. While the current entry points are zero, if any are introduced in the future without these critical security measures, it would leave the plugin vulnerable to various attacks. Additionally, the fact that 100% of the four identified output instances are not properly escaped is a serious concern. This deficiency could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is ever rendered directly into the output without sanitization.\n\nIn conclusion, LogPress v1.0.0 benefits from a lack of known vulnerabilities and responsible SQL handling. Nevertheless, the complete absence of authorization checks and the widespread issue of unescaped output create significant potential security risks. Future development must prioritize the implementation of proper nonce and capability checks for all entry points and ensure rigorous output escaping to mitigate these identified weaknesses.",[72,75,77],{"reason":73,"points":74},"Missing nonce checks on all entry points",15,{"reason":76,"points":74},"Missing capability checks on all entry points",{"reason":78,"points":79},"Unescaped output found (4\u002F4 instances)",12,"2026-03-17T00:02:59.256Z",{"wat":82,"direct":87},{"assetPaths":83,"generatorPatterns":84,"scriptPaths":85,"versionParams":86},[],[],[],[],{"cssClasses":88,"htmlComments":89,"htmlAttributes":90,"restEndpoints":91,"jsGlobals":92,"shortcodeOutput":93},[],[],[],[],[],[],{"error":95,"url":96,"statusCode":97,"statusMessage":98,"message":98},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Flogpress\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":13,"versions":100},[]]