[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fBo1m4k2l6zvBmmNc4-qdxR-tKRst78yaFhXDewWX9sI":3,"$f6607CYD6puvN-o0UdtfHrAhYfF1B85vAxX77i002Fq8":479,"$fX9MjI1IGjzPZI9qRhbTCiAoX_GNBP7C-r2AW3EHyK88":483},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":23,"download_link":24,"security_score":25,"vuln_count":26,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29,"discovery_status":30,"vulnerabilities":31,"developer":82,"crawl_stats":37,"alternatives":90,"analysis":174,"fingerprints":452},"lws-cleaner","LWS Cleaner","2.4.3","Aurélien LWS","https:\u002F\u002Fprofiles.wordpress.org\u002Faurelienlws\u002F","\u003Cp>LWS Cleaner helps you \u003Cstrong>clean your WordPress website\u003C\u002Fstrong>. This gives it a second youth, fast and easily!\u003Cbr \u002F>\nClean your posts, comments, terms, users or even unused medias with a single click. Manage your files and delete non native files to ensure utmost security on your website.\u003C\u002Fp>\n\u003Ch4>Articles\u003C\u002Fh4>\n\u003Cp>The LWS Cleaner plugin allows you to clean up various content related to your articles in a few clicks:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Delete article revisions\u003C\u002Fli>\n\u003Cli>Delete automatic drafts\u003C\u002Fli>\n\u003Cli>Delete articles in the recycle garbage can\u003C\u002Fli>\n\u003Cli>Delete orphan metadata from articles\u003C\u002Fli>\n\u003Cli>Delete duplicate metadata from articles\u003C\u002Fli>\n\u003Cli>Delete the oEmbed cache of article metadata\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Comments\u003C\u002Fh4>\n\u003Cp>Clean up the comments area just as easily:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Delete unapproved comments\u003C\u002Fli>\n\u003Cli>Delete unwanted comments\u003C\u002Fli>\n\u003Cli>Delete comments in the recycle garbage can\u003C\u002Fli>\n\u003Cli>Remove orphaned metadata from comments \u003C\u002Fli>\n\u003Cli>Remove duplicate metadata from comments \u003C\u002Fli>\n\u003Cli>Disable comments on the site\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Terms\u003C\u002Fh4>\n\u003Cp>You can also clean up terms:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Remove unused terms\u003C\u002Fli>\n\u003Cli>Remove orphaned metadata from terms\u003C\u002Fli>\n\u003Cli>Remove duplicate terms\u003C\u002Fli>\n\u003Cli>Remove orphaned relationships from terms\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Users\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Delete duplicate user metadata\u003C\u002Fli>\n\u003Cli>Delete orphaned user metadata\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Parameters\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Delete transients (cached data types in WordPress)\u003C\u002Fli>\n\u003Cli>Delete crons (crons schedule events automatically)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Plugins \u002F themes\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Delete unused plugins\u003C\u002Fli>\n\u003Cli>Delete unused themes\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Media\u003C\u002Fh4>\n\u003Cp>In this tab you will find a list of media that appear to be unused.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Delete media in a grouped way\u003C\u002Fli>\n\u003Cli>Add media to the ignore list in a grouped way (to avoid deleting them by mistake)\u003C\u002Fli>\n\u003Cli>Delete \u002F ignore media on a case by case basis\u003C\u002Fli>\n\u003Cli>Remove from the ignore list\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This plugin is pre-installed when ordering one of these LWS webhosts: \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_wordpress.php\" rel=\"nofollow ugc\">WordPress hosting\u003C\u002Fa>, Classic shared \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_web.php\" rel=\"nofollow ugc\">web hosting\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement-cpanel.php\" rel=\"nofollow ugc\">cPanel hosting\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>Released under the terms of the GNU General Public License.\u003C\u002Fp>\n","Clean everything on your website easily!",20000,186441,96,14,"2025-12-01T08:39:00.000Z","6.8.5","5.0","7.3",[20,21,22],"cleaning","lws","optimisation","https:\u002F\u002Fwww.lws.fr\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.4.3.zip",94,3,0,"2025-09-11 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[32,50,67],{"id":33,"url_slug":34,"title":35,"description":36,"plugin_slug":4,"theme_slug":37,"affected_versions":38,"patched_in_version":39,"severity":40,"cvss_score":41,"cvss_vector":42,"vuln_type":43,"published_date":28,"updated_date":44,"references":45,"days_to_patch":47,"patch_diff_files":48,"patch_trac_url":37,"research_status":37,"research_verified":49,"research_rounds_completed":27,"research_plan":37,"research_summary":37,"research_vulnerable_code":37,"research_fix_diff":37,"research_exploit_outline":37,"research_model_used":37,"research_started_at":37,"research_completed_at":37,"research_error":37,"poc_status":37,"poc_video_id":37,"poc_summary":37,"poc_steps":37,"poc_tested_at":37,"poc_wp_version":37,"poc_php_version":37,"poc_playwright_script":37,"poc_exploit_code":37,"poc_has_trace":49,"poc_model_used":37,"poc_verification_depth":37},"CVE-2025-8575","lws-cleaner-authenticated-administrator-arbitrary-file-deletion-via-lwscldeletefile","LWS Cleaner \u003C= 2.4.1.3 - Authenticated (Administrator+) Arbitrary File Deletion via 'lws_cl_delete_file'","The LWS Cleaner plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'lws_cl_delete_file' function in all versions up to, and including, 2.4.1.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).",null,"\u003C=2.4.1.3","2.4.2","high",7.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Absolute Path Traversal","2025-09-12 05:24:34",[46],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ffa37025a-7f20-4cfe-a7d0-38168f49b6d9?source=api-prod",1,[],false,{"id":51,"url_slug":52,"title":53,"description":54,"plugin_slug":4,"theme_slug":37,"affected_versions":55,"patched_in_version":56,"severity":57,"cvss_score":58,"cvss_vector":59,"vuln_type":60,"published_date":61,"updated_date":62,"references":63,"days_to_patch":65,"patch_diff_files":66,"patch_trac_url":37,"research_status":37,"research_verified":49,"research_rounds_completed":27,"research_plan":37,"research_summary":37,"research_vulnerable_code":37,"research_fix_diff":37,"research_exploit_outline":37,"research_model_used":37,"research_started_at":37,"research_completed_at":37,"research_error":37,"poc_status":37,"poc_video_id":37,"poc_summary":37,"poc_steps":37,"poc_tested_at":37,"poc_wp_version":37,"poc_php_version":37,"poc_playwright_script":37,"poc_exploit_code":37,"poc_has_trace":49,"poc_model_used":37,"poc_verification_depth":37},"CVE-2023-35781","lws-cleaner-cross-site-request-forgery","LWS Cleaner \u003C= 2.3.0 - Cross-Site Request Forgery","The LWS Cleaner plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.0. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to perform unauthorized actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.","\u003C=2.3.0","2.3.1","medium",5.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:N\u002FI:L\u002FA:L","Cross-Site Request Forgery (CSRF)","2023-06-16 00:00:00","2024-01-22 19:56:02",[64],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fb89c51fe-c056-4d85-a6e3-6678ed93b9d8?source=api-prod",221,[],{"id":68,"url_slug":69,"title":70,"description":71,"plugin_slug":4,"theme_slug":37,"affected_versions":72,"patched_in_version":73,"severity":40,"cvss_score":74,"cvss_vector":75,"vuln_type":76,"published_date":77,"updated_date":62,"references":78,"days_to_patch":80,"patch_diff_files":81,"patch_trac_url":37,"research_status":37,"research_verified":49,"research_rounds_completed":27,"research_plan":37,"research_summary":37,"research_vulnerable_code":37,"research_fix_diff":37,"research_exploit_outline":37,"research_model_used":37,"research_started_at":37,"research_completed_at":37,"research_error":37,"poc_status":37,"poc_video_id":37,"poc_summary":37,"poc_steps":37,"poc_tested_at":37,"poc_wp_version":37,"poc_php_version":37,"poc_playwright_script":37,"poc_exploit_code":37,"poc_has_trace":49,"poc_model_used":37,"poc_verification_depth":37},"WF-dd02becd-77e5-46b9-acc9-dba6c5caba27-lws-cleaner","lws-plugins-various-versions-missing-authorization-checks-3","LWS Plugins  \u003C= (Various Versions) - Missing Authorization Checks","Several LWS Plugins for WordPress are vulnerable to authorization bypass due to making admin settings pages available to users with read access (LWS Affiliation in versions up to, and including, 2.1; LWS Optimize in versions up to, and including, 1.5; LWS Tools in versions up to, and including, 2.1; LWS Cleaner in versions up to, and including, 2.0.3; LWS SMS in versions up to, and including, 2.1; LWS Hide Login in versions up to, and including, 2.0.2). This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change plugin settings.","\u003C=2.0.3","2.1",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Missing Authorization","2022-12-12 00:00:00",[79],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fdd02becd-77e5-46b9-acc9-dba6c5caba27?source=api-prod",407,[],{"slug":83,"display_name":7,"profile_url":8,"plugin_count":84,"total_installs":85,"avg_security_score":86,"avg_patch_time_days":87,"trust_score":88,"computed_at":89},"aurelienlws",6,77800,91,222,73,"2026-05-20T01:27:33.193Z",[91,106,125,138,160],{"slug":92,"name":93,"version":94,"author":7,"author_profile":8,"description":95,"short_description":96,"active_installs":11,"downloaded":97,"rating":98,"num_ratings":84,"last_updated":99,"tested_up_to":100,"requires_at_least":17,"requires_php":18,"tags":101,"homepage":23,"download_link":104,"security_score":105,"vuln_count":26,"unpatched_count":27,"last_vuln_date":61,"fetched_at":29},"lws-tools","LWS Tools","2.6.2","\u003Cp>With LWS Tools, get a hold on various \u003Cstrong>tools and options to optimize your website\u003C\u002Fstrong>. From deactivating emotes or hiding sensible informations to deactivating REST API!\u003Cbr \u002F>\nYou can access and change several parameters, get informations on your database and your server and even more.\u003C\u002Fp>\n\u003Ch4>WPilot – Your WordPress AI Assistant\u003C\u002Fh4>\n\u003Cp>Meet \u003Cstrong>WPilot\u003C\u002Fstrong>, your dedicated AI assistant for WordPress, available exclusively with LWS hosting. WPilot automatically analyzes your site, plugins, and theme to provide personalized advice and guidance. Whether you’re creating, updating, or optimizing your website, WPilot acts as your co-pilot, helping you troubleshoot common issues and make informed decisions about your WordPress site. This intelligent assistant understands your specific setup and offers tailored recommendations to enhance your website’s performance and functionality.\u003C\u002Fp>\n\u003Ch4>Notifications\u003C\u002Fh4>\n\u003Cp>Find an improved notification center allowing you to see at a glance what to update, what to delete, correct or adjust.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Status of updates to the WordPress version, plugins, themes and translations.\u003C\u002Fli>\n\u003Cli>Unused plugins and themes can be removed in one click..\u003C\u002Fli>\n\u003Cli>Database prefix : customized or not.\u003C\u002Fli>\n\u003Cli>Validity of your SSL certificate (included with LWS \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_wordpress.php\" rel=\"nofollow ugc\">web hosting\u003C\u002Fa> plans).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Server information\u003C\u002Fh4>\n\u003Cp>View all the characteristics of the server on which your WordPress website is hosted:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Environment, server information\u003C\u002Fli>\n\u003Cli>IP address of your device\u003C\u002Fli>\n\u003Cli>Server web port\u003C\u002Fli>\n\u003Cli>SSL certificate status (HTTPS)\u003C\u002Fli>\n\u003Cli>Server name\u003C\u002Fli>\n\u003Cli>Server IP address\u003C\u002Fli>\n\u003Cli>Protocol version\u003C\u002Fli>\n\u003Cli>PHP version\u003C\u002Fli>\n\u003Cli>Debug WP mode status (WordPress debug mode)\u003C\u002Fli>\n\u003Cli>Status of allow_url_fopen (file access functions)\u003C\u002Fli>\n\u003Cli>Server time zone\u003C\u002Fli>\n\u003Cli>Default encoding\u003C\u002Fli>\n\u003Cli>Uploading files\u003C\u002Fli>\n\u003Cli>Maximum execution time\u003C\u002Fli>\n\u003Cli>Maximum number of files per upload\u003C\u002Fli>\n\u003Cli>Maximum number of characters per entry\u003C\u002Fli>\n\u003Cli>RAM memory limit\u003C\u002Fli>\n\u003Cli>Maximum size of an item\u003C\u002Fli>\n\u003Cli>Maximum size of uploaded files\u003C\u002Fli>\n\u003Cli>PHP memory usage\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Optimisation\u003C\u002Fh4>\n\u003Cp>Delete, reduce elements that are not useful to you. Or add minor features. Here are the features you can enable as you wish:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Delete the Windows Live Writer manifest\u003C\u002Fli>\n\u003Cli>Reduce the number of revisions\u003C\u002Fli>\n\u003Cli>Delete author pages and associated links\u003C\u002Fli>\n\u003Cli>Prevent WordPress from disabling pingbacks of your own posts\u003C\u002Fli>\n\u003Cli>Use visitor browser emotes instead of WordPress emotes\u003C\u002Fli>\n\u003Cli>Remove Title 1 in Tiny MCE\u003C\u002Fli>\n\u003Cli>Remove shortlinks\u003C\u002Fli>\n\u003Cli>Add hidden ‘Medium Large’ image size\u003C\u002Fli>\n\u003Cli>Alternative cleaning of uploaded media\u003C\u002Fli>\n\u003Cli>Remove RSS feeds\u003C\u002Fli>\n\u003Cli>Remove links from RSS feeds\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Security\u003C\u002Fh4>\n\u003Cp>Here are some functions that you can activate. These have a positive impact on the security of your site:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Hide connection errors on WP-Login\u003C\u002Fli>\n\u003Cli>Hide the ‘WordPress Version’ meta from pages\u003C\u002Fli>\n\u003Cli>Disable the REST API\u003C\u002Fli>\n\u003Cli>Hide user pages from sitemap\u003C\u002Fli>\n\u003Cli>Hide user endpoints from REST API\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>MySQL Reports\u003C\u002Fh4>\n\u003Cp>Find a summary table of the WordPress data in your MySQL database. You can also repair and optimize your database directly from LWS Tools.\u003C\u002Fp>\n\u003Ch4>Other tools\u003C\u002Fh4>\n\u003Cp>In the last tab of the plugin, you have access to other useful functions:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Disconnect all sessions except the active user (you).\u003C\u002Fli>\n\u003Cli>Clean up revisions that are older than a certain time (please specify)\u003C\u002Fli>\n\u003Cli>Delete trashed or unwanted comments\u003C\u002Fli>\n\u003Cli>Delete temporary data (transients) from the cache\u003C\u002Fli>\n\u003Cli>Reset the plugin configuration\u003C\u002Fli>\n\u003Cli>Keep the configuration even after deleting the plugin\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This plugin is pre-installed when ordering one of these LWS webhosts: \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_wordpress.php\" rel=\"nofollow ugc\">WordPress hosting\u003C\u002Fa>, Classic shared \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_web.php\" rel=\"nofollow ugc\">web hosting\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement-cpanel.php\" rel=\"nofollow ugc\">cPanel hosting\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>Released under the terms of the GNU General Public License.\u003C\u002Fp>\n","Optimize and modify your website's parameters",205846,100,"2025-12-15T09:15:00.000Z","6.9.4",[102,21,22,103],"admin","security","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-tools.2.6.2.zip",98,{"slug":107,"name":108,"version":109,"author":110,"author_profile":111,"description":112,"short_description":113,"active_installs":27,"downloaded":114,"rating":27,"num_ratings":27,"last_updated":115,"tested_up_to":100,"requires_at_least":116,"requires_php":117,"tags":118,"homepage":122,"download_link":123,"security_score":98,"vuln_count":27,"unpatched_count":27,"last_vuln_date":37,"fetched_at":124},"assetbroom-media-cleaner","Assetbroom – Unused Media & Duplicate Image Cleaner","1.0","KAP ASIAs","https:\u002F\u002Fprofiles.wordpress.org\u002Fkapasias\u002F","\u003Cp>\u003Cstrong>AssetBroom – Media Cleaner\u003C\u002Fstrong> helps you detect and remove \u003Cstrong>unused images, duplicate media files, and unnecessary thumbnails\u003C\u002Fstrong> from your WordPress media library.\u003C\u002Fp>\n\u003Cp>Over time, WordPress websites accumulate hundreds or thousands of images that are no longer used. These unused files increase backup size, waste storage, and slow down website maintenance.\u003C\u002Fp>\n\u003Cp>AssetBroom scans your entire website and identifies \u003Cstrong>unused media files\u003C\u002Fstrong>, \u003Cstrong>duplicate images\u003C\u002Fstrong>, and \u003Cstrong>generated image sizes\u003C\u002Fstrong> safely.\u003C\u002Fp>\n\u003Cp>The plugin checks where images are used before marking them unused. This prevents accidental deletion of images used in:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Posts\u003C\u002Fli>\n\u003Cli>Pages\u003C\u002Fli>\n\u003Cli>Page builders\u003C\u002Fli>\n\u003Cli>Featured images\u003C\u002Fli>\n\u003Cli>WordPress generated image sizes\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>With AssetBroom you can safely \u003Cstrong>clean your media library, remove unused images, and optimize storage\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch3>Key Features\u003C\u002Fh3>\n\u003Cp>✔ Detect unused media files\u003Cbr \u002F>\n✔ Detect duplicate images in media library\u003Cbr \u002F>\n✔ Clean WordPress media library safely\u003Cbr \u002F>\n✔ Supports Elementor and page builders\u003Cbr \u002F>\n✔ Detect WordPress generated thumbnails\u003Cbr \u002F>\n✔ Detect responsive image sizes\u003Cbr \u002F>\n✔ Safe move-to-trash workflow\u003Cbr \u002F>\n✔ Lightweight and fast scanning\u003Cbr \u002F>\n✔ Developer friendly code\u003C\u002Fp>\n\u003Ch3>Why Clean Your Media Library?\u003C\u002Fh3>\n\u003Cp>Unused media files can:\u003C\u002Fp>\n\u003Cp>• Increase backup size\u003Cbr \u002F>\n• Slow down site migrations\u003Cbr \u002F>\n• Waste hosting storage\u003Cbr \u002F>\n• Make media management difficult\u003C\u002Fp>\n\u003Cp>AssetBroom helps you keep your \u003Cstrong>WordPress media library clean and optimized\u003C\u002Fstrong>.\u003C\u002Fp>\n","Detect unused images, duplicate media files, and safely clean your WordPress media library without breaking your website.",268,"2026-03-09T13:05:00.000Z","6.0","7.4",[119,20,120,22,121],"clean","media-cleaner","unused-images","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fassetbroom-media-cleaner.1.0.zip","2026-04-06T09:54:40.288Z",{"slug":126,"name":127,"version":128,"author":7,"author_profile":8,"description":129,"short_description":130,"active_installs":11,"downloaded":131,"rating":25,"num_ratings":132,"last_updated":133,"tested_up_to":16,"requires_at_least":17,"requires_php":134,"tags":135,"homepage":23,"download_link":136,"security_score":105,"vuln_count":26,"unpatched_count":27,"last_vuln_date":137,"fetched_at":29},"lws-hide-login","LWS Hide Login","2.2.4","\u003Cp>Secure your website with this plugin !\u003Cbr \u002F>\nRedirect your users if they try to access your admin page directly.\u003Cbr \u002F>\nChoose your own link from your login page and protect your website.\u003C\u002Fp>\n\u003Ch4>Dashboard redirection\u003C\u002Fh4>\n\u003Cp>By default, the \u003Cstrong>404 page\u003C\u002Fstrong> is displayed when trying to access the administration or login page without being logged in or with the wrong URL. You can change this redirection to any page you like.\u003C\u002Fp>\n\u003Ch4>New login address\u003C\u002Fh4>\n\u003Cp>By default, the login page to access your wordpress dashboard is accessible at the address of your domain to which we add the suffix \u003Cstrong>\u002Fwp-admin\u003C\u002Fstrong> or \u003Cstrong>\u002Fwp-login.php\u003C\u002Fstrong>.\u003Cbr \u002F>\nBy changing the login address via the LWS Hide Login plugin, the wp-admin directory and the wp-login.php page become inaccessible, you will have to use the new URL to login.\u003Cbr \u002F>\nIf you deactivate this plugin, your site will be as it was before, accessible at the old URL.\u003C\u002Fp>\n\u003Cp>This plugin is pre-installed when ordering one of these LWS webhosts: \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_wordpress.php\" rel=\"nofollow ugc\">WordPress hosting\u003C\u002Fa>, Classic shared \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_web.php\" rel=\"nofollow ugc\">web hosting\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement-cpanel.php\" rel=\"nofollow ugc\">cPanel hosting\u003C\u002Fa> (soon)\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>Released under the terms of the GNU General Public License.\u003C\u002Fp>\n","Secure your access to the admin page with this plugin !",183463,13,"2025-06-25T10:29:00.000Z","7.0",[21,103],"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-hide-login.2.2.4.zip","2023-11-16 00:00:00",{"slug":139,"name":140,"version":141,"author":142,"author_profile":143,"description":144,"short_description":145,"active_installs":146,"downloaded":147,"rating":105,"num_ratings":148,"last_updated":149,"tested_up_to":16,"requires_at_least":150,"requires_php":18,"tags":151,"homepage":122,"download_link":156,"security_score":157,"vuln_count":158,"unpatched_count":27,"last_vuln_date":159,"fetched_at":29},"phastpress","PhastPress","3.9","Albert Peschar","https:\u002F\u002Fprofiles.wordpress.org\u002Fkiboit\u002F","\u003Cp>PhastPress uses advanced techniques to manipulate your pages, scripts, stylesheets and images to significantly improve load times. It’s designed to conform to Google PageSpeed Insights and GTmetrix recommendations and can improve your site’s score dramatically.\u003C\u002Fp>\n\u003Cp>PhastPress’ motto is \u003Cem>no configuration\u003C\u002Fem>.  Install, activate and go!\u003C\u002Fp>\n\u003Cp>PhastPress has the Phast web page optimisation engine by \u003Ca href=\"https:\u002F\u002Fkiboit.com\u002F\" rel=\"nofollow ugc\">Albert Peschar\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002Fmkosturkov\" rel=\"nofollow ugc\">Milko Kosturkov\u003C\u002Fa> at its core.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Image optimization:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Phast optimizes images using PNG quantization (\u003Ca href=\"https:\u002F\u002Fpngquant.org\u002F\" rel=\"nofollow ugc\">pngquant\u003C\u002Fa>) and JPEG recoding (\u003Ca href=\"https:\u002F\u002Flibjpeg-turbo.org\u002F\" rel=\"nofollow ugc\">libjpeg-turbo\u003C\u002Fa>).\u003C\u002Fli>\n\u003Cli>Phast inlines small images (\u003C 512 bytes) in the page.\u003C\u002Fli>\n\u003Cli>Phast converts JPEG images into WebP for supporting browsers.\u003C\u002Fli>\n\u003Cli>Phast enables \u003Ca href=\"https:\u002F\u002Fweb.dev\u002Fnative-lazy-loading\u002F\" rel=\"nofollow ugc\">native lazy loading\u003C\u002Fa> to speed up page loading and save bandwidth.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Asynchronous scripts and stylesheets:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Phast loads all scripts on your page asynchronously and in a single request, while maintaining full compatibility with legacy scripts, due to our custom script loader.\u003C\u002Fli>\n\u003Cli>Phast proxies external scripts to extend their cache lifetime.\u003C\u002Fli>\n\u003Cli>Phast inlines critical CSS automatically by comparing the rules in your stylesheets with the elements on your page.\u003C\u002Fli>\n\u003Cli>Phast loads non-critical CSS asynchronously and in a single request.\u003C\u002Fli>\n\u003Cli>Phast inlines Google Fonts CSS.\u003C\u002Fli>\n\u003Cli>Phast lazily loads IFrames to prioritize the main page load.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Get the full power of Phast for your website by installing PhastPress now.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fkiboit.com\u002Fphastpress-support\" rel=\"nofollow ugc\">\u003Cstrong>For commercial support and bug reports, click here.\u003C\u002Fstrong>\u003C\u002Fa>\u003C\u002Fp>\n","PhastPress automatically optimizes your site for the best possible performance.",10000,502905,99,"2026-02-11T11:47:00.000Z","6.2",[22,152,153,154,155],"optimization","page-speed","pagespeed-insights","speed","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fphastpress.3.9.zip",93,2,"2025-12-22 00:00:00",{"slug":161,"name":162,"version":163,"author":7,"author_profile":8,"description":164,"short_description":165,"active_installs":166,"downloaded":167,"rating":98,"num_ratings":84,"last_updated":168,"tested_up_to":16,"requires_at_least":17,"requires_php":134,"tags":169,"homepage":23,"download_link":172,"security_score":148,"vuln_count":47,"unpatched_count":27,"last_vuln_date":173,"fetched_at":29},"lwscache","LWSCache","2.9","\u003Cp>This plugin, created by \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\" rel=\"nofollow ugc\">LWS\u003C\u002Fa> help to automatically \u003Cstrong>manage your LWSCache purge when you edit your pages, post, messages…\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>It provide a way to \u003Cstrong>purge all your LWSCache\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>This plugin works only on servers using the LWSCache system. This cache is pre-installed with Classic shared \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_web.php\" rel=\"nofollow ugc\">web hosting\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement_wordpress.php\" rel=\"nofollow ugc\">WordPress hosting\u003C\u002Fa> and soon \u003Ca href=\"https:\u002F\u002Fwww.lws.fr\u002Fhebergement-cpanel.php\" rel=\"nofollow ugc\">cPanel hosting\u003C\u002Fa> from LWS.\u003C\u002Fp>\n\u003Cp>The loading speed of your site is crucial to its success. The more visitors your site has, the more RAM and CPU memory the system uses. The page is loaded slowly. So you need a cache system to avoid reloading the page when it is not necessary.\u003C\u002Fp>\n\u003Cp>In addition, the site’s page load speed is used in Google’s ranking algorithm. So caching plugins that can improve load times will \u003Cstrong>improve your SEO ranking\u003C\u002Fstrong>.  Low rankings, and therefore insufficient exposure, often do not allow you to make a living from your website. The loading time of most websites is less than three seconds. Beyond that, many users have already left the page.\u003C\u002Fp>\n\u003Cp>The LWS Cache tool is a system designed and developed by LWS. It \u003Cstrong>optimize the loading performance of your website\u003C\u002Fstrong> through the use of advanced caching mechanisms, configured at the server level. The tool uses the technologies provided by NGINX.\u003C\u002Fp>\n\u003Ch4>Functioning\u003C\u002Fh4>\n\u003Cp>When LWS Cache is enabled, a cache server is introduced between the visitor and the web server.\u003Cbr \u002F>\nThe aim is to reduce the number of script executions required. For that it keeps the result of the execution in memory for future requests requiring the same response. This means that the same script is no longer executed several times to achieve the same result.\u003C\u002Fp>\n\u003Cp>Thus, we eliminate the waiting time of the script execution on the page loading time. At the same time, we save the resources used during the script execution.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>The visitor requests the page from the web server\u003C\u002Fstrong>. Example: index.php. LWS Cache checks if the page has already been generated and stored in the cache\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>If yes\u003C\u002Fstrong>, the page is returned directly to the visitor without the need to access the web service and without executing the script\u003C\u002Fp>\n\u003Cp>\u003Cstrong>If not\u003C\u002Fstrong>, the page is requested to be generated on the web service as a result of the script execution (PHP, NodeJS, Perl, Ruby, …).\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Once the page is generated, \u003Cstrong>LWS Cache determines if the page can be cached\u003C\u002Fstrong> (via headers, URL, …)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>If yes\u003C\u002Fstrong>, the page is saved in the cache and returned to the visitor\u003C\u002Fp>\n\u003Cp>\u003Cstrong>If not\u003C\u002Fstrong>, the page is saved in the microcache (short-lived cache) and returned to the visitor\u003C\u002Fp>\n\u003Ch4>Managing LWS Cache with the plugin\u003C\u002Fh4>\n\u003Cp>The WordPress LWS Cache plugin allows you to \u003Cstrong>automatically purge the cache\u003C\u002Fstrong> of your pages when you modify them or when you add\u002Fapprove comments.\u003C\u002Fp>\n\u003Cp>To \u003Cstrong>manage the plugin\u003C\u002Fstrong>, once connected to your WordPress administration console, go to the “Settings” menu and then “LWS Cache”.\u003C\u002Fp>\n\u003Cp>From the settings page, you can enable\u002Fdisable automatic emptying. You can define when to automatically empty the LWS Cache and completely purge the cache.\u003C\u002Fp>\n\u003Cp>A button for emptying the entire cache can be found anywhere in the WordPress admin console (in the quick access bar at the top of the screen).\u003C\u002Fp>\n\u003Ch4>Key Features\u003C\u002Fh4>\n\u003Cp>Several settings are available to manage your LWS Cache, you can enable or disable these settings:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>Automatic purge\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Home Page Purge (when a post is modified or added, when a published post is trashed)\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Purge Post\u002FPage\u002FCustom Post Type (when a post is published, when a comment is approved\u002Fpublished, when a comment is unapproved\u002Fdeleted)\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Purge Archives (date, category, tag, author, custom taxonomies)\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Purge all cache\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n","This plugin lets you manage and automatically purge your hosting's LWSCache whenever you edit your website's content",7000,150709,"2025-08-28T13:46:00.000Z",[170,21,171],"cache","nginx","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flwscache.2.9.zip","2025-08-28 00:00:00",{"attackSurface":175,"codeSignals":286,"taintFlows":415,"riskAssessment":433,"analyzedAt":451},{"hooks":176,"ajaxHandlers":216,"restRoutes":282,"shortcodes":283,"cronEvents":284,"entryPointCount":285,"unprotectedCount":47},[177,183,187,191,197,200,205,209,212],{"type":178,"name":179,"callback":180,"priority":27,"file":181,"line":182},"action","admin_notices","closure","lws-cleaner.php",22,{"type":178,"name":184,"callback":185,"file":181,"line":186},"init","lws_cl_traduction",31,{"type":178,"name":188,"callback":189,"file":181,"line":190},"admin_init","lws_cl_disable_comments_post_types_support",40,{"type":192,"name":193,"callback":194,"priority":195,"file":181,"line":196},"filter","comments_open","lws_cl_disable_comments_status",20,41,{"type":192,"name":198,"callback":194,"priority":195,"file":181,"line":199},"pings_open",42,{"type":192,"name":201,"callback":202,"priority":203,"file":181,"line":204},"comments_array","lws_cl_disable_comments_hide_existing_comments",10,45,{"type":178,"name":206,"callback":207,"file":181,"line":208},"admin_enqueue_scripts","lws_cl_scripts",52,{"type":178,"name":179,"callback":210,"file":181,"line":211},"lwscl_review_ad_plugin",61,{"type":178,"name":213,"callback":214,"file":181,"line":215},"admin_menu","lws_cl_menu_admin",174,[217,222,226,230,234,238,242,246,250,254,258,262,266,270,274,278],{"action":218,"nopriv":49,"callback":219,"hasNonce":220,"hasCapCheck":49,"file":181,"line":221},"lws_cleaner_reminder_ajax","lws_cleaner_remind_me_later",true,617,{"action":223,"nopriv":49,"callback":224,"hasNonce":220,"hasCapCheck":49,"file":181,"line":225},"lws_cleaner_donotask_ajax","lws_cleaner_do_not_ask",627,{"action":227,"nopriv":49,"callback":228,"hasNonce":220,"hasCapCheck":49,"file":181,"line":229},"lwscleaner_deletePlugin","lws_cleaner_delete_plugin",638,{"action":231,"nopriv":49,"callback":232,"hasNonce":220,"hasCapCheck":49,"file":181,"line":233},"lwscleaner_deleteTheme","lws_cleaner_delete_theme",647,{"action":235,"nopriv":49,"callback":236,"hasNonce":49,"hasCapCheck":49,"file":181,"line":237},"lws_cl_downloadPlugin","wp_ajax_install_plugin",660,{"action":239,"nopriv":49,"callback":240,"hasNonce":220,"hasCapCheck":49,"file":181,"line":241},"lws_cl_activatePlugin","lws_cleaner_activate_plugin",664,{"action":243,"nopriv":49,"callback":244,"hasNonce":220,"hasCapCheck":49,"file":181,"line":245},"lws_cl_in_cache_modal","lws_cl_modal_in_cache",700,{"action":247,"nopriv":49,"callback":248,"hasNonce":220,"hasCapCheck":49,"file":181,"line":249},"lws_cleaner_posts_ajax","lws_cl_post",713,{"action":251,"nopriv":49,"callback":252,"hasNonce":220,"hasCapCheck":49,"file":181,"line":253},"lws_cleaner_comments_ajax","lws_cl_comment",758,{"action":255,"nopriv":49,"callback":256,"hasNonce":220,"hasCapCheck":49,"file":181,"line":257},"lws_cleaner_terms_ajax","lws_cl_term",819,{"action":259,"nopriv":49,"callback":260,"hasNonce":220,"hasCapCheck":49,"file":181,"line":261},"lws_cleaner_users_ajax","lws_cl_user",856,{"action":263,"nopriv":49,"callback":264,"hasNonce":220,"hasCapCheck":49,"file":181,"line":265},"lws_cleaner_settings_ajax","lws_cl_settings",886,{"action":267,"nopriv":49,"callback":268,"hasNonce":220,"hasCapCheck":49,"file":181,"line":269},"lws_cleaner_pluginsandthemes_ajax","lws_cl_pandt",908,{"action":271,"nopriv":49,"callback":272,"hasNonce":220,"hasCapCheck":49,"file":181,"line":273},"lws_cleaner_ignore_element","lws_cl_ignore_element",940,{"action":275,"nopriv":49,"callback":276,"hasNonce":220,"hasCapCheck":49,"file":181,"line":277},"lws_cleaner_delete_element","lws_cl_delete_element",954,{"action":279,"nopriv":49,"callback":280,"hasNonce":220,"hasCapCheck":49,"file":181,"line":281},"lws_cleaner_unignore_element","lws_cl_unignore_element",968,[],[],[],16,{"dangerousFunctions":287,"sqlUsage":288,"outputEscaping":389,"fileOperations":27,"externalRequests":27,"nonceChecks":413,"capabilityChecks":27,"bundledLibraries":414},[],{"prepared":27,"raw":289,"locations":290},48,[291,294,296,298,300,302,304,306,308,310,312,314,316,318,320,322,324,326,328,330,332,335,337,339,341,343,345,347,349,351,353,355,357,359,361,363,365,367,369,371,373,375,377,379,381,383,385,387],{"file":181,"line":292,"context":293},79,"$wpdb->query() with variable interpolation",{"file":181,"line":295,"context":293},90,{"file":181,"line":297,"context":293},223,{"file":181,"line":299,"context":293},224,{"file":181,"line":301,"context":293},225,{"file":181,"line":303,"context":293},226,{"file":181,"line":305,"context":293},227,{"file":181,"line":307,"context":293},228,{"file":181,"line":309,"context":293},289,{"file":181,"line":311,"context":293},290,{"file":181,"line":313,"context":293},291,{"file":181,"line":315,"context":293},292,{"file":181,"line":317,"context":293},293,{"file":181,"line":319,"context":293},357,{"file":181,"line":321,"context":293},358,{"file":181,"line":323,"context":293},359,{"file":181,"line":325,"context":293},360,{"file":181,"line":327,"context":293},402,{"file":181,"line":329,"context":293},403,{"file":181,"line":331,"context":293},427,{"file":181,"line":333,"context":334},724,"$wpdb->get_results() with variable interpolation",{"file":181,"line":336,"context":334},727,{"file":181,"line":338,"context":334},730,{"file":181,"line":340,"context":334},733,{"file":181,"line":342,"context":334},736,{"file":181,"line":344,"context":334},739,{"file":181,"line":346,"context":334},747,{"file":181,"line":348,"context":334},768,{"file":181,"line":350,"context":334},771,{"file":181,"line":352,"context":334},774,{"file":181,"line":354,"context":334},777,{"file":181,"line":356,"context":334},780,{"file":181,"line":358,"context":334},788,{"file":181,"line":360,"context":334},829,{"file":181,"line":362,"context":334},832,{"file":181,"line":364,"context":334},835,{"file":181,"line":366,"context":334},843,{"file":181,"line":368,"context":334},847,{"file":181,"line":370,"context":334},866,{"file":181,"line":372,"context":334},873,{"file":181,"line":374,"context":334},877,{"file":181,"line":376,"context":334},896,{"file":181,"line":378,"context":334},947,{"file":181,"line":380,"context":334},961,{"file":181,"line":382,"context":334},975,{"file":181,"line":384,"context":334},1083,{"file":181,"line":386,"context":334},1092,{"file":181,"line":388,"context":334},1279,{"escaped":390,"rawEcho":391,"locations":392},270,8,[393,396,398,401,403,406,409,411],{"file":181,"line":394,"context":395},1063,"raw output",{"file":181,"line":397,"context":395},1259,{"file":399,"line":400,"context":395},"views\\lws_cl_main_pages.php",55,{"file":399,"line":402,"context":395},110,{"file":404,"line":405,"context":395},"views\\lws_cl_plugins.php",44,{"file":407,"line":408,"context":395},"views\\lws_cl_tabs.php",204,{"file":407,"line":410,"context":395},233,{"file":407,"line":412,"context":395},260,15,[],[416],{"entryPoint":417,"graph":418,"unsanitizedCount":27,"severity":432},"\u003Clws-cleaner> (lws-cleaner.php:0)",{"nodes":419,"edges":430},[420,425],{"id":421,"type":422,"label":423,"file":181,"line":424},"n0","source","$_POST (x2)",914,{"id":426,"type":427,"label":428,"file":181,"line":384,"wp_function":429},"n1","sink","get_results() [SQLi]","get_results",[431],{"from":421,"to":426,"sanitized":220},"low",{"summary":434,"deductions":435},"The 'lws-cleaner' plugin v2.4.3 exhibits a mixed security posture. While the static analysis shows a high percentage of properly escaped output and a lack of critical taint flows, several concerning areas persist. The plugin exposes a significant attack surface with 16 AJAX handlers, and alarmingly, one of these lacks any authentication checks. This is a major security gap that could allow unauthorized users to trigger plugin functionality.\n\nThe vulnerability history of this plugin is a significant concern. It has a history of three known CVEs, with two classified as high severity, one medium, and a common pattern including Absolute Path Traversal, Cross-Site Request Forgery (CSRF), and Missing Authorization. Although there are currently no unpatched vulnerabilities, this history indicates a recurring tendency to introduce critical security flaws. The last reported vulnerability was in September 2025, suggesting potential for new issues to arise.\n\nIn conclusion, while the plugin demonstrates some good practices like extensive output escaping and no reported critical taint flows, the unprotected AJAX handler and the consistent history of high-severity vulnerabilities, particularly those related to authorization and path traversal, present a considerable risk. Users should exercise caution and ensure the plugin is kept up-to-date, and actively monitor for any new security advisories.",[436,438,440,442,444,446,448],{"reason":437,"points":203},"AJAX handler without authentication",{"reason":439,"points":195},"SQL queries without prepared statements",{"reason":441,"points":195},"Two high severity past CVEs",{"reason":443,"points":203},"One medium severity past CVE",{"reason":445,"points":203},"Vulnerability history: Missing Authorization",{"reason":447,"points":203},"Vulnerability history: Absolute Path Traversal",{"reason":449,"points":450},"Vulnerability history: CSRF",5,"2026-03-16T17:33:19.367Z",{"wat":453,"direct":460},{"assetPaths":454,"generatorPatterns":457,"scriptPaths":458,"versionParams":459},[455,456],"\u002Fwp-content\u002Fplugins\u002Flws-cleaner\u002Fcss\u002Flws_cl_style.css","\u002Fwp-content\u002Fplugins\u002Flws-cleaner\u002Fcss\u002Flws_cl_style_out.css",[],[],[],{"cssClasses":461,"htmlComments":469,"htmlAttributes":470,"restEndpoints":474,"jsGlobals":475,"shortcodeOutput":478},[462,463,464,465,466,467,468],"lwscl_review_block_general","lws_cl_circle","lwscl_review_block_image","lwscl_review_block_title","lwscl_review_block_desc","lwscl_button_rate_plugin","lwscl_review_button_secondary",[],[471,472,473],"id=\"lws_cl_review_notice\"","action: \"lws_cleaner_reminder_ajax\"","action: \"lws_cleaner_donotask_ajax\"",[],[476,477],"lws_cl_remind_me","lws_cl_do_not_bother_me",[],{"error":220,"url":480,"statusCode":481,"statusMessage":482,"message":482},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Flws-cleaner\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":484,"versions":485},18,[486,493,498,504,512,520,528,536,544,551,560,569,578,586,596,606,616,626],{"version":487,"download_url":488,"svn_tag_url":489,"released_at":37,"has_diff":49,"diff_files_changed":490,"diff_lines":37,"trac_diff_url":491,"vulnerabilities":492,"is_current":49},"2.4.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.4.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.4.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.4.3&new_path=%2Flws-cleaner%2Ftags%2F2.4.4",[],{"version":6,"download_url":24,"svn_tag_url":494,"released_at":37,"has_diff":49,"diff_files_changed":495,"diff_lines":37,"trac_diff_url":496,"vulnerabilities":497,"is_current":220},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.4.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.4.2&new_path=%2Flws-cleaner%2Ftags%2F2.4.3",[],{"version":39,"download_url":499,"svn_tag_url":500,"released_at":37,"has_diff":49,"diff_files_changed":501,"diff_lines":37,"trac_diff_url":502,"vulnerabilities":503,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.4.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.4.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.4.1.3&new_path=%2Flws-cleaner%2Ftags%2F2.4.2",[],{"version":505,"download_url":506,"svn_tag_url":507,"released_at":37,"has_diff":49,"diff_files_changed":508,"diff_lines":37,"trac_diff_url":509,"vulnerabilities":510,"is_current":49},"2.4.1.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.4.1.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.4.1.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.4.1.2&new_path=%2Flws-cleaner%2Ftags%2F2.4.1.3",[511],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":513,"download_url":514,"svn_tag_url":515,"released_at":37,"has_diff":49,"diff_files_changed":516,"diff_lines":37,"trac_diff_url":517,"vulnerabilities":518,"is_current":49},"2.4.1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.4.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.4.1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.4.1.1&new_path=%2Flws-cleaner%2Ftags%2F2.4.1.2",[519],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":521,"download_url":522,"svn_tag_url":523,"released_at":37,"has_diff":49,"diff_files_changed":524,"diff_lines":37,"trac_diff_url":525,"vulnerabilities":526,"is_current":49},"2.4.1.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.4.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.4.1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.4.1&new_path=%2Flws-cleaner%2Ftags%2F2.4.1.1",[527],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":529,"download_url":530,"svn_tag_url":531,"released_at":37,"has_diff":49,"diff_files_changed":532,"diff_lines":37,"trac_diff_url":533,"vulnerabilities":534,"is_current":49},"2.4.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.4.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.4.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.4&new_path=%2Flws-cleaner%2Ftags%2F2.4.1",[535],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":537,"download_url":538,"svn_tag_url":539,"released_at":37,"has_diff":49,"diff_files_changed":540,"diff_lines":37,"trac_diff_url":541,"vulnerabilities":542,"is_current":49},"2.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.3.1&new_path=%2Flws-cleaner%2Ftags%2F2.4",[543],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":56,"download_url":545,"svn_tag_url":546,"released_at":37,"has_diff":49,"diff_files_changed":547,"diff_lines":37,"trac_diff_url":548,"vulnerabilities":549,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.3.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.3.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.3&new_path=%2Flws-cleaner%2Ftags%2F2.3.1",[550],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":552,"download_url":553,"svn_tag_url":554,"released_at":37,"has_diff":49,"diff_files_changed":555,"diff_lines":37,"trac_diff_url":556,"vulnerabilities":557,"is_current":49},"2.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.2.5&new_path=%2Flws-cleaner%2Ftags%2F2.3",[558,559],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":561,"download_url":562,"svn_tag_url":563,"released_at":37,"has_diff":49,"diff_files_changed":564,"diff_lines":37,"trac_diff_url":565,"vulnerabilities":566,"is_current":49},"2.2.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.2.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.2.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.2&new_path=%2Flws-cleaner%2Ftags%2F2.2.5",[567,568],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":570,"download_url":571,"svn_tag_url":572,"released_at":37,"has_diff":49,"diff_files_changed":573,"diff_lines":37,"trac_diff_url":574,"vulnerabilities":575,"is_current":49},"2.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.1&new_path=%2Flws-cleaner%2Ftags%2F2.2",[576,577],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":73,"download_url":579,"svn_tag_url":580,"released_at":37,"has_diff":49,"diff_files_changed":581,"diff_lines":37,"trac_diff_url":582,"vulnerabilities":583,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.0.2&new_path=%2Flws-cleaner%2Ftags%2F2.1",[584,585],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":587,"download_url":588,"svn_tag_url":589,"released_at":37,"has_diff":49,"diff_files_changed":590,"diff_lines":37,"trac_diff_url":591,"vulnerabilities":592,"is_current":49},"2.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.0.1&new_path=%2Flws-cleaner%2Ftags%2F2.0.2",[593,594,595],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":68,"url_slug":69,"title":70,"severity":40,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":597,"download_url":598,"svn_tag_url":599,"released_at":37,"has_diff":49,"diff_files_changed":600,"diff_lines":37,"trac_diff_url":601,"vulnerabilities":602,"is_current":49},"2.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F2.0&new_path=%2Flws-cleaner%2Ftags%2F2.0.1",[603,604,605],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":68,"url_slug":69,"title":70,"severity":40,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":607,"download_url":608,"svn_tag_url":609,"released_at":37,"has_diff":49,"diff_files_changed":610,"diff_lines":37,"trac_diff_url":611,"vulnerabilities":612,"is_current":49},"2.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.2.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F2.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F1.0.1&new_path=%2Flws-cleaner%2Ftags%2F2.0",[613,614,615],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":68,"url_slug":69,"title":70,"severity":40,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":617,"download_url":618,"svn_tag_url":619,"released_at":37,"has_diff":49,"diff_files_changed":620,"diff_lines":37,"trac_diff_url":621,"vulnerabilities":622,"is_current":49},"1.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.1.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F1.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Flws-cleaner%2Ftags%2F1.0&new_path=%2Flws-cleaner%2Ftags%2F1.0.1",[623,624,625],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":68,"url_slug":69,"title":70,"severity":40,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":109,"download_url":627,"svn_tag_url":628,"released_at":37,"has_diff":49,"diff_files_changed":629,"diff_lines":37,"trac_diff_url":37,"vulnerabilities":630,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flws-cleaner.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Flws-cleaner\u002Ftags\u002F1.0\u002F",[],[631,632,633],{"id":51,"url_slug":52,"title":53,"severity":57,"cvss_score":58,"vuln_type":60,"patched_in_version":56},{"id":68,"url_slug":69,"title":70,"severity":40,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39}]