[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$ffElrr2i7dIaTMeFPPXLZC0z8qKA2l-rDr9UvKDFcGpw":3,"$fwPyTJ4gdq1Mln5ySHJOzVnewZS51onhETD9TN40MHlU":182,"$fT2Rr5lzaBqGfK08X0shrgwNcX2tLdikm21-yRR8KQCg":187},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"discovery_status":31,"vulnerabilities":32,"developer":33,"crawl_stats":29,"alternatives":40,"analysis":132,"fingerprints":158},"magento-user-compatibility","Magento User Compatibility","1.1","curlybracket","https:\u002F\u002Fprofiles.wordpress.org\u002Fveganist\u002F","\u003Cp>This plugin will allow you to automatically rehash the passwords of users you have beforehand imported from a Magento database to your WordPress database.\u003C\u002Fp>\n\u003Cp>This is useful if you are migrating a website from Magento to WordPress.\u003C\u002Fp>\n\u003Cp>It allows users to authenticate via their email address, like on a Magento installation.\u003C\u002Fp>\n\u003Cp>Upon login, the plugin will check the password entered by the user, against the value stored in the database. It’ll verify if the password is correct and, only in that case, it’ll rehash the password using WordPress’ default hashing algorithm and insert the new password to the database. Then it’ll try logging in.\u003C\u002Fp>\n\u003Cp>In every other case, login will function normally, so if there is an error, it’ll be returned.\u003C\u002Fp>\n\u003Cp>In a while, every former Magento user you have imported to your WP DB will have their passwords securely rehashed.\u003C\u002Fp>\n\u003Cp>Tested successfully with Magento 1.8.0.0 and WordPress 3.7.1.\u003C\u002Fp>\n","This plugin will automatically rehash the passwords of users you have beforehand imported from a Magento database to your WP database.",10,2470,86,3,"2016-11-14T15:48:00.000Z","3.7.41","2.8","",[20,21,22,23,24],"authentication","email","login","magento","users","http:\u002F\u002Fcurlybracket.net\u002F2013\u002F12\u002F05\u002Fmagento-user-compatibility\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmagento-user-compatibility.zip",85,0,null,"2026-04-16T10:56:18.058Z","no_bundle",[],{"slug":34,"display_name":7,"profile_url":8,"plugin_count":35,"total_installs":36,"avg_security_score":27,"avg_patch_time_days":37,"trust_score":38,"computed_at":39},"veganist",4,40,30,84,"2026-05-20T08:03:40.941Z",[41,59,80,100,119],{"slug":42,"name":43,"version":44,"author":45,"author_profile":46,"description":47,"short_description":48,"active_installs":49,"downloaded":50,"rating":28,"num_ratings":28,"last_updated":51,"tested_up_to":52,"requires_at_least":53,"requires_php":54,"tags":55,"homepage":57,"download_link":58,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"force-login-with-email","Force Login With Email","1.0.5","MarcosAlexandre","https:\u002F\u002Fprofiles.wordpress.org\u002Fmarcosalexandre\u002F","\u003Cp>Force Login With Email is a fork of the Email Login Auth plugin. It is a very simple WordPress plugin, which allows users to login with their account email address. Just install, activate it and try to re-login! You can also disable login with username for all users or for ‘admin’ only.\u003C\u002Fp>\n\u003Ch4>How to use\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>After installation, enable the plugin.\u003C\u002Fli>\n\u003Cli>Now you and your users will be able to login using their account e-mail address!\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Development\u003C\u002Fh3>\n\u003Cp>This version of the \u003Cstrong>Force Login With Email\u003C\u002Fstrong> plugin was developed without any connection with the previous developer and we count on your help to improve the code and operation of this plugin.\u003C\u002Fp>\n\u003Ch4>Compatibility\u003C\u002Fh4>\n\u003Cp>Compatible since version 4.0.x of WordPress.\u003Cbr \u002F>\nCompatible since version 3.0.x of WooCommerce.\u003C\u002Fp>\n\u003Ch3>Doubts?\u003C\u002Fh3>\n\u003Cp>You can ask questions by:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Using our \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmarcos-alexandre82\u002Fforce-login-with-email\u002Fissues\u002F\" rel=\"nofollow ugc\">forum on Github\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>Creating a topic in the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fforce-login-with-email\u002F\" rel=\"ugc\">WordPress help forum\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Credits\u003C\u002Fh4>\n\u003Cp>This plugin is a fork that implements internationalization and continues the excellent plugin developed by \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002Fmikk_cz\u002F\" rel=\"nofollow ugc\">Michal Stanke\u003C\u002Fa> in:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Femail-login-auth\u002F\" rel=\"ugc\">Email Login Auth\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Banner:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fbr.freepik.com\u002Ffotos-vetores-gratis\u002Ffundo\u002F\" rel=\"nofollow ugc\">Freepik\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Icon:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fbr.freepik.com\u002Ffotos-vetores-gratis\u002Fnegocio\u002F\" rel=\"nofollow ugc\">Freepik\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Contributors\u003C\u002Fh4>\n\u003Cp>You can contribute source code on our page at \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmarcos-alexandre82\u002Fforce-login-with-email\u002Fissues\u002F\" rel=\"nofollow ugc\">GitHub\u003C\u002Fa>.\u003C\u002Fp>\n","Enable login in WordPress only with user e-mail address.",200,8942,"2020-07-13T23:52:00.000Z","5.4.19","4.0","5.6",[20,21,22,56],"username","https:\u002F\u002Fgithub.com\u002Fmarcos-alexandre82\u002Fforce-login-with-email","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fforce-login-with-email.1.0.5.zip",{"slug":60,"name":61,"version":62,"author":63,"author_profile":64,"description":65,"short_description":66,"active_installs":67,"downloaded":68,"rating":67,"num_ratings":14,"last_updated":69,"tested_up_to":70,"requires_at_least":71,"requires_php":72,"tags":73,"homepage":75,"download_link":76,"security_score":77,"vuln_count":78,"unpatched_count":28,"last_vuln_date":79,"fetched_at":30},"magic-login-mail","Magic Login Mail or QR Code","2.06","Katsushi Kawamori","https:\u002F\u002Fprofiles.wordpress.org\u002Fkatsushi-kawamori\u002F","\u003Cp>Enter your email address, and send you an email with a magic link or QR Code to login without a password.\u003C\u002Fp>\n\u003Ch4>Login\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Login with email address only.\u003C\u002Fli>\n\u003Cli>Only registered users can login.\u003C\u002Fli>\n\u003Cli>Password-less login from the magic link or QR code notified in the email.\u003C\u002Fli>\n\u003Cli>shortcode : \u003Ccode>[magic_login]\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>action hook : \u003Ccode>do_action( 'magic_email_send', $emails | array, true | bool )\u003C\u002Fcode> : To send the magic link simultaneously from the management account.\u003C\u002Fli>\n\u003Cli>QR code login on the user’s administration screen.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Thanks\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>This plugin is a modified version of \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fpasswordless-login\u002F\" rel=\"ugc\">Passwordless Login\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>The main changes are the addition of various filter hooks and the addition of the following action hooks.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Action hook\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>This is for sending bulk e-mails with a magic link for login to multiple accounts from the management screen.\u003C\u002Fli>\n\u003Cli>When using this action hook, the URL of the page where the shortcode [magic_login] is placed should be specified in the filter hook ‘magic_login_mail_url’.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * To send the magic link simultaneously from the management account.\n *\n * @param array  $emails  Multiple email addresses.\n * @param bool   true  Output notifications to the management screen immediately after sending.\n *\u002F\ndo_action( 'magic_email_send', $emails, true );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch4>Filter hooks\u003C\u002Fh4>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for magic link url with mail.\n *\n *\u002F\nadd_filter( 'magic_login_mail_url', function(){ return 'url'; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Currently logged in user link for Magic Login Mail\n *\n * @param string $url  URL.\n * @param int    $user_id  User ID.\n * @return $url\n *\u002F\nadd_filter( 'magic_login_mail_user_redirect', 'redirect_url_login_users', 10, 2 );\n\n\u002F** ==================================================\n * Login user after redirect for Magic Login Mail\n *\n * @param string $url  URL.\n * @param int    $user_id  User ID.\n * @return $url\n *\u002F\nadd_filter( 'magic_login_mail_after_login_redirect', 'redirect_url_login_users', 10, 2 );\n\nfunction redirect_url_login_users( $url, $user_id ){\n    \u002F* your code *\u002F\n    return $url;\n}\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for message with shortcode form.\n *\n *\u002F\nadd_filter( 'magic_login_mail_success_link_msg', function(){ return 'Message for success.'; }, 10, 1 );\nadd_filter( 'magic_login_mail_success_login_msg', function(){ return 'Message for success with login.'; }, 10, 1 );\nadd_filter( 'magic_login_mail_valid_errors', function(){ return 'Message for mail validation error.'; }, 10, 1 );\nadd_filter( 'magic_login_mail_email_errors', function(){ return 'Message for sent mail error.'; }, 10, 1 );\nadd_filter( 'magic_login_mail_invalid_token_error', function(){ return 'Message for token error.'; }, 10, 1 );\nadd_filter( 'magic_login_mail_form_label', function(){ return 'Message for form label.'; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for color with shortcode form.\n *\n *\u002F\nadd_filter( 'magic_login_mail_success_link_msg_back_color', function(){ return '#e7f7d3'; }, 10, 1 );\nadd_filter( 'magic_login_mail_success_login_msg_back_color', function(){ return '#e7f7d3'; }, 10, 1 );\nadd_filter( 'magic_login_mail_valid_errors_back_color', function(){ return '#ffebe8'; }, 10, 1 );\nadd_filter( 'magic_login_mail_email_errors_back_color', function(){ return '#ffebe8'; }, 10, 1 );\nadd_filter( 'magic_login_mail_invalid_token_error_back_color', function(){ return '#ffebe8'; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for input text size.\n *\n *\u002F\nadd_filter( 'magic_login_mail_input_size', function(){ return 17; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for class name.\n *\n *\u002F\nadd_filter( 'magic_login_mail_notice_class_name', function(){ return 'mynotice'; }, 10, 1 );\nadd_filter( 'magic_login_mail_form_class_name', function(){ return 'myform'; }, 10, 1 );\nadd_filter( 'magic_login_mail_label_class_name', function(){ return 'mylabel'; }, 10, 1 );\nadd_filter( 'magic_login_mail_input_class_name', function(){ return 'myinput'; }, 10, 1 );\nadd_filter( 'magic_login_mail_submit_class_name', function(){ return 'mysubmit'; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for message with mail subject.\n *\n *\u002F\nadd_filter( 'magic_login_mail_subject', function(){ return 'subject'; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for message with mail.\n *\n * @param string $message  message.\n * @param string $url  url.\n * @param string $exp_date_time  expiration date and time.\n *\u002F\nadd_filter(\n    'magic_login_mail_message',\n    function( $message, $url, $exp_date_time ) {\n\n        $message .= '\u003Cbr>\u003Cbr>' . 'You may only log in once using the link above.';\n\n        return $message;\n    },\n    10,\n    3\n);\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for login expiration.\n *\n *\u002F\nadd_filter( 'magic_login_mail_expiration', function(){ return 10; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n","Enter your email address, and send you an email with a magic link or QR Code to login without a password.",100,6372,"2026-03-29T22:26:00.000Z","7.0","4.7","8.0",[21,22,74,24],"passwordless","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fmagic-login-mail\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmagic-login-mail.2.06.zip",97,1,"2026-02-13 16:21:07",{"slug":81,"name":82,"version":83,"author":84,"author_profile":85,"description":86,"short_description":87,"active_installs":88,"downloaded":89,"rating":28,"num_ratings":28,"last_updated":90,"tested_up_to":91,"requires_at_least":92,"requires_php":93,"tags":94,"homepage":97,"download_link":98,"security_score":99,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"bh-wp-autologin-urls","Magic Emails & Autologin URLs","2.4.2","Brian Henry","https:\u002F\u002Fprofiles.wordpress.org\u002Fbrianhenryie\u002F","\u003Cp>A new “Email Magic Link” button is added to the standard WordPress and WooCommerce login screens. If there is a user\u003Cbr \u002F>\naccount for the username filled out, they will receive an email with a link to log them in without a password.\u003C\u002Fp>\n\u003Cp>All emails sent from WordPress will contain login codes in links pointing back to the website:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Comment reply emails\u003C\u002Fli>\n\u003Cli>Abandoned cart emails\u003C\u002Fli>\n\u003Cli>Membership reminder emails\u003C\u002Fli>\n\u003Cli>etc.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>No configuration is required, by default:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Autologin URLs work for one week\u003C\u002Fli>\n\u003Cli>Emails to administrators are excluded\u003C\u002Fli>\n\u003Cli>Emails on exclusion shortlist are not modified\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>An API is available for developers to use autologin codes elsewhere in WordPress, e.g. push notifications, and to conditionally disable the plugin’s use. Code is published on GitHub, uses WordPress Plugin Boilerplate, conforms (mostly) to WordPress Coding Standards, and is unit & integration tested.\u003C\u002Fp>\n","Adds magic email link to login screen. Adds single-use passwords to WordPress emails' URLs for frictionless login.",80,5181,"2024-05-26T20:43:00.000Z","6.4.8","4.5.0","7.4",[21,95,22,96,24],"links","newsletter","https:\u002F\u002Fwordpress.org\u002FBrianHenryIE\u002Fbh-wp-autologin-urls","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbh-wp-autologin-urls.zip",92,{"slug":101,"name":102,"version":103,"author":104,"author_profile":105,"description":106,"short_description":107,"active_installs":37,"downloaded":108,"rating":109,"num_ratings":78,"last_updated":110,"tested_up_to":111,"requires_at_least":112,"requires_php":93,"tags":113,"homepage":18,"download_link":118,"security_score":67,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"email-otp-login","Email OTP Login","1.0.0","Tushar Sharma","https:\u002F\u002Fprofiles.wordpress.org\u002Fricheal\u002F","\u003Cp>Email OTP Login adds an additional layer of security to your WordPress site by requiring users to verify an OTP sent to their email after entering their username and password. This ensures that only users with access to the registered email can log in.\u003C\u002Fp>\n\u003Cp>Features:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Email OTP verification during \u003Cstrong>login\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>OTP expires in 5 minutes (configurable).\u003C\u002Fli>\n\u003Cli>OTP stored securely using WordPress password hashing.\u003C\u002Fli>\n\u003Cli>Works with the default WordPress login form.\u003C\u002Fli>\n\u003Cli>Uses WordPress built-in \u003Ccode>wp_mail()\u003C\u002Fcode> function (works with SMTP plugins).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This plugin does \u003Cstrong>not modify WordPress core files\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is free software: you can redistribute it and\u002For modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 2 or later.\u003C\u002Fp>\n\u003Cp>This plugin is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.\u003C\u002Fp>\n","Adds OTP (One-Time Password) verification after login for enhanced security in WordPress. OTP is sent to the user's email.",469,60,"2025-08-29T18:30:00.000Z","6.8.5","6.3",[114,22,115,116,117],"email-verification","otp","security","two-factor-authentication","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Femail-otp-login.1.0.0.zip",{"slug":120,"name":121,"version":122,"author":63,"author_profile":64,"description":123,"short_description":124,"active_installs":37,"downloaded":125,"rating":28,"num_ratings":28,"last_updated":126,"tested_up_to":70,"requires_at_least":71,"requires_php":72,"tags":127,"homepage":130,"download_link":131,"security_score":67,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"user-mail-only-register","Multibyte CAPTCHA login and Mail only register","4.03","\u003Ch4>Login form with Multibyte CAPTCHA\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Anti-Bot measures with original CAPTCHA.\u003C\u002Fli>\n\u003Cli>WordPress : \u003Ccode>wp-login.php\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>WordPress : \u003Ccode>wp-login.php?action=register\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>WordPress : \u003Ccode>wp-login.php?action=lostpassword\u003C\u002Fcode>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Register\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Register only email address.\u003C\u002Fli>\n\u003Cli>Can check the terms of use agreement for user register.\u003C\u002Fli>\n\u003Cli>Anti-Bot measures with original CAPTCHA.\u003C\u002Fli>\n\u003Cli>WordPress : \u003Ccode>wp-login.php?action=register\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>shortcode : \u003Ccode>[umorregister]\u003C\u002Fcode>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Filter for shortcode form\u003C\u002Fh4>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for message.\n *\n *\u002F\nadd_filter( 'umor_register_success_msg', function(){ return 'Message for register success.'; }, 10, 1 );\nadd_filter( 'umor_login_success_login_msg', function(){ return 'Message for login success.'; }, 10, 1 );\nadd_filter( 'umor_register_error', function(){ return 'Message for register error.'; }, 10, 1 );\nadd_filter( 'umor_register_nomail', function(){ return 'Message for unentered mail.'; }, 10, 1 );\nadd_filter( 'umor_register_noterm', function(){ return 'Message for unentered term of use.'; }, 10, 1 );\nadd_filter( 'umor_register_form_label', function(){ return 'Message for form label.'; }, 10, 1 );\nadd_filter( 'umor_register_term_of_use', function(){ return 'Message for term of use.'; }, 10, 1 );\nadd_filter( 'umor_not_register_message', function(){ return 'Message for not register.'; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for login form message.\n *\n *\u002F\nadd_filter(\n    'umor_login_message',\n    function( $message, $text ) {\n        $message = '\u003Cp class=\"myclass\">';\n        $message .= $text;\n        $message .= '\u003C\u002Fp>';\n        return $message;\n    },\n    10,\n    2\n);\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for Term of use URL.\n *\n *\u002F\nadd_filter(\n    'umor_register_term_of_use_url',\n    function( $term_of_use_url ) {\n        if ( 'ja' === get_locale() ) {\n            $term_of_use_url = 'https:\u002F\u002Ftest.com\u002Fja\u002F';\n        }\n        return $term_of_use_url;\n    },\n    10,\n    1\n);\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for input text size.\n *\n *\u002F\nadd_filter( 'umor_register_input_size', function(){ return 17; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cpre>\u003Ccode>\u002F** ==================================================\n * Filter for class name.\n *\n *\u002F\nadd_filter( 'umor_register_notice_class_name', function(){ return 'mynotice'; }, 10, 1 );\nadd_filter( 'umor_register_form_class_name', function(){ return 'myform'; }, 10, 1 );\nadd_filter( 'umor_register_label_class_name', function(){ return 'mylabel'; }, 10, 1 );\nadd_filter( 'umor_register_input_class_name', function(){ return 'myinput'; }, 10, 1 );\nadd_filter( 'umor_register_check_form_class_name', function(){ return 'mycheckform'; }, 10, 1 );\nadd_filter( 'umor_register_check_class_name', function(){ return 'mycheck'; }, 10, 1 );\nadd_filter( 'umor_register_captcha_input_class_name', function(){ return 'mycaptcha_input'; }, 10, 1 );\nadd_filter( 'umor_register_submit_class_name', function(){ return 'mysubmit'; }, 10, 1 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n","Multibyte CAPTCHA login form and register users with mail only.",5728,"2026-03-29T22:04:00.000Z",[128,21,22,129,24],"captcha","register","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fuser-mail-only-register\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fuser-mail-only-register.4.03.zip",{"attackSurface":133,"codeSignals":146,"taintFlows":153,"riskAssessment":154,"analyzedAt":157},{"hooks":134,"ajaxHandlers":142,"restRoutes":143,"shortcodes":144,"cronEvents":145,"entryPointCount":28,"unprotectedCount":28},[135],{"type":136,"name":137,"callback":138,"priority":139,"file":140,"line":141},"filter","authenticate","magento_pw_rehash",20,"magento-user-compatibility.php",62,[],[],[],[],{"dangerousFunctions":147,"sqlUsage":148,"outputEscaping":150,"fileOperations":28,"externalRequests":28,"nonceChecks":28,"capabilityChecks":28,"bundledLibraries":152},[],{"prepared":28,"raw":28,"locations":149},[],{"escaped":28,"rawEcho":28,"locations":151},[],[],[],{"summary":155,"deductions":156},"The \"magento-user-compatibility\" v1.1 plugin exhibits a very strong security posture based on the provided static analysis.  The absence of any detected dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, or critical taint flows is highly commendable.  The plugin also has a clean vulnerability history, with no recorded CVEs, indicating a history of secure development or prompt patching.\n\nWhile the lack of identified vulnerabilities and secure coding practices is a significant strength, the plugin's static analysis reports a complete absence of entry points. This could mean the plugin is purely for backend logic or integration with no direct user interaction or administrative interfaces exposed via WordPress.  The lack of nonce and capability checks on entry points is not a concern if there are no entry points in the first place.  However, if the plugin does interact with the WordPress environment in any way that could be triggered externally, even indirectly, this lack of checks might be an oversight that could become a risk if the attack surface expands in future versions.\n\nOverall, based on the data, this plugin appears to be exceptionally secure. The absence of any exploitable code signals or historical vulnerabilities suggests a well-developed and maintained plugin. The primary observation is the minimal attack surface, which is a good security practice. The lack of specific security checks like nonces and capabilities is not a deduction here as there are no identified entry points to apply them to.",[],"2026-04-16T11:57:12.968Z",{"wat":159,"direct":164},{"assetPaths":160,"generatorPatterns":161,"scriptPaths":162,"versionParams":163},[],[],[],[],{"cssClasses":165,"htmlComments":166,"htmlAttributes":178,"restEndpoints":179,"jsGlobals":180,"shortcodeOutput":181},[],[167,168,169,170,171,172,173,174,175,176,177],"Copyright 2013  Ulrike Uhlig  (email : u@curlybracket.net)","This program is free software; you can redistribute it and\u002For modify","it under the terms of the GNU General Public License, version 2, as","published by the Free Software Foundation.","This program is distributed in the hope that it will be useful,","but WITHOUT ANY WARRANTY; without even the implied warranty of","MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the","GNU General Public License for more details.","You should have received a copy of the GNU General Public License","along with this program; if not, write to the Free Software","Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA",[],[],[],[],{"error":183,"url":184,"statusCode":185,"statusMessage":186,"message":186},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fmagento-user-compatibility\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":28,"versions":188},[]]