[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fz8Enerdy6W_yPdIirl0h7VzqDoVoKRmZgCiaI0sFHnc":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":24,"download_link":25,"security_score":26,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29,"vulnerabilities":30,"developer":31,"crawl_stats":28,"alternatives":39,"analysis":40,"fingerprints":110},"post-internal-link-removal","Post Internal Link Removal","3.1","RBS IT Software Solution","https:\u002F\u002Fprofiles.wordpress.org\u002Frsoftsolution\u002F","\u003Cp>By using this plugin user can remove or replace all internal link which is persent in post.User can also search specific word within a post for putting own link.\u003C\u002Fp>\n","This plugin will remove or replace all internal link within a post.",50,4733,86,6,"2019-06-18T22:39:00.000Z","5.2.24","3.0.1","",[20,21,4,22,23],"bulk-post-internal-link-removal","bulk-post-link-removal","post-link-remove","remove-post-internal-link","http:\u002F\u002Fwww.rsoftsolution.com\u002Fwordpress-plugin-development.html","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fpost-internal-link-removal.3.2.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":32,"display_name":7,"profile_url":8,"plugin_count":33,"total_installs":34,"avg_security_score":35,"avg_patch_time_days":36,"trust_score":37,"computed_at":38},"rsoftsolution",5,60,97,30,92,"2026-04-04T09:12:41.392Z",[],{"attackSurface":41,"codeSignals":53,"taintFlows":77,"riskAssessment":104,"analyzedAt":109},{"hooks":42,"ajaxHandlers":49,"restRoutes":50,"shortcodes":51,"cronEvents":52,"entryPointCount":27,"unprotectedCount":27},[43],{"type":44,"name":45,"callback":46,"file":47,"line":48},"action","admin_menu","linkremoved_add_menu","rsslinkremove.php",293,[],[],[],[],{"dangerousFunctions":54,"sqlUsage":55,"outputEscaping":69,"fileOperations":27,"externalRequests":27,"nonceChecks":71,"capabilityChecks":71,"bundledLibraries":76},[],{"prepared":33,"raw":33,"locations":56},[57,60,62,64,67],{"file":47,"line":58,"context":59},21,"$wpdb->get_var() with variable interpolation",{"file":47,"line":61,"context":59},42,{"file":47,"line":63,"context":59},115,{"file":47,"line":65,"context":66},173,"$wpdb->query() with variable interpolation",{"file":47,"line":68,"context":66},188,{"escaped":70,"rawEcho":71,"locations":72},10,1,[73],{"file":47,"line":74,"context":75},210,"raw output",[],[78,96],{"entryPoint":79,"graph":80,"unsanitizedCount":27,"severity":95},"linkremoveform (rsslinkremove.php:51)",{"nodes":81,"edges":92},[82,87],{"id":83,"type":84,"label":85,"file":47,"line":86},"n0","source","$_POST (x2)",75,{"id":88,"type":89,"label":90,"file":47,"line":65,"wp_function":91},"n1","sink","query() [SQLi]","query",[93],{"from":83,"to":88,"sanitized":94},true,"low",{"entryPoint":97,"graph":98,"unsanitizedCount":27,"severity":95},"\u003Crsslinkremove> (rsslinkremove.php:0)",{"nodes":99,"edges":102},[100,101],{"id":83,"type":84,"label":85,"file":47,"line":86},{"id":88,"type":89,"label":90,"file":47,"line":65,"wp_function":91},[103],{"from":83,"to":88,"sanitized":94},{"summary":105,"deductions":106},"The \"post-internal-link-removal\" plugin v3.1 exhibits a generally strong security posture based on the provided static analysis.  The absence of any identified attack surface points like AJAX handlers, REST API routes, or shortcodes, combined with the fact that all identified entry points (if any existed) are protected, is a significant strength.  Furthermore, the code signals indicate good development practices, with a high percentage of properly escaped outputs, a good use of prepared statements for SQL queries, and the presence of both nonce and capability checks. The plugin also avoids dangerous functions and file operations, further reducing its risk profile. The lack of any historical CVEs or recorded vulnerability types further reinforces its current perceived security.  However, it's worth noting that the taint analysis, while reporting no critical or high severity issues, only analyzed a small number of flows (2). While the overall picture is positive, a more comprehensive taint analysis might reveal subtle risks.  The presence of 10 SQL queries, even with 50% using prepared statements, suggests a reliance on database interactions that could be a potential, albeit currently mitigated, area of concern.",[107],{"reason":108,"points":33},"SQL queries not fully using prepared statements","2026-03-16T21:53:06.856Z",{"wat":111,"direct":119},{"assetPaths":112,"generatorPatterns":113,"scriptPaths":114,"versionParams":116},[],[],[115],"\u002Fwp-content\u002Fplugins\u002Fpost-internal-link-removal\u002Fjs\u002Fcustom.js",[117,118],"post-internal-link-removal\u002Fstyle.css?ver=","post-internal-link-removal\u002Fjs\u002Fcustom.js?ver=",{"cssClasses":120,"htmlComments":121,"htmlAttributes":122,"restEndpoints":124,"jsGlobals":125,"shortcodeOutput":133},[],[],[123],"data-target-id",[],[126,127,128,129,130,131,132],"countup","rowupid","cntlist","newupdatestr","arrid","res","showrow",[]]