[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$ff352MmTbjZQcFednF4zay0QpofnFARy75MYD1yanDqc":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":11,"num_ratings":11,"last_updated":13,"tested_up_to":14,"requires_at_least":15,"requires_php":16,"tags":17,"homepage":23,"download_link":24,"security_score":25,"vuln_count":11,"unpatched_count":11,"last_vuln_date":26,"fetched_at":27,"vulnerabilities":28,"developer":29,"crawl_stats":26,"alternatives":35,"analysis":146,"fingerprints":285},"s4e-effortless-continuous-cybersecurity","S4E: Effortless & Continuous Cybersecurity","1.0.0","S4E","https:\u002F\u002Fprofiles.wordpress.org\u002Fs4ee\u002F","\u003Cp>S4E: Effortless & Continuous Cybersecurity is a powerful WordPress plugin that seamlessly integrates with the S4E scan API to provide comprehensive security scanning capabilities for your website. This plugin offers a user-friendly interface to trigger various types of security scans and view detailed reports.\u003C\u002Fp>\n\u003Ch4>Key Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>User-friendly interface with light\u002Fdark theme support\u003C\u002Fli>\n\u003Cli>Multiple scan types:\n\u003Cul>\n\u003Cli>Full Scan\u003C\u002Fli>\n\u003Cli>Light Scan\u003C\u002Fli>\n\u003Cli>Single Scan\u003C\u002Fli>\n\u003Cli>Crawler Scan\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Real-time scan progress tracking\u003C\u002Fli>\n\u003Cli>Detailed scan reports\u003C\u002Fli>\n\u003Cli>Secure API integration\u003C\u002Fli>\n\u003Cli>Responsive design\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>How to Use\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Step 1: Create an S4E Account\u003C\u002Fstrong>\u003Cbr \u002F>\n1. Visit \u003Ca href=\"https:\u002F\u002Fapp.s4e.io\u002Fsign-up\" rel=\"nofollow ugc\">S4E Signup\u003C\u002Fa> and create a free account\u003Cbr \u002F>\n2. Verify your email address\u003Cbr \u002F>\n3. Login to your S4E dashboard\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Step 2: Get Your API Token\u003C\u002Fstrong>\u003Cbr \u002F>\n1. In your S4E dashboard, navigate to \u003Ca href=\"https:\u002F\u002Fapp.s4e.io\u002Fapi-token\" rel=\"nofollow ugc\">API Token page\u003C\u002Fa>\u003Cbr \u002F>\n2. Generate a new API token\u003Cbr \u002F>\n3. Copy the token (you’ll need this for the plugin)\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Step 3: Install and Configure the Plugin\u003C\u002Fstrong>\u003Cbr \u002F>\n1. Install and activate the plugin in WordPress\u003Cbr \u002F>\n2. The plugin will automatically create a new “S4E Security” menu item in your WordPress admin sidebar\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Step 4: Access the Plugin\u003C\u002Fstrong>\u003Cbr \u002F>\n1. In your WordPress admin area, navigate to “S4E Security” in the sidebar menu\u003Cbr \u002F>\n2. You’ll see a login form where you can enter your S4E API token\u003Cbr \u002F>\n3. Enter your S4E API token in the login field\u003Cbr \u002F>\n4. Click “Login” – you’ll be redirected to your profile dashboard\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Step 5: Add Your Asset for Auto-Verification\u003C\u002Fstrong>\u003Cbr \u002F>\n1. In the Profile tab, you will see your WordPress site’s domain automatically detected.\u003Cbr \u002F>\n2. To enable auto-verification, add this asset to your S4E account by clicking “Add Asset”.\u003Cbr \u002F>\n3. After adding the asset, you will see a popup to choose a verification method. Both security.txt and HTML file methods are available for verification.\u003Cbr \u002F>\n4. When you choose a verification method, a file will be automatically created in the root of your domain (e.g., wordpress.net\u002Fsecurity.txt or wordpress.net\u002Fs4e-ft6PdLzawaNM.html).\u003Cbr \u002F>\n5. Click the “Verify Asset” button to complete verification. For successful verification, the security.txt file must be accessible at your base domain (e.g., wordpress.net\u002Fsecurity.txt).\u003Cbr \u002F>\n6. Your asset will be verified automatically once the file is detected.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Step 6: Start Your First Scan\u003C\u002Fstrong>\u003Cbr \u002F>\n1. Go to the “Reports” tab\u003Cbr \u002F>\n2. Click “Start a new scan”\u003Cbr \u002F>\n3. Choose your scan type:\u003Cbr \u002F>\n   – \u003Cstrong>Full Scan\u003C\u002Fstrong>: Comprehensive security analysis (recommended for first scan)\u003Cbr \u002F>\n   – \u003Cstrong>Light Scan\u003C\u002Fstrong>: Quick security check\u003Cbr \u002F>\n   – \u003Cstrong>Single Scan\u003C\u002Fstrong>: Redirects to S4E web interface for advanced scanning\u003Cbr \u002F>\n   – \u003Cstrong>Crawler\u003C\u002Fstrong>: Maps your website structure\u003Cbr \u002F>\n4. Click “Start Scan”\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Step 7: View Results\u003C\u002Fstrong>\u003Cbr \u002F>\n1. Scan progress will be displayed in real-time with status updates.\u003Cbr \u002F>\n2. Once every scan is completed, detailed reports will be available in the Reports tab.\u003Cbr \u002F>\n3. Click on any report to view vulnerability details and remediation recommendations in the S4E web interface.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Demo Credentials:\u003C\u002Fstrong>\u003Cbr \u002F>\nFor review purposes, you can contact S4E support at support@s4e.io for a demo token.\u003C\u002Fp>\n\u003Ch4>Requirements\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>WordPress 5.8 or higher\u003C\u002Fli>\n\u003Cli>PHP 7.4 or higher\u003C\u002Fli>\n\u003Cli>Active S4E account and API credentials\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>External Services\u003C\u002Fh3>\n\u003Cp>This plugin connects to external services to provide security scanning capabilities. The following external services are used:\u003C\u002Fp>\n\u003Ch3>S4E API (https:\u002F\u002Fapi.s4e.io\u002Fapi)\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>What the service is and what it is used for:\u003C\u002Fstrong>\u003Cbr \u002F>\nThe S4E API is a comprehensive security scanning service that provides vulnerability assessment and reporting capabilities for websites and web applications.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>What data is sent and when:\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>API Token\u003C\u002Fstrong>: Sent with every request for authentication\u003Cbr \u002F>\n– \u003Cstrong>User Information\u003C\u002Fstrong>: Sent when retrieving user profile and package information\u003Cbr \u002F>\n– \u003Cstrong>Asset Information\u003C\u002Fstrong>: Sent when adding, checking ownership, or retrieving details about domains\u002FURLs to be scanned\u003Cbr \u002F>\n– \u003Cstrong>Scan Parameters\u003C\u002Fstrong>: Sent when initiating various types of security scans (Full Scan, Light Scan, Single Scan, Crawler Scan)\u003Cbr \u002F>\n– \u003Cstrong>Scan History Requests\u003C\u002Fstrong>: Sent when retrieving scan history and reports\u003Cbr \u002F>\n– \u003Cstrong>Activity Logs\u003C\u002Fstrong>: Sent when retrieving scan activity and progress information\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Service Provider Information:\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Service Provider\u003C\u002Fstrong>: S4E (Security 4 Everyone)\u003Cbr \u002F>\n– \u003Cstrong>Terms of Service\u003C\u002Fstrong>: \u003Ca href=\"https:\u002F\u002Fs4e.io\u002Fterms-of-use\" rel=\"nofollow ugc\">https:\u002F\u002Fs4e.io\u002Fterms-of-use\u003C\u002Fa>\u003Cbr \u002F>\n– \u003Cstrong>Privacy Policy\u003C\u002Fstrong>: \u003Ca href=\"https:\u002F\u002Fs4e.io\u002Fprivacy-policy\" rel=\"nofollow ugc\">https:\u002F\u002Fs4e.io\u002Fprivacy-policy\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>S4E SRS Service (https:\u002F\u002Fsrs.s4e.io)\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>What the service is and what it is used for:\u003C\u002Fstrong>\u003Cbr \u002F>\nThe S4E SRS (security.txt Reporting Service) is used to generate security.txt files for domains, providing contact information for security researchers and vulnerability disclosure.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>What data is sent and when:\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Domain Information\u003C\u002Fstrong>: Sent when generating security.txt files for vulnerability disclosure\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Service Provider Information:\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Service Provider\u003C\u002Fstrong>: S4E (Security 4 Everyone)\u003Cbr \u002F>\n– \u003Cstrong>Terms of Service\u003C\u002Fstrong>: \u003Ca href=\"https:\u002F\u002Fs4e.io\u002Fterms-of-use\" rel=\"nofollow ugc\">https:\u002F\u002Fs4e.io\u002Fterms-of-use\u003C\u002Fa>\u003Cbr \u002F>\n– \u003Cstrong>Privacy Policy\u003C\u002Fstrong>: \u003Ca href=\"https:\u002F\u002Fs4e.io\u002Fprivacy-policy\" rel=\"nofollow ugc\">https:\u002F\u002Fs4e.io\u002Fprivacy-policy\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Additional Information\u003C\u002Fh3>\n\u003Cp>For more information about S4E and its services, please visit \u003Ca href=\"https:\u002F\u002Fs4e.io\" rel=\"nofollow ugc\">S4E.io\u003C\u002Fa>.\u003C\u002Fp>\n","Integrate S4E API with WordPress to provide comprehensive security scanning capabilities for your website.",0,230,"2025-08-19T06:45:00.000Z","6.8.5","5.8","7.4",[18,19,20,21,22],"continuous","cybersecurity","detection","threat","vulnerability","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fs4e-effortless-continuous-cybersecurity.1.0.0.zip",100,null,"2026-03-15T15:16:48.613Z",[],{"slug":30,"display_name":7,"profile_url":8,"plugin_count":31,"total_installs":11,"avg_security_score":25,"avg_patch_time_days":32,"trust_score":33,"computed_at":34},"s4ee",1,30,94,"2026-04-05T08:14:30.340Z",[36,63,84,106,126],{"slug":37,"name":38,"version":39,"author":40,"author_profile":41,"description":42,"short_description":43,"active_installs":44,"downloaded":45,"rating":46,"num_ratings":47,"last_updated":48,"tested_up_to":49,"requires_at_least":50,"requires_php":51,"tags":52,"homepage":58,"download_link":59,"security_score":60,"vuln_count":61,"unpatched_count":11,"last_vuln_date":62,"fetched_at":27},"quttera-web-malware-scanner","Quttera ThreatSign – Web Malware Scanner for WordPress","4.0.0.3","quttera","https:\u002F\u002Fprofiles.wordpress.org\u002Fquttera\u002F","\u003Cp>Quttera ThreatSign protects your WordPress website with multi-layered security:\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Malware Detection:\u003C\u002Fstrong> Powered by Quttera’s AI-driven heuristic engine, the scanner detects malicious PHP, obfuscated JavaScript, hidden iframes, redirects, spam, SEO malware, and credit-card skimmers targeting checkout pages. The plugin performs on-demand scans directly from your WordPress admin and checks your domain against more than 40 global security authorities, including Google, McAfee, Norton, and Yandex. Detection capabilities are continuously enhanced using insights from Quttera’s worldwide threat intelligence network.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Brute Force Protection:\u003C\u002Fstrong> Prevents unauthorized login attempts with IP locking, configurable rate limiting, and environment-aware protection policies. Supports both shared hosting (aggressive locking) and dedicated servers (progressive delays). Includes emergency bypass mechanism for critical situations.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Bot Protection:\u003C\u002Fstrong> Layered defense against automated attacks using multi-stage risk evaluation, token-bucket rate limiting, and legitimate bot recognition (Googlebot, Bingbot, etc.). Protects REST API, XML-RPC, and WooCommerce endpoints with endpoint-specific risk scoring.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Admin User Monitoring:\u003C\u002Fstrong> Real-time detection and alerting for unauthorized admin additions, removals, and role changes with database audit trail and snapshots.\u003C\u002Fp>\n\u003Cp>For complete protection—including automated malware removal, scheduled scanning, WAF, and 24\u002F7 monitoring—you can upgrade to a ThreatSign Website Security plan.\u003C\u002Fp>\n\u003Ch4>Malware Detection Features:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>One-click on-demand scans from WP admin\u003C\u002Fli>\n\u003Cli>0-day (unknown threat) detection via heuristic & behavioral analysis\u003C\u002Fli>\n\u003Cli>Detection of malicious PHP (backdoors, shells, injections)\u003C\u002Fli>\n\u003Cli>Detection of obfuscated or polymorphic JavaScript\u003C\u002Fli>\n\u003Cli>Identification of malicious iframes, redirects & hidden links\u003C\u002Fli>\n\u003Cli>Detection of spam & SEO malware\u003C\u002Fli>\n\u003Cli>Checkout skimmer detection\u003C\u002Fli>\n\u003Cli>Inspection of WordPress core file integrity\u003C\u002Fli>\n\u003Cli>Detection of alien or unauthorized files in core directories\u003C\u002Fli>\n\u003Cli>External links and outbound reference analysis\u003C\u002Fli>\n\u003Cli>Blacklist checks across 40+ security authorities\u003C\u002Fli>\n\u003Cli>Cloud-based scanning to reduce server resource load\u003C\u002Fli>\n\u003Cli>Detailed investigation reports with severity levels\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Brute Force Protection Features:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>IP-based locking with configurable thresholds\u003C\u002Fli>\n\u003Cli>Multi-stage failure detection with soft and hard locks\u003C\u002Fli>\n\u003Cli>Environment-aware policies for shared hosting and dedicated servers\u003C\u002Fli>\n\u003Cli>IP whitelist\u002Fblacklist with CIDR notation support\u003C\u002Fli>\n\u003Cli>Emergency bypass mechanism via constant or filter\u003C\u002Fli>\n\u003Cli>User account lockout alerts via email\u003C\u002Fli>\n\u003Cli>Combo-lock (IP + username) detection\u003C\u002Fli>\n\u003Cli>Rate limiting with progressive delays\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Bot Protection Features:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Multi-stage risk evaluation with heuristic analysis\u003C\u002Fli>\n\u003Cli>Token-bucket rate limiting across multiple lanes (global, REST, XML-RPC, checkout, cart)\u003C\u002Fli>\n\u003Cli>Legitimate bot recognition (Googlebot, Bingbot with elevated rate limits)\u003C\u002Fli>\n\u003Cli>REST API enumeration and authentication protection\u003C\u002Fli>\n\u003Cli>WooCommerce endpoint protection (checkout & cart)\u003C\u002Fli>\n\u003Cli>Configurable operation modes (Observe, Balanced, Aggressive)\u003C\u002Fli>\n\u003Cli>Risk-based challenge mechanisms and exponential backoff\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Admin User Monitoring Features:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Real-time detection of admin user additions and removals\u003C\u002Fli>\n\u003Cli>Admin role change tracking\u003C\u002Fli>\n\u003Cli>Database snapshot comparison for audit trail\u003C\u002Fli>\n\u003Cli>WP-Cron scheduled checks (1-minute intervals)\u003C\u002Fli>\n\u003Cli>Immediate detection via WordPress hooks\u003C\u002Fli>\n\u003Cli>Email alerts for unauthorized changes\u003C\u002Fli>\n\u003Cli>Comprehensive alarm system integration\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>If you need malware removal assistance, contact us at support@quttera.com or sign up for any\u003Cbr \u002F>\nof our ThreatSign annual plans, which include cleanup & blacklist removal:\u003Cbr \u002F>\nhttps:\u002F\u002Fquttera.com\u002Fanti-malware-website-monitoring-signup\u003C\u002Fp>\n\u003Ch3>Credits\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fquttera.com\" rel=\"nofollow ugc\">Quttera\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Plugin’s other home\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fquttera.com\u002Fwordpress_malware_scanner\" rel=\"nofollow ugc\">WordPress Malware Scanner\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","WordPress multi-level security scanner detecting malware, 0-day threats, brute-force attacks, bot attacks, and unauthorized admin changes.",10000,4426011,78,47,"2026-03-12T00:02:00.000Z","6.9.4","3.3.2","7.2",[53,54,55,56,57],"card-skimmer","malware-removal","malware-scanner","threat-detection","wordpress-security","http:\u002F\u002Fquttera.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fquttera-web-malware-scanner.4.0.0.3.zip",98,3,"2025-08-14 00:00:00",{"slug":64,"name":65,"version":66,"author":67,"author_profile":68,"description":69,"short_description":70,"active_installs":71,"downloaded":72,"rating":60,"num_ratings":73,"last_updated":74,"tested_up_to":49,"requires_at_least":75,"requires_php":76,"tags":77,"homepage":82,"download_link":83,"security_score":25,"vuln_count":11,"unpatched_count":11,"last_vuln_date":26,"fetched_at":27},"patchstack","Patchstack – WordPress & Plugins Security","2.3.5","Patchstack","https:\u002F\u002Fprofiles.wordpress.org\u002Fpatchstack\u002F","\u003Cp>Patchstack is a powerful tool that helps identify security vulnerabilities within your websites’ plugins, themes, and WordPress core. It is powered by the WordPress ecosystem’s most active community of ethical hackers. Patchstack is trusted by leading WordPress experts such as Pagely, Cloudways, GridPane, Plesk, and others!\u003C\u002Fp>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002Fz2nuYpg26Vc?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fp>\n\u003Cp>Patchstack is a security plugin for WordPress that finds WP core, plugin and theme vulnerabilities in your websites.\u003C\u002Fp>\n\u003Cp>The free version includes up to 48-hour early warning for new vulnerabilities found by our security research community. It also allows you to automatically update vulnerable software, manage updates remotely, and get snapshot reports on your sites’ security status.\u003C\u002Fp>\n\u003Cp>The paid version includes automatic vulnerability protection. Patchstack deploys highly targeted rules on a per-site basis, only when a specific vulnerability is detected on a site.\u003C\u002Fp>\n\u003Cp>This prevents vulnerable components from being exploited without modifying website code, or impacting site performance or functionality. Patchstack’s paid version includes access to 12,000+ individual protection rules (vPatches).\u003C\u002Fp>\n\u003Cp>Patchstack paid version also includes other preventive security features, such as 2 factor authentication, WordPress specific hardening rules, a Community IP blocklist for malicious IP addresses, advanced security settings, and custom protection rules.\u003C\u002Fp>\n\u003Ch3>Post-hack cleanups vs attack prevention in WordPress security\u003C\u002Fh3>\n\u003Cp>Unlike the standard approach to WordPress security (malware scanning and infection cleanups), Patchstack is focused on preventing infections in the first place.\u003C\u002Fp>\n\u003Cp>Thanks to its big WordPress security research community and partnerships with nearly one thousand plugin vendors and developers, Patchstack is regularly among the first to identify new vulnerabilities.\u003C\u002Fp>\n\u003Ch3>Who is Patchstack’s WordPress security plugin for?\u003C\u002Fh3>\n\u003Cp>Patchstack’s vulnerability management works extremely well for:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Agencies with WordPress care\u002Fmaintenance plans for their customers’ websites\u003C\u002Fli>\n\u003Cli>WooCommerce websites to protect their revenue and customers from attacks\u003C\u002Fli>\n\u003Cli>Hosting companies that want to deliver highly targeted vulnerability protection easily and at scale\u003Cbr \u002F>\nWebsite owners\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>You don’t have to be highly technical to use it. Install the plugin, connect it with the Patchstack App, and stay safe!\u003C\u002Fp>\n\u003Ch3>What features are included in the Patchstack Personal (Free) plan?\u003C\u002Fh3>\n\u003Cp>Patchstack’s Personal plan is a free security service for WordPress that lets you find and manage vulnerabilities in your websites. It includes access to a central security dashboard via the Patchstack web App for more visibility and control over your sites’ security:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Be the first to know about new vulnerabilities.\u003C\u002Fli>\n\u003Cli>Receive notifications if any installed plugins or themes have security issues.\u003C\u002Fli>\n\u003Cli>Detect the latest security vulnerabilities in WordPress plugins.\u003C\u002Fli>\n\u003Cli>Detect the latest security vulnerabilities in WordPress themes.\u003C\u002Fli>\n\u003Cli>Detect the latest security vulnerabilities in WordPress core.\u003C\u002Fli>\n\u003Cli>Receive real-time alerts via email if any security vulnerabilities are found.\u003C\u002Fli>\n\u003Cli>Manage core, plugin and theme updates from a single dashboard.\u003C\u002Fli>\n\u003Cli>[Optional] Enable automatic updates for vulnerable plugins only.\u003C\u002Fli>\n\u003Cli>Generate snapshot reports about the security status of your website.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>What features do Patchstack paid subscriptions have?\u003C\u002Fh3>\n\u003Cp>Patchstack’s paid subscriptions include automatic protection for WordPress vulnerabilities, as well as other protection modules.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Virtual patching to prevent vulnerable components from being exploited\u003C\u002Fli>\n\u003Cli>Advanced hardening module for added WordPress security\u003C\u002Fli>\n\u003Cli>Remote hardening settings (including .httacess, login protection and reCAPTCHA)\u003C\u002Fli>\n\u003Cli>Community IP Blocklist of known attacker IP addresses\u003Cbr \u002F>\nAll of these features are included in the Developer and Enterprise plans.\u003Cbr \u002F>\nAdditionally, Developer and Enterprise plan users have access to custom protection rule creation, periodical security reports and report scheduling.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Personal (Free) plan users can enable these features on a per-site basis for $5 \u002F site per month.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Important Resources\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fpatchstack.com\" rel=\"nofollow ugc\">Patchstack website\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fdocs.patchstack.com\" rel=\"nofollow ugc\">Help Center\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fdocs.patchstack.com\u002Fpatchstack-plugin\u002Fchangelog\u002F\" rel=\"nofollow ugc\">Changelog\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fpatchstack.com\u002Fdatabase\" rel=\"nofollow ugc\">Patchstack Vulnerability Database\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>See what our customers say about our paid plans:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>“An excellent and valuable service that’s backed by a company that contributes a significant number of resources and money directly back to the WordPress ecosystem.” – John Blackbourn  \u003C\u002Fli>\n\u003Cli>“Patchstack is like CrowdStrike, but for websites!” – Ryan McCue, HumanMade  \u003C\u002Fli>\n\u003Cli>“The service here is superb! And they are always right on it with the best solution to solve the problem or question at hand. The tool itself speaks for itself. I am very satisfied with this project and the service they offer.” – Daniel Canup  \u003C\u002Fli>\n\u003Cli>“This is a security plugin everyone needs to install. The Patchstack team are incredible at what they do. We have been using them for years and have not been disappointed!” – @craniumstudio  \u003C\u002Fli>\n\u003Cli>“We’ve been with Patchstack for a LONG time (even before they were Patchstack). It has always done its job seamlessly and without fail. Ongoing innovation and updates to the Patchstack product mean this plugin is a winner. 5 stars all the way.” – @guapx  \u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>(*Comparisons are made by evaluating paid versions.)\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fpatchstack.com\u002Fsucuri-alternative\u002F\" rel=\"nofollow ugc\">Sucuri vs. Patchstack\u003C\u002Fa>\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fpatchstack.com\u002Fwordfence-alternative\u002F\" rel=\"nofollow ugc\">Wordfence vs. Patchstack\u003C\u002Fa>\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fpatchstack.com\u002Fmalcare-alternative\u002F\" rel=\"nofollow ugc\">Malcare vs. Patchstack\u003C\u002Fa>\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fpatchstack.com\u002Fsitelock-alternative\u002F\" rel=\"nofollow ugc\">Sitelock vs. Patchstack\u003C\u002Fa>\u003C\u002Fp>\n","Patchstack automatically identifies and mitigates security vulnerabilities in WordPress plugins, themes, and core.",40000,554865,61,"2026-01-06T14:10:00.000Z","4.4","5.6",[78,79,80,81,22],"firewall","security","virtual-patching","vulnerabilities","https:\u002F\u002Fpatchstack.com\u002F?utm_medium=wp&utm_source=dashboard&utm_campaign=patchstack%20plugin","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fpatchstack.2.3.5.zip",{"slug":85,"name":86,"version":87,"author":88,"author_profile":89,"description":90,"short_description":91,"active_installs":92,"downloaded":93,"rating":94,"num_ratings":95,"last_updated":96,"tested_up_to":49,"requires_at_least":97,"requires_php":16,"tags":98,"homepage":102,"download_link":103,"security_score":104,"vuln_count":31,"unpatched_count":11,"last_vuln_date":105,"fetched_at":27},"antivirus","AntiVirus","1.6.1","pluginkollektiv","https:\u002F\u002Fprofiles.wordpress.org\u002Fpluginkollektiv\u002F","\u003Cp>\u003Cem>AntiVirus\u003C\u002Fem> is an easy-to-use, safe tool to harden your WordPress site against exploits, malware and spam injections.\u003Cbr \u002F>\nYou can configure \u003Cem>AntiVirus\u003C\u002Fem> to perform an automated daily scan of your theme files. If the plugin detects any suspicious code injections, it will send out a notification to a previously configured e-mail address.\u003C\u002Fp>\n\u003Cp>In case your WordPress site has been hacked, \u003Cem>AntiVirus\u003C\u002Fem> will help you to become aware of the problem very quickly in order for you to take immediate action.\u003C\u002Fp>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Scan for suspicious code in the theme files (daily scan with email notifications and manual scan) with an option to mark detected cases as false positive\u003C\u002Fli>\n\u003Cli>Checksum verification for WordPress Core files\u003C\u002Fli>\n\u003Cli>Optional: Google Safe Browsing for malware and phishing monitoring.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>A complete documentation is available on the \u003Ca href=\"https:\u002F\u002Fantivirus.pluginkollektiv.org\u002Fdocumentation\u002F\" rel=\"nofollow ugc\">AntiVirus website\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Community support via the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fantivirus\" rel=\"ugc\">support forums on wordpress.org\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>We don’t handle support via e-mail, Twitter, GitHub issues etc.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Contribute\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Active development of this plugin is handled \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fpluginkollektiv\u002Fantivirus\" rel=\"nofollow ugc\">on GitHub\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>Pull requests for documented bugs are highly appreciated.\u003C\u002Fli>\n\u003Cli>If you think you’ve found a bug (e.g. you’re experiencing unexpected behavior), please post at the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fantivirus\" rel=\"ugc\">support forums\u003C\u002Fa> first.\u003C\u002Fli>\n\u003Cli>If you want to help us translate this plugin you can do so \u003Ca href=\"https:\u002F\u002Ftranslate.wordpress.org\u002Fprojects\u002Fwp-plugins\u002Fantivirus\" rel=\"nofollow ugc\">on WordPress Translate\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Credits\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Author: \u003Ca href=\"https:\u002F\u002Fsergejmueller.github.io\u002F\" rel=\"nofollow ugc\">Sergej Müller\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Maintainers: \u003Ca href=\"https:\u002F\u002Fpluginkollektiv.org\" rel=\"nofollow ugc\">pluginkollektiv\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","Security plugin to protect your blog or website against exploits and spam injections.",30000,1314565,84,22,"2025-12-21T16:53:00.000Z","5.0",[85,99,100,101,22],"malware","safe-browsing","scanner","https:\u002F\u002Fantivirus.pluginkollektiv.org","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fantivirus.1.6.1.zip",99,"2013-06-02 00:00:00",{"slug":107,"name":108,"version":109,"author":110,"author_profile":111,"description":112,"short_description":113,"active_installs":44,"downloaded":114,"rating":46,"num_ratings":115,"last_updated":116,"tested_up_to":117,"requires_at_least":118,"requires_php":23,"tags":119,"homepage":123,"download_link":124,"security_score":125,"vuln_count":11,"unpatched_count":11,"last_vuln_date":26,"fetched_at":27},"lockdown-wp-admin","Lockdown WP Admin","2.3.2","Sean Fisher","https:\u002F\u002Fprofiles.wordpress.org\u002Fsean212\u002F","\u003Cp>This plugin will hide WordPress Admin (\u002Fwp-admin\u002F) when a user isn’t logged in. If a user isn’t logged in and they attempt to access WP Admin directly, they will be unable to and it will return a 404. It can also rename the login URL.\u003C\u002Fp>\n\u003Cp>Also, you can add HTTP authentication directly from WP Admin and add custom username\u002Fpassword combinations for the HTTP auth or use the WordPress credentials.\u003C\u002Fp>\n\u003Cp>This doesn’t touch any .htaccess files or change the WordPress core files. All the CSS\u002FImages under \u002Fwp-admin\u002F are still accessible, just not the .php ones.\u003C\u002Fp>\n\u003Cp>If you enable HTTP authentication, it will add HTTP authentication to the PHP files in \u002Fwp-admin\u002F.\u003C\u002Fp>\n\u003Cp>To contribute to the development, check out \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fsrtfisher\u002FLockdown-WPAdmin\" rel=\"nofollow ugc\">the GitHub Repository\u003C\u002Fa>.\u003C\u002Fp>\n","Lockdown WP Admin conceals the administration and login screen from intruders. It can hide WordPress Admin (\u002Fwp-admin\u002F) and and login (\u002Fwp-login.",340310,54,"2017-11-28T06:00:00.000Z","4.3.34","3.6",[120,121,79,22,122],"lockdown","secure","website-security","http:\u002F\u002Fseanfisher.co\u002Flockdown-wp-admin\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flockdown-wp-admin.2.3.2.zip",85,{"slug":127,"name":128,"version":129,"author":130,"author_profile":131,"description":132,"short_description":133,"active_installs":44,"downloaded":134,"rating":135,"num_ratings":136,"last_updated":137,"tested_up_to":49,"requires_at_least":138,"requires_php":76,"tags":139,"homepage":142,"download_link":143,"security_score":144,"vuln_count":61,"unpatched_count":11,"last_vuln_date":145,"fetched_at":27},"wp-malware-removal","Malcure Malware Shield — Removal, Repair, Monitor","19.8","Malcure Web Security","https:\u002F\u002Fprofiles.wordpress.org\u002Fmalcure\u002F","\u003Cp>Is your website acting strangely? Seeing ‘Deceptive Site Ahead’ warnings, Japanese spam, SEO spam, or random redirects? Time to fix and monitor your site with \u003Cstrong>Malcure Malware Shield\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch3>Malcure Malware Shield: The Powerful Antivirus\u003C\u002Fh3>\n\u003Cp>Just as your computer requires antivirus, your website demands specialized \u003Cstrong>antivirus-grade protection\u003C\u002Fstrong>. Malcure Malware Shield delivers comprehensive, \u003Cstrong>antivirus-style\u003C\u002Fstrong> detection with advanced signatures to identify viruses, trojans, backdoors, adware, and ransomware. Unlike basic security plugins, it operates with the precision of an antivirus engine, scanning every layer of your site—from core files to the database—to ensure your website remains virus-free and secure.\u003C\u002Fp>\n\u003Ch3>Malware Removal, Hack Repair & SEO Spam Cleanup\u003C\u002Fh3>\n\u003Cp>Malware attacks are evolving. Standard scanners often miss hidden backdoors and database infections. If your current security plugin says “All Clear” but your site is still broken, you need \u003Cstrong>Malcure Malware Shield\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Malcure Malware Shield\u003C\u002Fstrong> is the intelligent, lightweight security solution. We believe security should be simple on the surface but deep under the hood. No complex settings. No bloat. Just activate and scan.\u003C\u002Fp>\n\u003Cp>Lightweight, API-driven scanning runs only on demand or on scheduled scans — no persistent background processes.\u003C\u002Fp>\n\u003Cp>Unlike scanners that delay new malware definitions for days, Malcure delivers real-time threat intelligence to every user so you’re protected against the latest threats as soon as they emerge.\u003C\u002Fp>\n\u003Ch3>What Our Users Say\u003C\u002Fh3>\n\u003Cp>Quotes are verbatim from WordPress.org support reviews, except for bracketed edits (for example, competitor names removed).\u003C\u002Fp>\n\u003Ch4>Best by far, better than [competitor name removed] and other giants\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>“You can see it is a bunch of geeks that created this, with skill and visual creativity at that. I spent hours trying to find a plugin like this. So many options and such bad results until now. Great job guys. You deserve it. Simple and effective. (Disclaimer to other potential readers: there are many types of hacks\u002Fmalware out there, every scenario is different, but start with the Malcure scan and see how it goes. 9\u002F10 you won’t be disappointed, my guess)” — \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Ftopic\u002Fbest-by-far-better-than-wordfence-and-other-giants\u002F\" rel=\"ugc\">@dalingzaf\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>The ONLY plugin that scans files…\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>“I am a web developer and have tried many malware removal plugins, including popular ones [competitor names removed]. However, none of them detected some unusual files that were actually malware causing regular attacks. Some of these files were in JPG format.” — \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Ftopic\u002Fthe-only-plugin-that-scans-files-in-real-time-2\u002F\" rel=\"ugc\">@devzeeshanx\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>Best Malware Removal Plugin in just few minutes\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>“Most security plugins that are free only scan the code, but Malcure Malware Removal Plugin scans the wordpress database and the code files in few minutes. Accurately shows which Database table row is infected and it helps resolve the hacking attempt instantly. Saves a lot of time for the developers. Thank You Team Malcure” — \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Ftopic\u002Fbest-malware-removal-plugin-in-just-few-minutes\u002F\" rel=\"ugc\">@s3630\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>It’s not just a “teaser”\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>“This plugin really found the malware, and removed it. Really for free. Thanks guys, I’m going to donate now!” — \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Ftopic\u002Fits-not-just-a-teaser\u002F\" rel=\"ugc\">@halucska\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch3>Malware Removal & Hack Repair\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Checksum Verification:\u003C\u002Fstrong> We verify core, plugin, and theme file integrity against the official repository checksums served by our SaaS API endpoint.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Deep Scan:\u003C\u002Fstrong> If checksums fail, Malcure runs a full scan against malware detection signatures detecting estimated 50,000+ variants.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Inspect & Repair:\u003C\u002Fstrong> Inspect infected database records and files. Assists in cleaning compromised files and database entries.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SEO Spam Specialist:\u003C\u002Fstrong> Detects and removes the notorious “Japanese Keyword Hack” and pharma spam from your files and database, helping restore your Google rankings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Virus Scanner & Threat Detection\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Database Scan:\u003C\u002Fstrong> Scans database tables for malicious injections and spam links.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>File Scan:\u003C\u002Fstrong> Scans core files, themes, plugins, images, and uploads for backdoors and obfuscated code.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Vulnerability Detection:\u003C\u002Fstrong> Checks your core, plugins, and themes for known security flaws.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>DeepScan™ Technology:\u003C\u002Fstrong> Scans backups, archives, images, and hidden files where malware hides.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Ultra-High Precision:\u003C\u002Fstrong> Uses intelligent checksum verification (comparing your files to official core\u002Fplugin\u002Ftheme checksums) to dramatically reduce false alarms compared to heuristic-only scanners.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Intelligent Health Monitor\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Always-On Guard:\u003C\u002Fstrong> Continuous monitoring via \u003Cstrong>Scheduled Scans\u003C\u002Fstrong> (daily\u002Fweekly\u002Fmonthly) configurable cadence.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Instant Alerts:\u003C\u002Fstrong> Every time a scheduled scan completes, you get an instant email report telling you if your site is clean or infected.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Event Log:\u003C\u002Fstrong> Track the events leading up to a malware incident for faster root-cause analysis.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Powered by Malcure API: Real-Time Threat Intelligence\u003C\u002Fh3>\n\u003Cp>Hackers don’t sleep, and neither do we. Malcure Malware Shield connects to our real-time API to fetch the latest threat definitions.\u003C\u002Fp>\n\u003Cp>This plugin relies on the Malcure API to provide real-time threat intelligence and checksum verification.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Data Transmission:\u003C\u002Fstrong> To perform scans, the plugin sends file checksums and your site’s domain to Malcure servers. No sensitive user data is transmitted.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Terms & Privacy:\u003C\u002Fstrong> Use of the API is subject to our \u003Ca href=\"https:\u002F\u002Fwww.malcure.com\u002F?p=1720&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Terms of Use\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=3&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Zero-Day Alerts:\u003C\u002Fstrong> Our API serves new threat-intelligence in real-time, ensuring the site is scanned against the latest vulnerabilities.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Smart Checksums:\u003C\u002Fstrong> We verify your core files, themes, and plugins against the official repository checksums using our API, ensuring absolute integrity.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Lightweight:\u003C\u002Fstrong> The scanner only uses minimum resources to keep your server fast and responsive.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Why Keep Malcure Malware Shield Installed?\u003C\u002Fh3>\n\u003Ch4>Reinfection Risk & Continuous Monitoring\u003C\u002Fh4>\n\u003Cp>Malware cleanup is not a one-and-done task. New vulnerabilities and reinfections can appear without warning, so continuous monitoring and scheduled scans help catch issues early—before SEO damage, blacklists, or downtime. You get email notification with the results to rest assured that the site is clean or when immediate action is required.\u003C\u002Fp>\n\u003Cp>Cleaning your site is just step one. Malcure is your anti-malware health monitor.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Continuous Monitoring:\u003C\u002Fstrong> Scheduled scans watch your site for changes so you don’t have to.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Real-Time Event Log:\u003C\u002Fstrong> See exactly what’s happening on your site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Early Warning:\u003C\u002Fstrong> Catch new infections before Google blacklists you.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Recurrence Prevention:\u003C\u002Fstrong> Scheduled scans and integrity checks catch reinfections before they spread.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>No Bloat:\u003C\u002Fstrong> Designed to run on-demand or as per schedule without slowing down your site.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Who This Plugin Is For\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Site owners\u003C\u002Fstrong> who want clear, actionable results (what was flagged and where).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Agencies & developers\u003C\u002Fstrong> who need fast triage across multiple sites.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>WooCommerce \u002F membership \u002F lead-gen sites\u003C\u002Fstrong> where downtime, SEO brand-reputation damage are expensive.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Anyone\u003C\u002Fstrong> who wants a scanner that cuts through the noise to focus on \u003Cem>signal\u003C\u002Fem>—real threats with practical remediation paths.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>How It Works (Scan \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> Review \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> Clean \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> Monitor)\u003C\u002Fh4>\n\u003Col>\n\u003Cli>\n\u003Cp>\u003Cstrong>Scan\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Go to \u003Cstrong>Malcure Scanner\u003C\u002Fstrong> in your Admin Dashboard.\u003C\u002Fli>\n\u003Cli>Run a scan to check your files and database for vulnerabilities, malware, backdoors, suspicious code, and integrity issues.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Review\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Malcure reports findings with clear locations (file paths \u002F database records) so you can verify what changed and why it was flagged.\u003C\u002Fli>\n\u003Cli>Use the results to decide what should be repaired, deleted, or kept (for example, legitimate custom code).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Clean & Recover\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>The free edition helps you identify issues, inspect data and understand what needs fixing.\u003C\u002Fli>\n\u003Cli>The Advanced Edition adds Whitelisting, Advanced Scan Filters, File Operations, WP CLI Automation, Deployment, Bulk Client-Servicing Features, Background Scan & Premium Support (Expertise).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Monitor\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Set up scheduled scans to keep your site continuously monitored.\u003C\u002Fli>\n\u003Cli>Get email alerts for new infections or integrity issues.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>Is It Free?\u003C\u002Fh4>\n\u003Cp>We believe in 100% transparency.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Free Forever:\u003C\u002Fstrong> Professional-grade Detection (Knowledge). You see every infected file and database row (exact file path & line number), so you can clean it yourself for free.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Free Forever:\u003C\u002Fstrong> Real-time Threat Intelligence & Monitoring.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Pro Upgrade:\u003C\u002Fstrong> Whitelisting, Advanced Scan Filters, File Operations, WP CLI Automation, Deployment, Bulk Client-Servicing Features, Background Scan & Premium Support (Expertise).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>You are never forced to pay to \u003Cem>find\u003C\u002Fem> a hack.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FEbSbxiTOc8k?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Ch4>Core Features (Free Forever)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Deep Malware Scan:\u003C\u002Fstrong> Scans core files, themes, plugins, images, and your entire database for vulnerabilities, viruses, trojans, backdoors, and \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=60&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">malicious redirects\u003C\u002Fa>.\n\u003Cul>\n\u003Cli>\u003Cstrong>Files:\u003C\u002Fstrong> Scans core files, themes, plugins, images, and uploads for backdoors, shells including variants like C99, R57, RootShell, dolohan, Crystal Shell, Matamu, Cybershell, W4cking, Sniper, Predator, Jackal, Phantasma, GFS, Dive, Dx, obfuscated code and many more known and unknown variants.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Database:\u003C\u002Fstrong> Scans database tables for malicious injections, recurring malware and spam links.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SEO Spam Detection:\u003C\u002Fstrong> Specifically checks page titles and database records for “Japanese Keyword Hack”, “Pharma Hack” and other SEO spam symptoms.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Vulnerability Scanner:\u003C\u002Fstrong> Checks your installed plugins and themes against our real-time database of known security vulnerabilities.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Intelligent Checksum Verification:\u003C\u002Fstrong> Automatically verifies your core files, themes, and plugins against the official checksums. If a file has been tampered with, we know instantly.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Uncompromising Detection:\u003C\u002Fstrong> Detects variants like C99, R57, RootShell, dolohan, Crystal Shell, Matamu, Cybershell, W4cking, Sniper, Predator, Jackal, Phantasma, GFS, Dive, Dx, obfuscated code and many more known and unknown variants.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Attack Surface Hardening & Firewall:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>\u003Cstrong>Block Path Traversal:\u003C\u002Fstrong> Stops attackers from accessing sensitive system files.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Block PHP Uploads:\u003C\u002Fstrong> Prevents malicious scripts from being uploaded to your site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Stop User Enumeration:\u003C\u002Fstrong> Blocks bots from fishing for your username.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>REST API Protection:\u003C\u002Fstrong> Prevents user data leakage via the WP REST API.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=1622&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Security Hardening\u003C\u002Fa>:\u003C\u002Fstrong> Learn more about securing your site.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Recurrence Watchdog (Background Monitor):\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>\u003Cstrong>Set it and forget it:\u003C\u002Fstrong> Malcure runs silently in the background using scheduled scans (configurable cadence) + integrity baseline to monitor changes.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Stay Ahead:\u003C\u002Fstrong> Automatically catch new infections before they spread or damage your SEO rankings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Incident Response Toolkit:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>\u003Cstrong>Nuke User Sessions:\u003C\u002Fstrong> Instantly force-logout every user on the site to kick out intruders.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Salt Shuffler:\u003C\u002Fstrong> One-click rotation of \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5230&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">security keys (salts)\u003C\u002Fa> to invalidate all browser cookies.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Forensic Flight Recorder (Event Log):\u003C\u002Fstrong> Track every security event. Know exactly \u003Cem>when\u003C\u002Fem> and \u003Cem>how\u003C\u002Fem> a breach might have occurred with our 100-day event log.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Google Search Console Integration:\u003C\u002Fstrong> Connect directly to Google to fetch security warnings and blacklist status in real-time.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Real-Time API Updates:\u003C\u002Fstrong> Connects to the Malcure Cloud to fetch the latest threats and vulnerabilities.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Upgrade to Advanced Edition\u003C\u002Fh4>\n\u003Cp>For mission-critical websites that demand comprehensive protection and recovery tools.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>1-Click Surgical Repair:\u003C\u002Fstrong> Inspect, Delete, or Repair infected files instantly.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Advanced Whitelisting:\u003C\u002Fstrong> Stop false alarms. Supports files, folders, and \u003Cstrong>Database Records\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>WP-CLI Integration:\u003C\u002Fstrong> Complete command-line control for automated scanning and reporting.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Automatic Definition Updates:\u003C\u002Fstrong> Definitions update automatically in the background.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>On-Demand Background Scans:\u003C\u002Fstrong> Trigger deep scans immediately without keeping your browser open.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Advanced Scan Filters:\u003C\u002Fstrong> For when you are specifically looking for something in the files or database or want to include, exclude specific files & directories\u003C\u002Fli>\n\u003Cli>\u003Cstrong>File Operations:\u003C\u002Fstrong> Critical file operations like deletion.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Bulk Client-Servicing Features:\u003C\u002Fstrong> Like copying scan results to generate report for clients.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Background Scan:\u003C\u002Fstrong> For when you want to trigger a scan and forget it. The scan continues and emails you upon completion.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Premium Support (Expertise):\u003C\u002Fstrong> When you want to consult or want to exploit advanced features or need help troubleshooting.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>High-Priority Support:\u003C\u002Fstrong> Direct access to our security analysts.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=116&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">\u003Cstrong>Get Malcure Advanced Edition\u003C\u002Fstrong>\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Additional Resources for Malware Removal\u003C\u002Fh4>\n\u003Cp>Follow these expert guides to remove malware, recover lost traffic, and restore your online reputation:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=1540&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">A step by step guide to remove the malware\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=13946&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Japanese Keyword Hack: How to Remove SEO Spam\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5728&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">What is the Pharma Hack & How to fix it\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=14143&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Fix Google Ads Disapproved for Malicious Software\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=14477&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Prevent SQL Injection Attacks\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5265&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Live Malware Infection Removal & Analysis\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=7207&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Fix “This Site May Harm Your Computer” Warning\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=60&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Comprehensive Guide to Removing JavaScript Redirect Malware\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5699&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Fix a Blank WP-Admin Page\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=9102&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Malcure WP CLI Integration & Cheatsheet\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=14375&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Prevent Brute Force Attacks\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5230&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Change Salt Keys\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Expert Malware Removal Service\u003C\u002Fh4>\n\u003Cp>In over your head? Our security analysts are on standby. We offer a complete \u003Cstrong>Malware Removal Service\u003C\u002Fstrong> that includes:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>100% Removal Guarantee:\u003C\u002Fstrong> We guarantee to remove all malware from your website.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Same Day Service:\u003C\u002Fstrong> Fast turnaround time to get your business back online.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Manual Inspection:\u003C\u002Fstrong> Our experts manually inspect critical files (htaccess, wp-config, index.php) and your database.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Blacklist Removal:\u003C\u002Fstrong> We handle the removal of your site from blacklists like Google, Norton, McAfee, etc.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Hardening:\u003C\u002Fstrong> We identify the root cause and patch vulnerabilities to prevent future infections.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>15-Day Cover:\u003C\u002Fstrong> Security analysts available 24\u002F7\u002F365 to ensure your site stays clean.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=107&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">\u003Cstrong>Book Expert Malware Removal\u003C\u002Fstrong>\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Troubleshooting\u003C\u002Fh3>\n\u003Ch4>Some files are detected by Malcure Malware Shield as “suspicious”. What gives?\u003C\u002Fh4>\n\u003Cp>Malcure’s DeepScan checks each file for malware. However some files aren’t pure malware but may contain code that is suspicious and could potentially do nasty things. You should carefully review and analyse them to see if they indeed do anything nasty.\u003C\u002Fp>\n\u003Ch4>I can’t get Malcure Malware Shield to work. It hangs \u002F doesn’t complete the scan \u002F breaks for some reason.\u003C\u002Fh4>\n\u003Cp>If you think that the plugin is broken, \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5677&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">please report it here\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Malcure Malware Shield (or for that matter other plugins) may break on malware affected \u002F broken websites. \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=116&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Malcure Advanced Edition\u003C\u002Fa> integrates with WP CLI and allows you to complete the scan from WP CLI even when the site is blocked by the webhost or when you are unable to login to the website.\u003C\u002Fp>\n\u003Ch4>My site is infected however Malcure Malware Shield doesn’t detect the infection.\u003C\u002Fh4>\n\u003Cp>Malware keeps evolving. If you come across malware that Malcure Malware Shield is not able to identify, you may \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=157&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">please report it here\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>The scan gets stuck midway. What should I do?\u003C\u002Fh4>\n\u003Cp>In case of such an event, please file a support request with us and we’ll be more than happy to troubleshoot the issue.\u003C\u002Fp>\n\u003Cp>Please visit \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5677&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">this page\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>I cleaned my site but it got infected again. What should I do?\u003C\u002Fh4>\n\u003Cp>Malware cleanup is a waste of time and effort unless you find the root cause behind the malware infection and monitor for recurrence. How was someone able to infect your website? Have you plugged in that security hole?\u003C\u002Fp>\n\u003Cp>Please read \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002Fblog\u002Fsecurity\u002Fwhy-do-wordpress-websites-get-hacked\u002F?utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Why Do Websites Get Hacked\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>Google Safe Browsing site status (or some other scanner) still shows my site as infected. What should I do?\u003C\u002Fh4>\n\u003Cp>First make sure you purge your site cache. Second, Google (and other scanners) cache the results for some time. You’ll need to force or refresh the scan. You can also file a request with us to \u003Ca href=\"https:\u002F\u002Fwww.malcure.com\u002F?p=107&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">get your site off any blacklists\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>I found a suspicious file, what now?\u003C\u002Fh4>\n\u003Cp>If Malcure flags it, it’s likely malicious. You can inspect the file content using our built-in inspector. If you’re unsure, consider our \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=107&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Expert Malware Removal Service\u003C\u002Fa>.\u003C\u002Fp>\n","Fast malware removal & security shield. Fix hacks, stop redirects, clean SEO spam. Real-time threat intelligence. No bloat.",605372,88,69,"2026-02-13T05:45:00.000Z","3.7.4",[85,55,79,140,141],"virus","vulnerability-scanner","https:\u002F\u002Fmalcure.com\u002F?p=116&utm_source=plugin-header&utm_medium=web&utm_campaign=wpmr","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-malware-removal.19.8.zip",96,"2025-09-03 00:00:00",{"attackSurface":147,"codeSignals":222,"taintFlows":250,"riskAssessment":277,"analyzedAt":284},{"hooks":148,"ajaxHandlers":164,"restRoutes":217,"shortcodes":218,"cronEvents":219,"entryPointCount":220,"unprotectedCount":221},[149,155,159],{"type":150,"name":151,"callback":152,"file":153,"line":154},"action","admin_enqueue_scripts","s4esec_enqueue_admin_scripts","s4e.php",105,{"type":150,"name":156,"callback":157,"file":153,"line":158},"admin_menu","s4esec_add_admin_menu",120,{"type":150,"name":160,"callback":161,"file":162,"line":163},"wp_enqueue_scripts","s4esec_enqueue_sweetalert","templates\\s4e-login.php",10,[165,170,173,177,179,183,185,189,191,195,197,200,202,205,207,211,213,215],{"action":166,"nopriv":167,"callback":168,"hasNonce":167,"hasCapCheck":167,"file":153,"line":169},"s4esec_display_start_scan_options",false,"s4esec_display_start_scan_options_ajax",197,{"action":166,"nopriv":171,"callback":168,"hasNonce":167,"hasCapCheck":167,"file":153,"line":172},true,198,{"action":174,"nopriv":167,"callback":175,"hasNonce":167,"hasCapCheck":167,"file":153,"line":176},"s4esec_display_scans_tab_content","s4esec_display_scans_tab_content_ajax",207,{"action":174,"nopriv":171,"callback":175,"hasNonce":167,"hasCapCheck":167,"file":153,"line":178},208,{"action":180,"nopriv":167,"callback":181,"hasNonce":167,"hasCapCheck":167,"file":153,"line":182},"s4esec_display_full_scan_form","s4esec_display_full_scan_form_ajax",211,{"action":180,"nopriv":171,"callback":181,"hasNonce":167,"hasCapCheck":167,"file":153,"line":184},212,{"action":186,"nopriv":167,"callback":187,"hasNonce":167,"hasCapCheck":167,"file":153,"line":188},"s4esec_display_light_scan_form","s4esec_display_light_scan_form_ajax",222,{"action":186,"nopriv":171,"callback":187,"hasNonce":167,"hasCapCheck":167,"file":153,"line":190},223,{"action":192,"nopriv":167,"callback":193,"hasNonce":167,"hasCapCheck":167,"file":153,"line":194},"s4esec_display_crawler_scan_form","s4esec_display_crawler_scan_form_ajax",233,{"action":192,"nopriv":171,"callback":193,"hasNonce":167,"hasCapCheck":167,"file":153,"line":196},234,{"action":198,"nopriv":167,"callback":198,"hasNonce":167,"hasCapCheck":167,"file":153,"line":199},"s4esec_clear_token",247,{"action":198,"nopriv":171,"callback":198,"hasNonce":167,"hasCapCheck":167,"file":153,"line":201},248,{"action":203,"nopriv":167,"callback":203,"hasNonce":171,"hasCapCheck":167,"file":153,"line":204},"s4esec_handle_scan",675,{"action":203,"nopriv":171,"callback":203,"hasNonce":171,"hasCapCheck":167,"file":153,"line":206},676,{"action":208,"nopriv":167,"callback":208,"hasNonce":171,"hasCapCheck":167,"file":209,"line":210},"s4esec_create_security_file","templates\\s4e-asset-manager.php",5,{"action":208,"nopriv":171,"callback":208,"hasNonce":171,"hasCapCheck":167,"file":209,"line":212},6,{"action":214,"nopriv":167,"callback":214,"hasNonce":171,"hasCapCheck":167,"file":209,"line":73},"s4esec_create_verify_file",{"action":214,"nopriv":171,"callback":214,"hasNonce":171,"hasCapCheck":167,"file":209,"line":216},62,[],[],[],18,12,{"dangerousFunctions":223,"sqlUsage":224,"outputEscaping":226,"fileOperations":247,"externalRequests":248,"nonceChecks":61,"capabilityChecks":11,"bundledLibraries":249},[],{"prepared":11,"raw":11,"locations":225},[],{"escaped":227,"rawEcho":228,"locations":229},44,8,[230,233,235,237,239,241,243,245],{"file":153,"line":231,"context":232},138,"raw output",{"file":153,"line":234,"context":232},139,{"file":153,"line":236,"context":232},140,{"file":153,"line":238,"context":232},194,{"file":153,"line":240,"context":232},204,{"file":153,"line":242,"context":232},217,{"file":153,"line":244,"context":232},228,{"file":153,"line":246,"context":232},239,2,16,[],[251,269],{"entryPoint":252,"graph":253,"unsanitizedCount":11,"severity":268},"s4esec_create_verify_file (templates\\s4e-asset-manager.php:64)",{"nodes":254,"edges":266},[255,260],{"id":256,"type":257,"label":258,"file":209,"line":259},"n0","source","$_POST (x2)",80,{"id":261,"type":262,"label":263,"file":209,"line":264,"wp_function":265},"n1","sink","file_put_contents() [File Write]",92,"file_put_contents",[267],{"from":256,"to":261,"sanitized":171},"low",{"entryPoint":270,"graph":271,"unsanitizedCount":11,"severity":268},"\u003Cs4e-asset-manager> (templates\\s4e-asset-manager.php:0)",{"nodes":272,"edges":275},[273,274],{"id":256,"type":257,"label":258,"file":209,"line":259},{"id":261,"type":262,"label":263,"file":209,"line":264,"wp_function":265},[276],{"from":256,"to":261,"sanitized":171},{"summary":278,"deductions":279},"The \"s4e-effortless-continuous-cybersecurity\" plugin v1.0.0 exhibits a mixed security posture. On one hand, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and properly escaping the vast majority of its output. The absence of known CVEs and recorded vulnerabilities in its history is a positive indicator of past security diligence. However, a significant concern lies in its attack surface, with a considerable number of AJAX handlers lacking authentication checks. This creates a substantial opening for potential unauthorized actions if these endpoints are accessible to unauthenticated users.\n\nThe static analysis reveals no critical or high-severity issues in taint flows, which is encouraging. The plugin's code does not appear to directly execute dangerous functions or use raw SQL. The presence of file operations and external HTTP requests, while common, warrants careful consideration in conjunction with the unprotected AJAX endpoints. The limited number of nonce checks, particularly in the context of numerous unprotected AJAX handlers, further amplifies the risk of Cross-Site Request Forgery (CSRF) attacks.\n\nOverall, while the plugin avoids common pitfalls like raw SQL and largely escapes output, the unprotected AJAX endpoints represent the most significant security weakness. The lack of robust authentication and authorization mechanisms on these entry points, coupled with a limited number of nonce checks, exposes the plugin to considerable risk. Addressing these unprotected AJAX handlers should be a priority to improve the plugin's security.",[280,282],{"reason":281,"points":163},"Unprotected AJAX handlers",{"reason":283,"points":210},"Limited nonce checks on AJAX","2026-03-17T06:13:42.994Z",{"wat":286,"direct":343},{"assetPaths":287,"generatorPatterns":314,"scriptPaths":315,"versionParams":316},[288,289,290,291,292,293,294,295,296,297,298,299,300,301,302,303,304,305,306,307,308,309,310,311,312,313],"\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fall.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fbootstrap.min.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Finter.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fsweetalert2.min.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fsweetalert2.min.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fbootstrap.bundle.min.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-scans.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-login.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-user-info.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-start-scans.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-dark.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-scans.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-table.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-login.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-user-info.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Futils\u002Futils.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Futils\u002Fenums.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-asset-manager.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fjquery-ui.css","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fscans\u002Fcrawler\u002Fs4e-start-crawler.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-severities.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fscans\u002Flight-scan\u002Fs4e-light-scan.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fscans\u002Ffull-scan\u002Fs4e-full-scan.js","\u002Fwp-content\u002Fplugins\u002Fs4e-effortless-continuous-cybersecurity\u002Fscans\u002Ffull-scan\u002Fs4e-full-scan.css",[],[292,293,294,295,296,297,298,305,306,307,309,310,311,312],[317,318,319,320,321,322,323,324,325,326,327,328,329,330,331,332,333,334,335,336,337,338,339,340,341,342],"s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fall.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fbootstrap.min.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Finter.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fsweetalert2.min.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fsweetalert2.min.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fbootstrap.bundle.min.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-scans.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-login.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-user-info.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-start-scans.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-dark.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-scans.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-table.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-login.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fs4e-user-info.css?ver=","s4e-effortless-continuous-cybersecurity\u002Futils\u002Futils.js?ver=","s4e-effortless-continuous-cybersecurity\u002Futils\u002Fenums.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-asset-manager.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fcss\u002Fjquery-ui.css?ver=","s4e-effortless-continuous-cybersecurity\u002Fscans\u002Fcrawler\u002Fs4e-start-crawler.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fassets\u002Fjs\u002Fs4e-severities.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fscans\u002Flight-scan\u002Fs4e-light-scan.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fscans\u002Ffull-scan\u002Fs4e-full-scan.js?ver=","s4e-effortless-continuous-cybersecurity\u002Fscans\u002Ffull-scan\u002Fs4e-full-scan.css?ver=",{"cssClasses":344,"htmlComments":347,"htmlAttributes":348,"restEndpoints":350,"jsGlobals":351,"shortcodeOutput":356},[345,346],"s4e-tab-button","theme-toggle-main-div",[],[349],"data-tab",[],[352,353,354,355],"s4e_admin_data","s4eParams","s4eParams2","s4esec_ajax_object",[]]