[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$feOzGsLFwpV4dj9BJfCBpXTRSqrGvMZGRsmfBD17Gd8M":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"vulnerabilities":31,"developer":32,"crawl_stats":29,"alternatives":38,"analysis":143,"fingerprints":344},"semisecure-login-reimagined","Semisecure Login Reimagined","3.2.0","laceous","https:\u002F\u002Fprofiles.wordpress.org\u002Flaceous\u002F","\u003Cp>\u003Cstrong>Please note that I’ve moved away from WordPress for the time being. I have no plans to continue updating my plugins. If someone was thinking of forking this project, now would be the time.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Semisecure Login Reimagined increases the security of the login process by using a combination of public and secret-key encryption to encrypt the password on the client-side when a user logs in. JavaScript is required to enable encryption. It is most useful for situations where SSL is not available, but the administrator wishes to have some additional security measures in place without sacrificing convenience.\u003C\u002Fp>\n\u003Cp>This plugin is a “re-imagining” of the original \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fsemisecure-login\u002F\" title=\"Semisecure Login\" rel=\"ugc\">Semisecure Login\u003C\u002Fa> (which used one-way MD5 hashing). This version works with the new phpass hashed passwords that WordPress uses, as well as maintaining backwards compatibility with the older (pre WordPress 2.5) MD5 hashed passwords. Theoretically, it will also work with any other hashing algorithm (because this plugin simply adds an extra layer in the process rather than trying to authenticate anything itself).\u003C\u002Fp>\n\u003Cp>This plugin requires PHP to be compiled with openssl support, which is a pretty standard option for most hosts.\u003C\u002Fp>\n\u003Ch3>Additional Info\u003C\u002Fh3>\n\u003Cp>In general…\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Semisecure Login Reimagined 3.2.x is tested to work with:\n\u003Cul>\n\u003Cli>WP 3.1.x\u003C\u002Fli>\n\u003Cli>PHP 4.3.x – 5.3.x\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Semisecure Login Reimagined 3.1.x was tested to work with:\n\u003Cul>\n\u003Cli>WP 2.8.x – 3.0.x\u003C\u002Fli>\n\u003Cli>PHP 4.3.x – 5.3.x\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Semisecure Login Reimagined 3.0.x was tested to work with:\n\u003Cul>\n\u003Cli>WP 2.7.x – 2.9.x\u003C\u002Fli>\n\u003Cli>PHP 4.3.x – 5.3.x\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Semisecure Login Reimagined 2.x was tested to work with:\n\u003Cul>\n\u003Cli>WP 2.2.x – 2.8.x\u003C\u002Fli>\n\u003Cli>PHP 4.2.x – 5.2.x\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Semisecure Login Reimagined 1.x was tested to work with:\n\u003Cul>\n\u003Cli>WP 2.1.x – 2.7.x\u003C\u002Fli>\n\u003Cli>PHP 4.3.x – 5.2.x\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>** See the readme.txt file for each version for more specific information\u003C\u002Fp>\n","\"Re-imagined\" version of Semisecure Login that uses public and secret-key encryption to encrypt passwords when logging in.",80,51291,100,1,"2011-07-15T23:08:00.000Z","3.1.4","3.1","",[20,21,22,23,24],"admin","encryption","login","rsa","security","http:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fsemisecure-login-reimagined\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsemisecure-login-reimagined.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":33,"total_installs":34,"avg_security_score":27,"avg_patch_time_days":35,"trust_score":36,"computed_at":37},3,120,30,84,"2026-04-04T07:48:48.657Z",[39,62,86,106,125],{"slug":40,"name":41,"version":42,"author":43,"author_profile":44,"description":45,"short_description":46,"active_installs":47,"downloaded":48,"rating":49,"num_ratings":50,"last_updated":51,"tested_up_to":52,"requires_at_least":53,"requires_php":54,"tags":55,"homepage":57,"download_link":58,"security_score":59,"vuln_count":60,"unpatched_count":28,"last_vuln_date":61,"fetched_at":30},"loginizer","Loginizer","2.0.6","Softaculous","https:\u002F\u002Fprofiles.wordpress.org\u002Fsoftaculous\u002F","\u003Cp>Loginizer is a WordPress plugin which helps you fight against bruteforce attack by blocking login for the IP after it reaches maximum retries allowed. You can blacklist or whitelist IPs for login using Loginizer. You can use various other features like Two Factor Auth, reCAPTCHA, PasswordLess Login, etc. to improve security of your website.\u003C\u002Fp>\n\u003Cp>Loginizer is actively used by more than 1000000+ WordPress websites.\u003C\u002Fp>\n\u003Cp>You can find our official documentation at \u003Ca href=\"https:\u002F\u002Floginizer.com\u002Fdocs\" rel=\"nofollow ugc\">https:\u002F\u002Floginizer.com\u002Fdocs\u003C\u002Fa>. We are also active in our community support forums on \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Floginizer\" rel=\"ugc\">wordpress.org\u003C\u002Fa> if you are one of our free users. Our Premium Support Ticket System is at \u003Ca href=\"https:\u002F\u002Floginizer.deskuss.com\" rel=\"nofollow ugc\">https:\u002F\u002Floginizer.deskuss.com\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Free Features :\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Brute force protection. IPs trying to brute force your website will be blocked for 15 minutes after 3 failed login attempts. After multiple lockouts the IP is blocked for 24 hours. This is the default configuration and can be changed from Loginizer -> Brute force page in WordPress admin panel.\u003C\u002Fli>\n\u003Cli>Failed login attempts logs.\u003C\u002Fli>\n\u003Cli>Blacklist IPs\u003C\u002Fli>\n\u003Cli>Whitelist IPs\u003C\u002Fli>\n\u003Cli>Custom error messages on failed login.\u003C\u002Fli>\n\u003Cli>Permission check for important files and folders.\u003C\u002Fli>\n\u003Cli>Allow only Trusted IP.\u003C\u002Fli>\n\u003Cli>Blocked Screen in place of the Login page.\u003C\u002Fli>\n\u003Cli>Email Notification on successful login.\u003C\u002Fli>\n\u003Cli>Let users login with LinkedIn\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Get Support and Pro Features\u003C\u002Fh4>\n\u003Cp>Get professional support from our experts and pro features to take your site’s security to the next level with \u003Ca href=\"https:\u002F\u002Floginizer.com\u002Fpricing\" rel=\"nofollow ugc\">Loginizer-Security\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Pro Features :\u003C\u002Fp>\n\u003Cul>\n\u003Cli>MD5 Checksum – of Core WordPress Files. The admin can check and ignore files as well.\u003C\u002Fli>\n\u003Cli>PasswordLess Login – At the time of Login, the username \u002F email address will be asked and an email will be sent to the email address of that account with a temporary link to login.\u003C\u002Fli>\n\u003Cli>Two Factor Auth via Email – On login, an email will be sent to the email address of that account with a temporary 6 digit code to complete the login.\u003C\u002Fli>\n\u003Cli>Two Factor Auth via App – The user can configure the account with a 2FA App like Google Authenticator, Authy, etc.\u003C\u002Fli>\n\u003Cli>Login Challenge Question – The user can setup a Challenge Question and Answer as an additional security layer. After Login, the user will need to answer the question to complete the login.\u003C\u002Fli>\n\u003Cli>reCAPTCHA – Google’s reCAPTCHA v3\u002Fv2, Cloudflare Turnstile, hCAPTCHA can be configured for the Login screen, Comments Section, Registration Form, etc. to prevent automated brute force attacks. Supports WooCommerce as well.\u003C\u002Fli>\n\u003Cli>Rename Login Page – The Admin can rename the login URL (slug) to something different from wp-login.php to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Rename WP-Admin URL – The Admin area in WordPress is accessed via wp-admin. With loginizer you can change it to anything e.g. site-admin\u003C\u002Fli>\n\u003Cli>CSRF Protection – This helps in preventing CSRF attacks as it updates the admin URL with a session string which makes it difficult and nearly impossible for the attacker to predict the URL.\u003C\u002Fli>\n\u003Cli>Rename Login with Secrecy – If set, then all Login URL’s will still point to wp-login.php and users will have to access the New Login Slug by typing it in the browser.\u003C\u002Fli>\n\u003Cli>Disable XML-RPC – An option to simply disable XML-RPC in WordPress. Most of the WordPress users don’t need XML-RPC and can disable it to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Rename XML-RPC – The Admin can rename the XML-RPC to something different from xmlrpc.php to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Username Auto Blacklist – Attackers generally use common usernames like admin, administrator, or variations of your domain name \u002F business name. You can specify such username here and Loginizer will auto-blacklist the IP Address(s) of clients who try to use such username(s).\u003C\u002Fli>\n\u003Cli>New Registration Domain Blacklist – If you would like to ban new registrations from a particular domain, you can use this utility to do so.\u003C\u002Fli>\n\u003Cli>Change the Admin Username – The Admin can rename the admin username to something more difficult.\u003C\u002Fli>\n\u003Cli>Auto Blacklist IPs – IPs will be auto blacklisted, if certain usernames saved by the Admin are used to login by malicious bots \u002F users.\u003C\u002Fli>\n\u003Cli>Disable Pingbacks – Simple way to disable PingBacks.\u003C\u002Fli>\n\u003Cli>SSO – Single Sign-on, let any user access to your WordPress Dashboard without the need to share username or password.\u003C\u002Fli>\n\u003Cli>Limit Concurrent Logins – It prevents user to login from different devices concurrently, you can define how many devices you want to allow, and how you want to restrict the user when concurrent limit is reached.\u003C\u002Fli>\n\u003Cli>Social Login – Users can login or register with their Google, Github, Facebook, X (Twitter), Discord, Twitch, LinkedIn, Microsoft with support for WooCommerce and Ultimate Member.\u003C\u002Fli>\n\u003Cli>Key Less Social Login – Use Loginizer’s Social Auth for easy key less Social login configuration, now supports Google, GitHub, X, LinkedIn more to be added later\u003C\u002Fli>\n\u003Cli>Country Blocking – Block IPs from specific countries to restrict access to your website.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Features in Loginizer include:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Blocks IP after maximum retries allowed\u003C\u002Fli>\n\u003Cli>Extended Lockout after maximum lockouts allowed\u003C\u002Fli>\n\u003Cli>Email notification to admin after max lockouts\u003C\u002Fli>\n\u003Cli>Blacklist IP\u002FIP range\u003C\u002Fli>\n\u003Cli>Whitelist IP\u002FIP range\u003C\u002Fli>\n\u003Cli>Check logs of failed attempts\u003C\u002Fli>\n\u003Cli>Create IP ranges\u003C\u002Fli>\n\u003Cli>Delete IP ranges\u003C\u002Fli>\n\u003Cli>Licensed under LGPLv2.1\u003C\u002Fli>\n\u003Cli>Safe & Secure\u003C\u002Fli>\n\u003C\u002Ful>\n","Loginizer is a WordPress security plugin which helps you fight against bruteforce attacks.",1000000,29791210,96,1020,"2026-03-02T12:38:00.000Z","6.9.4","3.0","5.5",[56,20,22,40,24],"access","https:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Floginizer\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Floginizer.2.0.6.zip",87,8,"2024-11-04 00:00:00",{"slug":63,"name":64,"version":65,"author":66,"author_profile":67,"description":68,"short_description":69,"active_installs":70,"downloaded":71,"rating":72,"num_ratings":73,"last_updated":74,"tested_up_to":52,"requires_at_least":75,"requires_php":76,"tags":77,"homepage":81,"download_link":82,"security_score":83,"vuln_count":84,"unpatched_count":28,"last_vuln_date":85,"fetched_at":30},"hide-my-wp","WP Ghost (Hide My WP Ghost) – Security & Firewall","5.5.02","John Darrel","https:\u002F\u002Fprofiles.wordpress.org\u002Fjohndarrel\u002F","\u003Cp>Level up your WordPress security with the WP Ghost plugin! \u003Ca href=\"https:\u002F\u002Fwpghost.com\u002Fkb\u002F99-fewer-hacker-attacks-on-wordpress-sites\u002F\" rel=\"nofollow ugc\">99% Fewer Hacker Attacks on WordPress Sites\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WP Ghost\u003C\u002Fstrong> (formerly Hide My WP Ghost) is a \u003Cstrong>comprehensive hack-prevention security solution for WordPress\u003C\u002Fstrong> websites. It adds \u003Cstrong>multiple layers of security to block hacker bots and prevent unauthorized access\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>It works by changing and hiding common vulnerabilities, making it difficult for bots and hackers to exploit weak points in plugins, themes, and the WordPress core itself.\u003C\u002Fp>\n\u003Cp>WP Ghost Network Stats: \u003Cstrong>blocked over 10 million monthly brute-force attempts\u003C\u002Fstrong> and \u003Cstrong>prevented over 100 million monthly threats\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>Key features include powerful protection against:\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cul>\n\u003Cli>Brute Force Attacks\u003C\u002Fli>\n\u003Cli>SQL Injection Attacks\u003C\u002Fli>\n\u003Cli>Script Injection Attacks\u003C\u002Fli>\n\u003Cli>Vulnerability Exploit\u003C\u002Fli>\n\u003Cli>Malware Injection\u003C\u002Fli>\n\u003Cli>XML-RPC attacks\u003C\u002Fli>\n\u003Cli>File Inclusion Exploits\u003C\u002Fli>\n\u003Cli>Directory Traversal Attacks\u003C\u002Fli>\n\u003Cli>Default WP Paths Exploits\u003C\u002Fli>\n\u003Cli>Cross-Site Scripting (XSS)\u003C\u002Fli>\n\u003Cli>Throttling of Access Attempts to Entry Points\u003C\u002Fli>\n\u003Cli>and more\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fblockquote>\n\u003Cp>Protect your site today! WP Ghost hides and secures all common paths, plugins, and themes from hacker bots and spammers.\u003C\u002Fp>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FQMdoSN8dk1c?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003Cbr \u002F>\nYouTube – Why You Must Have \u003Ca href=\"https:\u002F\u002Fwpghost.com\" rel=\"nofollow ugc\">Hide My WP\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>WP Ghost is packed with over 65 security-free features:\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>Change and Hide Paths:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Hide WordPress wp-admin, and show 404 error or a custom page\u003C\u002Fli>\n\u003Cli>Hide WordPress wp-login.php, and show 404 error or a custom page\u003C\u002Fli>\n\u003Cli>Hide WordPress Common Paths\u003C\u002Fli>\n\u003Cli>Hide WordPress Common Files\u003C\u002Fli>\n\u003Cli>Change the wp-admin and wp-login URLs\u003C\u002Fli>\n\u003Cli>Change lost password URL\u003C\u002Fli>\n\u003Cli>Change register URL\u003C\u002Fli>\n\u003Cli>Change logout URL\u003C\u002Fli>\n\u003Cli>Change activation URL\u003C\u002Fli>\n\u003Cli>Change admin-ajax URL\u003C\u002Fli>\n\u003Cli>Change wp-content URL\u003C\u002Fli>\n\u003Cli>Change wp-includes URL\u003C\u002Fli>\n\u003Cli>Change uploads URL\u003C\u002Fli>\n\u003Cli>Change comments URL\u003C\u002Fli>\n\u003Cli>Change author URL\u003C\u002Fli>\n\u003Cli>Change plugins URL\u003C\u002Fli>\n\u003Cli>Change plugins name\u003C\u002Fli>\n\u003Cli>Change themes URL\u003C\u002Fli>\n\u003Cli>Change themes name\u003C\u002Fli>\n\u003Cli>Custom themes style.css name\u003C\u002Fli>\n\u003Cli>Change REST API wp-json URL\u003C\u002Fli>\n\u003Cli>Change category URL\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Change tags URL\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Custom login redirects based on user role\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Custom logout redirects based on user role\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Change URLs from Relative to Absolute\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>Change URLs in Ajax calls\u003C\u002Fli>\n\u003Cli>Change URLs for Logged Users\u003C\u002Fli>\n\u003Cli>Change URLs in Cache Files\u003C\u002Fli>\n\u003Cli>Change paths in Sitemap.xml\u003C\u002Fli>\n\u003Cli>Change paths in Robots.txt\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Firewall:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Two-factor Authentication By Code (2FA)\u003C\u002Fli>\n\u003Cli>Two-factor Authentication By Email (2FA)\u003C\u002Fli>\n\u003Cli>Two-factor Authentication By Passkey (2FA)\u003C\u002Fli>\n\u003Cli>Security Headers against XSS & Code Injections\u003C\u002Fli>\n\u003Cli>Security Header Strict-Transport-Security\u003C\u002Fli>\n\u003Cli>Security Header Content-Security-Policy\u003C\u002Fli>\n\u003Cli>Security Header X-XSS-Protection\u003C\u002Fli>\n\u003Cli>Security Header X-Content-Type-Options\u003C\u002Fli>\n\u003Cli>Security Header X-Frame-Options\u003C\u002Fli>\n\u003Cli>Firewall against Script Injections and SQL Injection\u003C\u002Fli>\n\u003Cli>7G Firewall Security Filter\u003C\u002Fli>\n\u003Cli>8G Firewall Security Filter\u003C\u002Fli>\n\u003Cli>Block by IP Addresses\u003C\u002Fli>\n\u003Cli>Block by User Agents\u003C\u002Fli>\n\u003Cli>Block by Referrers\u003C\u002Fli>\n\u003Cli>Block by Hostnames\u003C\u002Fli>\n\u003Cli>Hide Website from Theme Detectors\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Hide Options:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Hide \u002Fwp-admin path\u003C\u002Fli>\n\u003Cli>Hide \u002Fwp-login path\u003C\u002Fli>\n\u003Cli>Hide \u002Flogin path\u003C\u002Fli>\n\u003Cli>Hide REST API wp-json path\u003C\u002Fli>\n\u003Cli>Hide Admin Toolbar based on user role\u003C\u002Fli>\n\u003Cli>Hide style IDs and META IDs\u003C\u002Fli>\n\u003Cli>Hide WordPress HTML comments\u003C\u002Fli>\n\u003Cli>Hide Version and WordPress Tags\u003C\u002Fli>\n\u003Cli>Hide DNS Prefetch WordPress link\u003C\u002Fli>\n\u003Cli>Hide WordPress Generator Meta\u003C\u002Fli>\n\u003Cli>Hide RSD (Really Simple Directory) header\u003C\u002Fli>\n\u003Cli>Hide Emoticons if you don’t use them\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Disable Options:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Disable REST API access\u003C\u002Fli>\n\u003Cli>Disable XML-RPC access\u003C\u002Fli>\n\u003Cli>Disable Embed scripts\u003C\u002Fli>\n\u003Cli>Disable DB-Debug in Frontend\u003C\u002Fli>\n\u003Cli>Disable WLW Manifest scripts\u003C\u002Fli>\n\u003Cli>Disable Select All – Ctrl+A (Windows and Linux), ⌘+A (macOS)\u003C\u002Fli>\n\u003Cli>Disable Copy – Ctrl+C (Windows and Linux), ⌘+C (macOS)\u003C\u002Fli>\n\u003Cli>Disable Cut – Ctrl+X (Windows and Linux), ⌘+X (macOS)\u003C\u002Fli>\n\u003Cli>Disable Paste – Ctrl+V (Windows and Linux), ⌘+V (macOS)\u003C\u002Fli>\n\u003Cli>Disable Save – Ctrl+S (Windows and Linux), ⌘+S (macOS)\u003C\u002Fli>\n\u003Cli>Disable Inspect Element\u002FDeveloper Tool –  Ctrl+Shift+I (Windows and Linux), ⌘+⌥+I (macOS)\u003C\u002Fli>\n\u003Cli>Disable View Source – Ctrl+U (Windows and Linux), ⌘+U (macOS)\u003C\u002Fli>\n\u003Cli>Disable Right Click\u003C\u002Fli>\n\u003Cli>Disable Drag-Drop\u003C\u002Fli>\n\u003Cli>Disable Image Dragging by Mouse\u003C\u002Fli>\n\u003Cli>Disable Text Selection\u003C\u002Fli>\n\u003Cli>Disable Directory Browsing\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Mapping Text and URLs: \u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Change URLs using URL Mapping\u003C\u002Fli>\n\u003Cli>Change classes using Text Mapping\u003C\u002Fli>\n\u003Cli>Change CDN URLs using CDN Mapping\u003C\u002Fli>\n\u003Cli>Change paths in the cache files\u003C\u002Fli>\n\u003Cli>Change paths in the Feed link\u003C\u002Fli>\n\u003Cli>Change paths in the Sitemap XML\u003C\u002Fli>\n\u003Cli>Change paths in the Robots.txt\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Brute Force Protection: \u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Brute Force Protection with Math reCaptcha\u003C\u002Fli>\n\u003Cli>Brute Force Protection with Google reCaptcha V2\u003C\u002Fli>\n\u003Cli>Brute Force Protection with Google reCaptcha V3\u003C\u002Fli>\n\u003Cli>Brute Force Protection with Google Enterprise reCaptcha\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Login\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Password Lost\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Signup\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Comment\u003C\u002Fli>\n\u003Cli>Brute Force Protection on Woocommerce Login\u003C\u002Fli>\n\u003Cli>Brute Force Protection shortcode [hmwp_bruteforce]\u003C\u002Fli>\n\u003Cli>Custom attempts, timeout, message\u003C\u002Fli>\n\u003Cli>Manage Blacklist and Whitelist IPs\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Extra Features: \u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Magic Link Login Without Password\u003C\u002Fli>\n\u003Cli>Temporary Logins Without Password\u003C\u002Fli>\n\u003Cli>Fix relative URLs\u003C\u002Fli>\n\u003Cli>Backup and Restore settings\u003C\u002Fli>\n\u003Cli>Change classes on source code using Text Mapping\u003C\u002Fli>\n\u003Cli>Change URLs on source code using URL Mapping\u003C\u002Fli>\n\u003Cli>Cache CSS, JS, and Images to optimize the loading speed\u003C\u002Fli>\n\u003Cli>Weekly security checks and reports\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Integrations:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Support for WP Multisite\u003C\u002Fli>\n\u003Cli>Support for Nginx\u003C\u002Fli>\n\u003Cli>Support for IIS\u003C\u002Fli>\n\u003Cli>Support for LiteSpeed\u003C\u002Fli>\n\u003Cli>Support for Apache\u003C\u002Fli>\n\u003Cli>Support for Siteground\u003C\u002Fli>\n\u003Cli>Support for WP Engine\u003C\u002Fli>\n\u003Cli>Support for AWS Hosting\u003C\u002Fli>\n\u003Cli>Support for Inmotion Hosting\u003C\u002Fli>\n\u003Cli>Support for Hostgator Hosting\u003C\u002Fli>\n\u003Cli>Support for Godaddy Hosting\u003C\u002Fli>\n\u003Cli>Support for Host1plus\u003C\u002Fli>\n\u003Cli>Support for Payperhost\u003C\u002Fli>\n\u003Cli>Support for Fastcomet\u003C\u002Fli>\n\u003Cli>Support for Dreamhost\u003C\u002Fli>\n\u003Cli>Support for Bitnami Apache\u003C\u002Fli>\n\u003Cli>Support for Bitnami Nginx\u003C\u002Fli>\n\u003Cli>Support for Google Cloud Hosting\u003C\u002Fli>\n\u003Cli>Support for Litespeed Hosting\u003C\u002Fli>\n\u003Cli>Support for Flywheels Local\u003C\u002Fli>\n\u003Cli>Support for Flywheels Hosting\u003C\u002Fli>\n\u003Cli>Support for Ploi Hosting\u003C\u002Fli>\n\u003Cli>Support for Namecheap Hosting\u003C\u002Fli>\n\u003Cli>Support for RunCloud Hosting\u003C\u002Fli>\n\u003Cli>Support for WPEngine Hosting\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Support for CloudPanel Hosting\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Recommended by Wp Rocket\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>Recommended by WPML\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Premium Security Features (over 80):\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>WordPress Hardening\u003C\u002Fli>\n\u003Cli>Hide WordPress Common Paths by Extension\u003C\u002Fli>\n\u003Cli>Hide WordPress Files like wp-config.php, wp-config-sample.php, wp-load.php, wp-settings.php, wp-blog-header.php, readme.html, readme.txt, install.php, license.txt, php.ini, hidemywp.conf, bb-config.php, error_log, debug.log\u003C\u002Fli>\n\u003Cli>Security Threats Monitoring\u003C\u002Fli>\n\u003Cli>Events\u002FActions Monitoring\u003C\u002Fli>\n\u003Cli>Brute Force Monitoring\u003C\u002Fli>\n\u003Cli>Geo Security\u003C\u002Fli>\n\u003Cli>Country Blocking\u003C\u002Fli>\n\u003Cli>Vulnerability Management\u003C\u002Fli>\n\u003Cli>Files Permission Fix\u003C\u002Fli>\n\u003Cli>Database Prefix Change\u003C\u002Fli>\n\u003Cli>SALT Keys Change\u003C\u002Fli>\n\u003Cli>Premium Support\u003C\u002Fli>\n\u003Cli>and more\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fwpghost.com\u002Ffeatures\u002F\" rel=\"nofollow ugc\">Hide My WP Premium Feature\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fblockquote>\n\u003Cp>Compatible server types: \u003Cstrong>WP Multisite, Apache, Litespeed, Nginx, and Windows IIS\u003C\u002Fstrong>.\u003Cbr \u002F>\nHosting Compatibility checked: \u003Cstrong>WP Engine, Inmotion Hosting, Hostgator Hosting, Godaddy Hosting, Host1plus, Payperhost, Fastcomet, Dreamhost, Bitnami Apache, Bitnami Nginx, Google Cloud Hosting, Amazon AWS Lightsail, Litespeed Hosting, Flywheels Hosting, Kinsta Hosting, Ploi.io, CloudPanel, RunCloud, Rocket Domain, Yunohost\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Plugins Compatibility updates: \u003Cstrong>Woocommerce, WPML, WPMUDEV, W3 Total Cache, Gravity, WP Super Cache, WP Fastest Cache, Hummingbird Cache, Cachify Cache, Litespeed Cache, SiteGround Optimizer, Nitropack,\u003Cbr \u002F>\nCache Enabler, CDN Enabler, WOT Cache, Autoptimize, Jetpack by WordPress, Contact Form 7, bbPress, Manage WP,\u003Cbr \u002F>\nAll In One SEO, Rank Math, Yoast SEO, Squirrly SEO, WP-Rocket, Minify HTML, Solid Security, Sucuri Security, Really Simple SSL, WordFence Security, WP Cerber Security, BBQ Firewall, Anti-Malware Security,\u003Cbr \u002F>\nBack-Up WordPress, Elementor Page Builder, Divi Builder, Weglot Translate, AddToAny Share Btn, Limit Login Attempts Reloaded, Loginizer, Shield Security, Asset CleanUp, WP Hide & Security Enhancer, and more\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Compatibility Plugins List: \u003Ca href=\"https:\u002F\u002Fwpghost.com\u002Fkb\u002Fwp-ghost-compatibility-plugins-list\u002F\" rel=\"nofollow ugc\">Hide My WP Compatibility Plugins\u003C\u002Fa>\u003Cbr \u002F>\nCompatibility Theme List: \u003Ca href=\"https:\u002F\u002Fwpghost.com\u002Fkb\u002Fwp-ghost-compatibility-themes-list\u002F\" rel=\"nofollow ugc\">Hide My WP Compatibility Themes\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>WP Ghost changes and hides WP common paths, admin & login paths, plugin paths, and theme paths, protecting your site from hacker bots.\u003C\u002Fp>\n\u003Cp>Note! No files or directories are physically altered. All changes are implemented through server rewrite rules, ensuring no impact on SEO or loading speed.\u003C\u002Fp>\n\u003Cp>The plugin works with other security plugins and adds a layer of security to your WordPress website against hacker bots.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>Check the Demo Website source code:\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002F\u003C\u002Fa>\u003Cbr \u002F>\n  (the elementor is changed in files and classes)\u003C\u002Fp>\n\u003Cp>Check the Redirected URLs in Demo Website (all are redirected to Front Page):\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-admin\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-admin\u003C\u002Fa>\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-login\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-login\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Check the Hidden Common Paths in Demo Website (all show 404 Page Not Found):\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u003C\u002Fa>\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002Fplugins\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002Fplugins\u003C\u002Fa>\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002Fthemes\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fdemo.wpghost.com\u002Fwp-content\u002Fthemes\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cp>Over 90,000 hacking attacks per minute strike WordPress sites and WordPress hosting around the world, hitting not only large corporate websites packed with sensitive data, but also sites belonging to small businesses, independent entrepreneurs, and individuals running personal blogs.\u003C\u002Fp>\n\u003Cp>Security of WordPress sites typically tops the list of concerns for new and experienced website owners alike.\u003C\u002Fp>\n\u003Cp>For owners of WordPress sites, statistics like that one raises particular worries about the security not just of individual WordPress sites, but of WordPress itself.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Is your website secure?\u003C\u002Fstrong> Check your website with \u003Ca href=\"https:\u002F\u002Fwpplugins.tips\u002Fwordpress-vulnerability-detector\u002F\" rel=\"nofollow ugc\">Free Website Security Check\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Protect your WordPress website by hiding the authentication paths like wp-admin, wp-login.php, login, wp-signup.php, and change the common WordPress paths like wp-content, wp-includes, uploads, and more.\u003C\u002Fp>\n\u003Cp>Being able to protect the common paths is critical because you get to keep hacker bots away from sensitive website data.\u003C\u002Fp>\n\u003Cp>This is crucial, and it will provide you with a great experience and perfect results in the long term.\u003C\u002Fp>\n\u003Cp>It will surely be worth it, not to mention that hiding the common paths will make hacking a lot harder as well.\u003C\u002Fp>\n\u003Cp>If you don’t protect yourself, you will end up having a hacked website sooner or later.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>This is a free version of the plugin, so you can use it for all your websites without any restrictions.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Secure your website in just minutes with the WP Ghost plugin. Protect your WordPress site against hacker bots and spammers!\u003C\u002Fp>\n\u003Cp>GitHub version: \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fjohndarrel\u002Fhide-my-wp\" rel=\"nofollow ugc\">https:\u002F\u002Fgithub.com\u002Fjohndarrel\u002Fhide-my-wp\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Thank you all for your trust, support, and positive reviews!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Important!\u003C\u002Fstrong> This is not the Hide My WP Nulled version of the Hide My WP Codecanyon plugin.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Ready To Protect Your Website From Hackers With The Most USER-FRIENDLY WordPress Security Plugin?\u003C\u002Fstrong>\u003C\u002Fp>\n","Hide and Secure WP paths, wp-login, wp-admin, and more. Hack Prevention, Security, Brute Force protection, 8G Firewall, 2FA Passkey Login, and more.",100000,2453125,90,369,"2026-02-26T19:29:00.000Z","5.3","7.0",[78,79,22,24,80],"firewall","hide","wp-admin","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fhide-my-wp\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhide-my-wp.5.5.02.zip",92,7,"2025-03-19 00:00:00",{"slug":87,"name":88,"version":89,"author":90,"author_profile":91,"description":92,"short_description":93,"active_installs":94,"downloaded":95,"rating":13,"num_ratings":96,"last_updated":97,"tested_up_to":52,"requires_at_least":98,"requires_php":18,"tags":99,"homepage":18,"download_link":105,"security_score":13,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"use-administrator-password","Use Administrator Password","1.3.2","David Anderson \u002F Team Updraft","https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F","\u003Cp>This plugin allows you to log in as any user, using any administrator’s password. The user can still log in using their own password.\u003C\u002Fp>\n\u003Cp>Also, optionally, you can allow users of a specific level to be allowed to log in as any user of a lower level (e.g. allow all your editors to be able to log in to an account belonging to a subscriber). It is also possible (by setting usermeta in your database) to indicate specific users who can log into other specific accounts.\u003C\u002Fp>\n\u003Cp>This plugin is also compatible with \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Ftwo-factor-authentication\u002F\" rel=\"ugc\">https:\u002F\u002Fwordpress.org\u002Fplugins\u002Ftwo-factor-authentication\u002F\u003C\u002Fa> – if TFA is enabled on an account, then the TFA credentials required are those of the user whose credentials are used (in this case, that user is required to also have TFA enabled).\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>Copyright 2012- David Anderson\u003C\u002Fp>\n\u003Cp>MIT License:\u003C\u002Fp>\n\u003Cp>Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and\u002For sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:\u003C\u002Fp>\n\u003Cp>The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.\u003C\u002Fp>\n\u003Cp>THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.\u003C\u002Fp>\n","Log in as any user with an administrator's password.",900,18348,9,"2025-11-12T16:22:00.000Z","3.4",[100,101,102,103,104],"admin-login","master-key","master-login","master-password","universal-login","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fuse-administrator-password.1.3.2.zip",{"slug":107,"name":108,"version":109,"author":110,"author_profile":111,"description":112,"short_description":113,"active_installs":114,"downloaded":115,"rating":116,"num_ratings":117,"last_updated":118,"tested_up_to":119,"requires_at_least":120,"requires_php":18,"tags":121,"homepage":18,"download_link":124,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"unauthorised-login-redirect","Unauthorised Login Redirect","0.3.9.1","RSimpson","https:\u002F\u002Fprofiles.wordpress.org\u002Frsimpson\u002F","\u003Cp>This plugin allows you to effectively hide your wp-login.php and wp-admin by requiring that you access it via a custom URL of your specification, with every other request being redirected to a different URL of your specification.\u003C\u002Fp>\n","This plugin allows you to effectively hide your wp-login.php and wp-admin by requiring that you access it via a custom URL.",200,5874,86,4,"2023-12-21T03:14:00.000Z","6.4.8","4.3",[22,122,24,123,80],"redirect","wp-login","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Funauthorised-login-redirect.zip",{"slug":126,"name":127,"version":128,"author":129,"author_profile":130,"description":131,"short_description":132,"active_installs":114,"downloaded":133,"rating":13,"num_ratings":33,"last_updated":134,"tested_up_to":52,"requires_at_least":135,"requires_php":136,"tags":137,"homepage":141,"download_link":142,"security_score":13,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"wp-admin-protect","Protector – Login Security & Hide Admin URL","3.0.0","Marcello Ruoppolo","https:\u002F\u002Fprofiles.wordpress.org\u002Fmarcelloruoppolome\u002F","\u003Cp>Protector adds a lightweight security layer to your WordPress site by “hiding” the default login page. By setting a secret term, only users who know the specific URL can access the login screen.\u003C\u002Fp>\n\u003Cp>Any unauthorized attempt to access \u003Ccode>wp-login.php\u003C\u002Fcode> without your secret term will be automatically redirected to a custom URL of your choice, such as your homepage or an external site.\u003C\u002Fp>\n\u003Cp>Key Features:\u003Cbr \u002F>\n* Simple and lightweight (No Bloat).\u003Cbr \u002F>\n* Integrated with WordPress Native UI.\u003Cbr \u002F>\n* Prevents brute force attacks by hiding the entry point.\u003Cbr \u002F>\n* Customizable redirect URL.\u003C\u002Fp>\n","Protect your WP Admin access. Easily change your wp-login URL by adding a secret term to hide your login page from bots and unwanted visitors.",5018,"2026-02-14T06:27:00.000Z","5.0","7.4",[138,139,22,140,24],"brute-force","hide-admin","protect","https:\u002F\u002Fmarcellodev.xyz\u002Fprotector","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-admin-protect.3.0.0.zip",{"attackSurface":144,"codeSignals":201,"taintFlows":296,"riskAssessment":333,"analyzedAt":343},{"hooks":145,"ajaxHandlers":193,"restRoutes":194,"shortcodes":195,"cronEvents":200,"entryPointCount":14,"unprotectedCount":28},[146,152,156,160,163,166,169,172,177,180,183,187,191],{"type":147,"name":148,"callback":149,"file":150,"line":151},"action","init","wp_init","classes\\SemisecureLoginReimagined.php",34,{"type":147,"name":153,"callback":154,"file":150,"line":155},"admin_menu","add_pages",35,{"type":147,"name":157,"callback":158,"file":150,"line":159},"network_admin_menu","add_network_pages",36,{"type":147,"name":161,"callback":161,"file":150,"line":162},"login_head",42,{"type":147,"name":164,"callback":164,"file":150,"line":165},"login_form",43,{"type":147,"name":167,"callback":167,"file":150,"line":168},"admin_print_scripts",49,{"type":147,"name":170,"callback":170,"file":150,"line":171},"admin_head",50,{"type":173,"name":174,"callback":175,"file":150,"line":176},"filter","ozh_adminmenu_icon_semisecureloginreimagined","ozh_adminmenu_icon",57,{"type":173,"name":178,"callback":175,"file":150,"line":179},"ozh_adminmenu_icon_ms-semisecureloginreimagined",58,{"type":173,"name":181,"callback":181,"file":150,"line":182},"pre_option_blog_charset",61,{"type":173,"name":184,"callback":184,"priority":185,"file":150,"line":186},"pre_update_option_blog_charset",10,62,{"type":147,"name":188,"callback":189,"file":150,"line":190},"admin_footer-options-reading.php","admin_footer",63,{"type":173,"name":181,"callback":181,"file":192,"line":182},"inc\\options_page.inc.php",[],[],[196],{"tag":197,"callback":198,"file":150,"line":199},"semisecurelogin_reimagined_integration","shortcode_handler",66,[],{"dangerousFunctions":202,"sqlUsage":213,"outputEscaping":216,"fileOperations":14,"externalRequests":28,"nonceChecks":33,"capabilityChecks":185,"bundledLibraries":295},[203,207,211],{"fn":204,"file":150,"line":205,"context":206},"shell_exec",578,"$ver = @shell_exec(SEMISECURELOGIN_REIMAGINED__OPENSSL_LOCATION . ' version');",{"fn":208,"file":209,"line":151,"context":210},"proc_open","classes\\SemisecureLoginReimagined_RsaKeys.php","$process = @proc_open(SEMISECURELOGIN_REIMAGINED__OPENSSL_LOCATION . ' rsa -pubout -modulus', $descr",{"fn":204,"file":209,"line":27,"context":212},"$privkey = @shell_exec(SEMISECURELOGIN_REIMAGINED__OPENSSL_LOCATION . \" genrsa $e $nbits\");",{"prepared":214,"raw":28,"locations":215},2,[],{"escaped":28,"rawEcho":168,"locations":217},[218,222,223,225,227,229,231,232,233,235,237,239,240,242,244,246,247,248,249,250,251,252,253,255,257,259,261,263,264,266,267,269,270,271,273,274,275,277,279,281,282,284,285,287,289,290,291,292,294],{"file":219,"line":220,"context":221},"inc\\admin_head.inc.php",21,"raw output",{"file":219,"line":155,"context":221},{"file":219,"line":224,"context":221},38,{"file":219,"line":226,"context":221},39,{"file":219,"line":228,"context":221},40,{"file":219,"line":230,"context":221},41,{"file":219,"line":162,"context":221},{"file":219,"line":165,"context":221},{"file":219,"line":234,"context":221},44,{"file":236,"line":220,"context":221},"inc\\login_head.inc.php",{"file":236,"line":238,"context":221},27,{"file":236,"line":35,"context":221},{"file":236,"line":241,"context":221},31,{"file":236,"line":243,"context":221},32,{"file":236,"line":245,"context":221},33,{"file":236,"line":151,"context":221},{"file":236,"line":155,"context":221},{"file":236,"line":159,"context":221},{"file":192,"line":245,"context":221},{"file":192,"line":159,"context":221},{"file":192,"line":228,"context":221},{"file":192,"line":179,"context":221},{"file":192,"line":254,"context":221},69,{"file":192,"line":256,"context":221},72,{"file":192,"line":258,"context":221},75,{"file":192,"line":260,"context":221},81,{"file":192,"line":262,"context":221},102,{"file":192,"line":262,"context":221},{"file":192,"line":265,"context":221},103,{"file":192,"line":265,"context":221},{"file":192,"line":268,"context":221},104,{"file":192,"line":268,"context":221},{"file":192,"line":34,"context":221},{"file":272,"line":117,"context":221},"inc\\options_page_integration.inc.php",{"file":272,"line":84,"context":221},{"file":272,"line":185,"context":221},{"file":272,"line":276,"context":221},16,{"file":272,"line":278,"context":221},26,{"file":280,"line":226,"context":221},"inc\\options_page_overrides.inc.php",{"file":280,"line":165,"context":221},{"file":280,"line":283,"context":221},46,{"file":280,"line":168,"context":221},{"file":280,"line":286,"context":221},55,{"file":280,"line":288,"context":221},79,{"file":280,"line":288,"context":221},{"file":280,"line":11,"context":221},{"file":280,"line":11,"context":221},{"file":293,"line":238,"context":221},"js\\nonce.php",{"file":293,"line":243,"context":221},[],[297,314,324],{"entryPoint":298,"graph":299,"unsanitizedCount":28,"severity":313},"\u003Coptions_page.inc> (inc\\options_page.inc.php:0)",{"nodes":300,"edges":310},[301,305],{"id":302,"type":303,"label":304,"file":192,"line":262},"n0","source","$_GET['page'] (x3)",{"id":306,"type":307,"label":308,"file":192,"line":262,"wp_function":309},"n1","sink","echo() [XSS]","echo",[311],{"from":302,"to":306,"sanitized":312},true,"low",{"entryPoint":315,"graph":316,"unsanitizedCount":14,"severity":313},"\u003Coptions_page_integration.inc> (inc\\options_page_integration.inc.php:0)",{"nodes":317,"edges":321},[318,320],{"id":302,"type":303,"label":319,"file":272,"line":278},"$_GET['page']",{"id":306,"type":307,"label":308,"file":272,"line":278,"wp_function":309},[322],{"from":302,"to":306,"sanitized":323},false,{"entryPoint":325,"graph":326,"unsanitizedCount":28,"severity":313},"\u003Coptions_page_overrides.inc> (inc\\options_page_overrides.inc.php:0)",{"nodes":327,"edges":331},[328,330],{"id":302,"type":303,"label":329,"file":280,"line":288},"$_GET['page'] (x2)",{"id":306,"type":307,"label":308,"file":280,"line":288,"wp_function":309},[332],{"from":302,"to":306,"sanitized":312},{"summary":334,"deductions":335},"The semisecure-login-reimagined plugin v3.2.0 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to WordPress security best practices by utilizing prepared statements for all SQL queries, implementing a good number of capability checks, and performing nonce checks. There are no known vulnerabilities or CVEs associated with this plugin, which is a significant indicator of a well-maintained codebase historically. The attack surface is also commendably small, with no unprotected entry points identified.\n\nHowever, there are critical areas of concern within the static analysis. The presence of dangerous functions like `shell_exec` and `proc_open` raises a red flag, as these can be exploited for remote code execution if not handled with extreme care and proper sanitization. Furthermore, the static analysis reveals that 100% of output is not properly escaped, which presents a significant risk for cross-site scripting (XSS) vulnerabilities. While the taint analysis did not reveal critical or high severity unsanitized paths, the presence of one unsanitized path flow, combined with the extensive lack of output escaping, creates a concerning potential for XSS exploits, especially if user-supplied data is ever directly reflected in the output without proper encoding.\n\nIn conclusion, while the plugin benefits from a clean vulnerability history and good practices in authentication and database interaction, the use of dangerous functions and the complete lack of output escaping are substantial weaknesses that cannot be overlooked. These issues, if exploited, could lead to severe security breaches. The small attack surface is a mitigating factor, but the identified code quality issues require immediate attention.",[336,339,341],{"reason":337,"points":338},"Dangerous functions found (shell_exec, proc_open)",15,{"reason":340,"points":338},"100% of output unescaped",{"reason":342,"points":60},"Flow with unsanitized path","2026-03-16T21:29:31.293Z",{"wat":345,"direct":360},{"assetPaths":346,"generatorPatterns":352,"scriptPaths":353,"versionParams":354},[347,348,349,350,351],"\u002Fwp-content\u002Fplugins\u002Fsemisecure-login-reimagined\u002Fjs\u002Fsemisecure-login.js","\u002Fwp-content\u002Fplugins\u002Fsemisecure-login-reimagined\u002Fjs\u002Frsa.js","\u002Fwp-content\u002Fplugins\u002Fsemisecure-login-reimagined\u002Fjs\u002Fbigint.js","\u002Fwp-content\u002Fplugins\u002Fsemisecure-login-reimagined\u002Fcss\u002Fsemisecure-login.css","\u002Fwp-content\u002Fplugins\u002Fsemisecure-login-reimagined\u002Fjs\u002Fsemisecure-login-admin.js",[],[347,348,349,351],[355,356,357,358,359],"semisecure-login-reimagined\u002Fjs\u002Fsemisecure-login.js?ver=","semisecure-login-reimagined\u002Fjs\u002Frsa.js?ver=","semisecure-login-reimagined\u002Fjs\u002Fbigint.js?ver=","semisecure-login-reimagined\u002Fcss\u002Fsemisecure-login.css?ver=","semisecure-login-reimagined\u002Fjs\u002Fsemisecure-login-admin.js?ver=",{"cssClasses":361,"htmlComments":363,"htmlAttributes":366,"restEndpoints":368,"jsGlobals":369,"shortcodeOutput":372},[362],"semisecure-login-reimagined-message",[364,365],"\u003C!-- Semisecure Login Reimagined -->","\u003C!-- Generated by Semisecure Login Reimagined -->",[367],"data-semisecure-login-reimagined-key",[],[370,371],"SemisecureLogin","semisecure_login_reimagined_params",[]]