[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fYEBf2lvF7JNJNzj-k1TQ3vMzxRAV5ADFzLIP4fsbr6w":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":18,"download_link":23,"security_score":24,"vuln_count":11,"unpatched_count":11,"last_vuln_date":25,"fetched_at":26,"vulnerabilities":27,"developer":28,"crawl_stats":25,"alternatives":32,"analysis":33,"fingerprints":59},"send-password-instead-of-email-by-nexgi-com","Send Password Instead of Email by nexgi.com","1.0.0","anup594","https:\u002F\u002Fprofiles.wordpress.org\u002Fanup594\u002F","\u003Cp>This plugin will generate a random password and sends to their email.\u003C\u002Fp>\n\u003Ch3>Problem Statement\u003C\u002Fh3>\n\u003Cp>When we create a new user in wordpress. WordPress send a link to added user’s email. There is no provision to send password by default.\u003C\u002Fp>\n\u003Ch3>Solution Statement\u003C\u002Fh3>\n\u003Cp>This plugin will generate a random password and sends to their email.\u003C\u002Fp>\n\u003Ch3>What is not possible\u003C\u002Fh3>\n\u003Cp>If you want to send your added password on user’s email. This is not possible because wordpress use MD5 (one way encryption technique).\u003C\u002Fp>\n\u003Cp>So nobody can decrypt that and send your added password while you have created user.\u003C\u002Fp>\n\u003Ch3>How to use Send Password Instead of Email WordPress Plugin\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Download this plugin\u003C\u002Fli>\n\u003Cli>upload in plugin directory\u003C\u002Fli>\n\u003Cli>activate it\u003C\u002Fli>\n\u003Cli>nothing else is required to do.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>How to use Send Password Instead of Email WordPress Plugin\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Download this plugin\u003C\u002Fli>\n\u003Cli>Upload in plugin directory\u003C\u002Fli>\n\u003Cli>Activate it\u003C\u002Fli>\n\u003Cli>Nothing else is required to do.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Send Password Instead of Email by nexgi.com\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Reduce efforts of new user to generate password\u003C\u002Fli>\n\u003Cli>Cleaner look and feel of welcome email\u003C\u002Fli>\n\u003Cli>Completely 101% free\u003C\u002Fli>\n\u003Cli>Very light weight, no extra code added\u003C\u002Fli>\n\u003Cli>Zero setup efforts, Just install and activate\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Instant support\u003C\u002Fh4>\n\u003Cp>I’m Anup, A full stack PHP Developer based in Delhi, India. I love open source community, if you are stuck anywhere while using this plugin or wants some customisation, please free to connect on me on instagram @ianup.nexgi\u003C\u002Fp>\n\u003Ch3>About me\u003C\u002Fh3>\n\u003Cp>I’m Anup, A Full stack PHP Developer based in Delhi, India. I’m comfortable with any CMS & Framework based on PHP or LAMP stack.\u003C\u002Fp>\n\u003Cp>Few Top Framework & CMS\u003Cbr \u002F>\n– Laravel\u003Cbr \u002F>\n– CodeIgniter\u003Cbr \u002F>\n– WordPress\u003Cbr \u002F>\n– Drupal\u003Cbr \u002F>\n– Zend\u003Cbr \u002F>\n– CakePHP\u003Cbr \u002F>\n– Opencart\u003C\u002Fp>\n\u003Ch3>About NexGen Innovators! Where I Work!\u003C\u002Fh3>\n\u003Cp>I work in NexGen Innovators as Full Stack PHP Developer & Team Lead. \u003Ca href=\"https:\u002F\u002Fwww.nexgi.com\" rel=\"nofollow ugc\">NexGen Innovators\u003C\u002Fa> is one of the best \u003Ca href=\"https:\u002F\u002Fwww.nexgi.com\u002Fdevelopment\u002F\" rel=\"nofollow ugc\">Web Design & Development Company in India\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>NexGen Innovators helps to provide quality services under one roof that needs to scale. e.g\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwww.nexgi.com\u002Fdesign\u002F\" rel=\"nofollow ugc\">UI & UX Designing\u003C\u002Fa>\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwww.nexgi.com\u002Fdevelopment\u002F\" rel=\"nofollow ugc\">Web & Mobile App Development\u003C\u002Fa>\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwww.nexgi.com\u002Fmarketing\u002F\" rel=\"nofollow ugc\">Digital Marketing\u003C\u002Fa>\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwww.nexgi.com\u002Fsecurity-and-maintenance\u002F\" rel=\"nofollow ugc\">Security and Maintenance\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>To know more visit \u003Ca href=\"https:\u002F\u002Fwww.nexgi.com\u002Fabout\u002F\" rel=\"nofollow ugc\">About NexGen Innovators\u003C\u002Fa>\u003C\u002Fp>\n","This plugin will generate a random password and sends to their email.",0,4142,100,1,"2021-12-21T18:50:00.000Z","5.8.13","4.0","",[20,21,22],"send-pass-in-welcome-email","send-password-on-new-user-registration","stop-sending-reset-link-on-new-user","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsend-password-instead-of-email-by-nexgi-com.1.0.0.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":14,"total_installs":11,"avg_security_score":24,"avg_patch_time_days":29,"trust_score":30,"computed_at":31},30,84,"2026-04-04T10:43:22.415Z",[],{"attackSurface":34,"codeSignals":47,"taintFlows":54,"riskAssessment":55,"analyzedAt":58},{"hooks":35,"ajaxHandlers":43,"restRoutes":44,"shortcodes":45,"cronEvents":46,"entryPointCount":11,"unprotectedCount":11},[36],{"type":37,"name":38,"callback":39,"priority":40,"file":41,"line":42},"filter","wp_new_user_notification_email","SPNEXGI_custom_wp_new_user_notification_email",100000,"index.php",14,[],[],[],[],{"dangerousFunctions":48,"sqlUsage":49,"outputEscaping":51,"fileOperations":11,"externalRequests":11,"nonceChecks":11,"capabilityChecks":11,"bundledLibraries":53},[],{"prepared":11,"raw":11,"locations":50},[],{"escaped":11,"rawEcho":11,"locations":52},[],[],[],{"summary":56,"deductions":57},"The static analysis of the \"send-password-instead-of-email-by-nexgi-com\" plugin v1.0.0 reveals a remarkably clean codebase with no identified vulnerabilities. The absence of dangerous functions, SQL injection risks (all queries use prepared statements), and unescaped output signals strong adherence to secure coding practices.  Furthermore, the lack of file operations and external HTTP requests minimizes potential attack vectors. The plugin also appears to have no known CVEs, indicating a history of security robustness.",[],"2026-03-17T06:35:44.853Z",{"wat":60,"direct":65},{"assetPaths":61,"generatorPatterns":62,"scriptPaths":63,"versionParams":64},[],[],[],[],{"cssClasses":66,"htmlComments":67,"htmlAttributes":68,"restEndpoints":69,"jsGlobals":70,"shortcodeOutput":71},[],[],[],[],[],[]]