[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fClYeV9C9I26p9blb7fqDp_B_I5gs1JqZHZs6jlWSiHg":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":20,"download_link":21,"security_score":13,"vuln_count":22,"unpatched_count":22,"last_vuln_date":23,"fetched_at":24,"vulnerabilities":25,"developer":26,"crawl_stats":23,"alternatives":33,"analysis":34,"fingerprints":62},"show-user-avatar","Show user avatar","1.0","Benjamin Hagh Parast","https:\u002F\u002Fprofiles.wordpress.org\u002Fhaghs\u002F","\u003Cp>If you want to display the current user avatar, you can use the following shortcode [avatar]\u003C\u002Fp>\n","Add the shortcode [avatar] in the Header, footer ore on any post and page. With this plugin you can display the logged in user avatar.",10,941,100,2,"2026-01-09T18:13:00.000Z","6.9.4","6.9","8.0",[4],"https:\u002F\u002Fwordtune.me","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fshow-user-avatar.1.0.zip",0,null,"2026-03-15T15:16:48.613Z",[],{"slug":27,"display_name":7,"profile_url":8,"plugin_count":28,"total_installs":29,"avg_security_score":13,"avg_patch_time_days":30,"trust_score":31,"computed_at":32},"haghs",18,330,30,94,"2026-04-04T18:29:24.794Z",[],{"attackSurface":35,"codeSignals":46,"taintFlows":53,"riskAssessment":54,"analyzedAt":61},{"hooks":36,"ajaxHandlers":37,"restRoutes":38,"shortcodes":39,"cronEvents":44,"entryPointCount":45,"unprotectedCount":22},[],[],[],[40],{"tag":41,"callback":42,"file":43,"line":28},"avatar","show_user_avatar","Show user avatar.php",[],1,{"dangerousFunctions":47,"sqlUsage":48,"outputEscaping":50,"fileOperations":22,"externalRequests":22,"nonceChecks":22,"capabilityChecks":22,"bundledLibraries":52},[],{"prepared":22,"raw":22,"locations":49},[],{"escaped":14,"rawEcho":22,"locations":51},[],[],[],{"summary":55,"deductions":56},"The \"show-user-avatar\" plugin v1.0 exhibits a generally positive security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and unescaped output are significant strengths. Furthermore, the lack of file operations and external HTTP requests reduces the potential for common attack vectors. The plugin also appears to have a limited attack surface, with only one shortcode and no identified AJAX handlers or REST API routes that are not protected by authentication. The vulnerability history is also clean, with no recorded CVEs, which suggests a history of secure development or successful patching. However, a key concern is the complete lack of nonce checks and capability checks. While the current entry points are limited and appear to be protected implicitly, this absence represents a potential weakness. If new functionality is added or existing functionality evolves to handle user-supplied data in ways not currently apparent, the lack of nonces and capability checks could lead to privilege escalation or cross-site request forgery vulnerabilities. This is a critical area for improvement to ensure long-term security resilience.",[57,59],{"reason":58,"points":11},"Missing nonce checks",{"reason":60,"points":11},"Missing capability checks","2026-03-17T01:09:57.867Z",{"wat":63,"direct":68},{"assetPaths":64,"generatorPatterns":65,"scriptPaths":66,"versionParams":67},[],[],[],[],{"cssClasses":69,"htmlComments":70,"htmlAttributes":71,"restEndpoints":72,"jsGlobals":73,"shortcodeOutput":74},[],[],[],[],[],[]]