[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fWAAgTFEWyxn5jGI-HjbpaDg9-bGs-uLsQ6qmqgvr2dU":3,"$f8DbKS-USzfeHa9wKQt34WBCKJNV2c_RwZBAXdHcv6us":271,"$fnzZkhdCRjJpLVFF0hmFpaDO6c4rNdvFFdIkEjnQRMAs":275},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":18,"download_link":24,"security_score":25,"vuln_count":26,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29,"discovery_status":30,"vulnerabilities":31,"developer":50,"crawl_stats":37,"alternatives":57,"analysis":155,"fingerprints":250},"username-updater","Easy Username Updater","1.0.6","Yogesh Pant","https:\u002F\u002Fprofiles.wordpress.org\u002Fyogeshpant\u002F","\u003Cp>Easy Username updater is a plugin which allows administrators to change usernames on their site. It provide list of users with their email address,username and role. It changes display name as well.\u003C\u002Fp>\n\u003Cp>This plugin also do following:\u003C\u002Fp>\n\u003Col>\n\u003Cli>Search the user by username, email address, or role.\u003C\u002Fli>\n\u003Cli>Send the updated username to user by email.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>How to install?\u003C\u002Fp>\n\u003Col>\n\u003Cli>Unzip the downloaded ‘username-updater.zip’ file\u003C\u002Fli>\n\u003Cli>Upload the ‘username-updater’ folder to ‘\u002Fwp-content\u002Fplugins’ directory of your WordPress installation\u003C\u002Fli>\n\u003Cli>Activate the plugin via the WordPress Plugins page\u003C\u002Fli>\n\u003Cli>A new submenu will automatically create on users menu\u003C\u002Fli>\n\u003C\u002Fol>\n","A plugin to change registered username and display name.",10000,127771,84,38,"2026-04-03T05:45:00.000Z","6.9.4","4.0","",[20,21,4,22,23],"change-username","easy-username-updater","wordpress-username-changer","wordpress-username-updater","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fusername-updater.zip",99,1,0,"2022-07-12 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[32],{"id":33,"url_slug":34,"title":35,"description":36,"plugin_slug":4,"theme_slug":37,"affected_versions":38,"patched_in_version":39,"severity":40,"cvss_score":41,"cvss_vector":42,"vuln_type":43,"published_date":28,"updated_date":44,"references":45,"days_to_patch":47,"patch_diff_files":48,"patch_trac_url":37,"research_status":37,"research_verified":49,"research_rounds_completed":27,"research_plan":37,"research_summary":37,"research_vulnerable_code":37,"research_fix_diff":37,"research_exploit_outline":37,"research_model_used":37,"research_started_at":37,"research_completed_at":37,"research_error":37,"poc_status":37,"poc_video_id":37,"poc_summary":37,"poc_steps":37,"poc_tested_at":37,"poc_wp_version":37,"poc_php_version":37,"poc_playwright_script":37,"poc_exploit_code":37,"poc_has_trace":49,"poc_model_used":37,"poc_verification_depth":37},"CVE-2022-2355","easy-username-updater-cross-site-request-forgery-to-username-change","Easy Username Updater \u003C= 1.0.3 - Cross-Site Request Forgery to Username Change","The Easy Username Updater plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.3. This is due to missing nonce validation on the eup_user_update function. This makes it possible for unauthenticated attackers to change arbitrary usernames via forged request granted they can trick a site administrator into performing an action such as clicking on a link.",null,"\u003C=1.0.3","1.0.4","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Cross-Site Request Forgery (CSRF)","2024-01-22 19:56:02",[46],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F9e3e996b-6988-42ab-9766-ddc070243c1f?source=api-prod",560,[],false,{"slug":51,"display_name":7,"profile_url":8,"plugin_count":52,"total_installs":53,"avg_security_score":54,"avg_patch_time_days":47,"trust_score":55,"computed_at":56},"yogeshpant",2,10080,92,73,"2026-05-20T04:12:45.429Z",[58,78,99,117,138],{"slug":20,"name":59,"version":60,"author":61,"author_profile":62,"description":63,"short_description":64,"active_installs":65,"downloaded":66,"rating":67,"num_ratings":68,"last_updated":69,"tested_up_to":70,"requires_at_least":71,"requires_php":72,"tags":73,"homepage":18,"download_link":77,"security_score":54,"vuln_count":27,"unpatched_count":27,"last_vuln_date":37,"fetched_at":29},"Change Username","1.0.2","Danny van Kooten","https:\u002F\u002Fprofiles.wordpress.org\u002Fdvankooten\u002F","\u003Cp>Change usernames of your WordPress users effectively.\u003C\u002Fp>\n\u003Ch3>Change Username\u003C\u002Fh3>\n\u003Cp>This plugin allows you to change usernames of your WordPress users in an effective and safe way.\u003C\u002Fp>\n\u003Cp>By default, WordPress itself does not allow usernames to be changed. The other plugins for changing usernames do not scale all that well for sites with a large number of users.\u003C\u002Fp>\n\u003Cp>This plugin takes a different approach by simply enhancing the default “edit user” page and then processing the username change over AJAX, resulting in a much faster and user-friendly experience.\u003C\u002Fp>\n\u003Ch3>Requirements\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>PHP version 7.2 or higher\u003C\u002Fli>\n\u003Cli>WordPress version 4.1 or higher\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>About the author\u003C\u002Fh3>\n\u003Cp>Danny van Kooten has been developing plugins for WordPress since version 3.0, all the way back in 2010. Read more about him on \u003Ca href=\"https:\u002F\u002Fwww.dannyvankooten.com\u002F\" rel=\"nofollow ugc\">his personal website\u003C\u002Fa> or have a look at his various other \u003Ca href=\"https:\u002F\u002Fdannyvankooten.com\u002Fwordpress-plugins\u002F\" rel=\"nofollow ugc\">WordPress plugins\u003C\u002Fa>.\u003C\u002Fp>\n","Change usernames of your WordPress users effectively.",4000,27332,88,5,"2024-10-04T11:54:00.000Z","6.6.5","4.1","7.2",[74,20,75,76],"change-login","login","username","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fchange-username.1.0.2.zip",{"slug":79,"name":80,"version":81,"author":82,"author_profile":83,"description":84,"short_description":85,"active_installs":86,"downloaded":87,"rating":88,"num_ratings":68,"last_updated":89,"tested_up_to":16,"requires_at_least":90,"requires_php":91,"tags":92,"homepage":96,"download_link":97,"security_score":25,"vuln_count":52,"unpatched_count":27,"last_vuln_date":98,"fetched_at":29},"wp-edit-username","WP Edit Username","2.0.5","Sajjad Hossain Sagor","https:\u002F\u002Fprofiles.wordpress.org\u002Fsajjad67\u002F","\u003Cp>This plugin adds feature to edit\u002Fchange user username.\u003C\u002Fp>\n\u003Ch4>Features:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Edit Username: Allows editing of usernames.\u003C\u002Fli>\n\u003Cli>Only users with the \u003Ccode>edit_other_users()\u003C\u002Fcode> capability can change usernames.\u003C\u002Fli>\n\u003Cli>If the “Send Email” option is enabled, the user will receive a notification email when their username is changed.\u003C\u002Fli>\n\u003Cli>You can customize the email subject and body text in the admin dashboard or via filter hooks.\u003C\u002Fli>\n\u003Cli>Modify the email subject using the filter: \u003Ccode>wpeu_email_subject\u003C\u002Fcode>.\u003C\u002Fli>\n\u003Cli>Modify the email headers using the filter: \u003Ccode>wpeu_email_headers\u003C\u002Fcode>.\u003C\u002Fli>\n\u003Cli>Adjust the email body content using the filter \u003Ccode>wpeu_email_body\u003C\u002Fcode>. (Note: \u003Ccode>$new_username\u003C\u002Fcode> and \u003Ccode>$old_username\u003C\u002Fcode> are automatically prepended to the email content).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Hooks Usage:\u003C\u002Fh4>\n\u003Cpre>\u003Ccode>\u003C?php\n\nadd_filter( 'wp_username_changed_email_subject', 'change_email_subject' );\n\nfunction change_email_subject( $subject )\n{\n    $subject = 'Your customized subject';\n\n    return $subject;\n}\n\nadd_filter( 'wp_username_changed_email_body', 'change_email_body' );\n\nfunction change_email_body( $old_username, $new_username )\n{\n    $email_body = \"Your custom email text body.\";\n\n    return $email_body;\n}\n\n?>\n\u003C\u002Fcode>\u003C\u002Fpre>\n","Easily Edit User Profile Username clicking a button.",2000,25305,100,"2025-12-08T15:37:00.000Z","5.6","8.0",[93,20,94,95,76],"ajax","profile-edit","user-profile","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-edit-username\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-edit-username.2.0.5.zip","2023-12-19 00:00:00",{"slug":76,"name":100,"version":101,"author":102,"author_profile":103,"description":104,"short_description":105,"active_installs":106,"downloaded":107,"rating":108,"num_ratings":109,"last_updated":110,"tested_up_to":111,"requires_at_least":112,"requires_php":18,"tags":113,"homepage":103,"download_link":116,"security_score":54,"vuln_count":27,"unpatched_count":27,"last_vuln_date":37,"fetched_at":29},"Username","1.3","Pranav Pathak","https:\u002F\u002Fprofiles.wordpress.org\u002Fpranavpathakjaora\u002F","\u003Cp>The Username plugin helps to change username of admin, without effecting other user’s username. First it will check if same username is exist or not. if same username is not exist, then only it will update existing user’s username. Every administrator can change only his\u002Fher username from admin panel.\u003C\u002Fp>\n\u003Cp>After activation there is a sub menu in Settings called Username. Click on this and there is an option to change Username. Insert your new username and then in settings there is an option \u003Cstrong>Click to check username is exist or not\u003C\u002Fstrong> Click and check user is exist or not. If username already exist then it will alert you as \u003Cstrong>Username In Use!\u003C\u002Fstrong> in red color, else it will alert you \u003Cstrong>Username Not In Use!\u003C\u002Fstrong> in green color. If username is not exist and user click on submit then it will update username and it will redirect to login page. Now login with new username.\u003C\u002Fp>\n\u003Cp>Note Password remains same. It is completely safe.\u003Cbr \u002F>\nIf you are not redirect to login page that means Username is not changed.\u003C\u002Fp>\n\u003Ch4>Requirements\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>WordPress 3.5.1 or greater\u003C\u002Fli>\n\u003Cli>PHP 5.2.6 or greater (5.3 recommended)\u003C\u002Fli>\n\u003Cli>MySQL 4.1.2 or greater (5.x recommended)\u003C\u002Fli>\n\u003C\u002Ful>\n","The Username plugin helps to change username, only if username is not exist and without effecting others user's username.",900,15235,80,4,"2024-12-10T03:26:00.000Z","6.7.5","3.5.2",[114,20,115],"admin","username-changer","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fusername.1.3.zip",{"slug":118,"name":119,"version":120,"author":121,"author_profile":122,"description":123,"short_description":124,"active_installs":125,"downloaded":126,"rating":88,"num_ratings":26,"last_updated":127,"tested_up_to":128,"requires_at_least":129,"requires_php":130,"tags":131,"homepage":135,"download_link":136,"security_score":88,"vuln_count":27,"unpatched_count":27,"last_vuln_date":37,"fetched_at":137},"admin-credentials-editor","Admin Credentials Editor","1.0.0","Luqman Safay","https:\u002F\u002Fprofiles.wordpress.org\u002Fluqmansafay\u002F","\u003Cp>The Admin Credentials Editor plugin allows site administrators to quickly update their login details without touching the database.\u003Cbr \u002F>\nYou can change the username, email address, or password of your admin account (individually or together) directly from the dashboard.\u003C\u002Fp>\n","Easily change your admin credentials (username, email, password) from the dashboard.",10,695,"2025-09-12T09:59:00.000Z","6.8.5","5.0","7.0",[132,20,133,94,134],"admin-username","email-change","username-editor","https:\u002F\u002Fpoetrypashto.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fadmin-credentials-editor.1.0.3.zip","2026-03-15T15:16:48.613Z",{"slug":139,"name":140,"version":120,"author":141,"author_profile":142,"description":143,"short_description":144,"active_installs":125,"downloaded":145,"rating":27,"num_ratings":27,"last_updated":146,"tested_up_to":128,"requires_at_least":147,"requires_php":18,"tags":148,"homepage":153,"download_link":154,"security_score":88,"vuln_count":27,"unpatched_count":27,"last_vuln_date":37,"fetched_at":29},"all-in-one-utilities","All-in-One Utilities","2ByteCode","https:\u002F\u002Fprofiles.wordpress.org\u002F2bytecode\u002F","\u003Cp>All-in-One Utilities is a versatile plugin that allows administrators to streamline their WordPress site by enabling only the necessary features. Reduce site overhead and manage user roles and settings efficiently with these key features.\u003C\u002Fp>\n\u003Cp>This plugin consolidates the functionality of several popular plugins into one lightweight package:\u003Cbr \u002F>\n– Default Featured Image\u003Cbr \u002F>\n– Easy Username Updater\u003Cbr \u002F>\n– Multiple Roles\u003Cbr \u002F>\n– Disable Everything\u003C\u002Fp>\n\u003Col>\n\u003Cli>\n\u003Cp>\u003Cstrong>User Multiple Roles:\u003C\u002Fstrong> Assign multiple roles to users during creation or editing.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Username Updater:\u003C\u002Fstrong> Easily update usernames for users via a dedicated action in the Users list table, with optional email notification.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Default Featured Image:\u003C\u002Fstrong> Choose a fallback featured image in Media Settings that is applied when posts\u002Fpages lack one.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Disable Unnecessary Features:\u003C\u002Fstrong> Toggle off various WordPress features (e.g., author archives, application passwords, adjacent posts, embeds, emojis) to streamline and speed up your site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is licensed under the GPLv2 or later.\u003C\u002Fp>\n","A must use plugin for any WordPress site with necessary features.",658,"2025-08-22T12:57:00.000Z","4.0.0",[149,150,151,4,152],"disable-features","featured-image","multiple-roles","utilities","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fall-in-one-utilities","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fall-in-one-utilities.1.0.0.zip",{"attackSurface":156,"codeSignals":176,"taintFlows":190,"riskAssessment":241,"analyzedAt":249},{"hooks":157,"ajaxHandlers":172,"restRoutes":173,"shortcodes":174,"cronEvents":175,"entryPointCount":27,"unprotectedCount":27},[158,164,168],{"type":159,"name":160,"callback":161,"file":162,"line":163},"action","admin_menu","eup_user_list","init.php",32,{"type":159,"name":165,"callback":166,"file":162,"line":167},"init","eup_include",33,{"type":159,"name":169,"callback":170,"file":162,"line":171},"admin_init","eup_assets",34,[],[],[],[],{"dangerousFunctions":177,"sqlUsage":178,"outputEscaping":183,"fileOperations":27,"externalRequests":27,"nonceChecks":26,"capabilityChecks":27,"bundledLibraries":186},[],{"prepared":52,"raw":26,"locations":179},[180],{"file":162,"line":181,"context":182},108,"$wpdb->get_results() with variable interpolation",{"escaped":184,"rawEcho":27,"locations":185},45,[],[187],{"name":188,"version":37,"knownCves":189},"DataTables",[],[191,227],{"entryPoint":192,"graph":193,"unsanitizedCount":27,"severity":226},"eup_user_update (includes\\eup-user-update.php:15)",{"nodes":194,"edges":221},[195,201,207,211,215,218],{"id":196,"type":197,"label":198,"file":199,"line":200},"n0","source","$_REQUEST","includes\\eup-user-update.php",21,{"id":202,"type":203,"label":204,"file":199,"line":205,"wp_function":206},"n1","sink","get_results() [SQLi]",24,"get_results",{"id":208,"type":197,"label":209,"file":199,"line":210},"n2","$_SERVER['REQUEST_URI']",66,{"id":212,"type":203,"label":213,"file":199,"line":210,"wp_function":214},"n3","echo() [XSS]","echo",{"id":216,"type":197,"label":217,"file":199,"line":14},"n4","$_POST",{"id":219,"type":203,"label":213,"file":199,"line":220,"wp_function":214},"n5",74,[222,224,225],{"from":196,"to":202,"sanitized":223},true,{"from":208,"to":212,"sanitized":223},{"from":216,"to":219,"sanitized":223},"low",{"entryPoint":228,"graph":229,"unsanitizedCount":27,"severity":226},"\u003Ceup-user-update> (includes\\eup-user-update.php:0)",{"nodes":230,"edges":237},[231,232,233,234,235,236],{"id":196,"type":197,"label":198,"file":199,"line":200},{"id":202,"type":203,"label":204,"file":199,"line":205,"wp_function":206},{"id":208,"type":197,"label":209,"file":199,"line":210},{"id":212,"type":203,"label":213,"file":199,"line":210,"wp_function":214},{"id":216,"type":197,"label":217,"file":199,"line":14},{"id":219,"type":203,"label":213,"file":199,"line":220,"wp_function":214},[238,239,240],{"from":196,"to":202,"sanitized":223},{"from":208,"to":212,"sanitized":223},{"from":216,"to":219,"sanitized":223},{"summary":242,"deductions":243},"The username-updater plugin v1.0.6 presents a mixed security posture. On the positive side, the static analysis reveals a clean attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication. All identified output is properly escaped, and there are no instances of file operations or external HTTP requests, which are common vectors for vulnerabilities. The presence of nonce checks and the high percentage of SQL queries using prepared statements indicate some good security practices are being followed.\n\nHowever, the plugin has a history of a high-severity Cross-Site Request Forgery (CSRF) vulnerability, even though it is currently patched. The absence of capability checks in the code is a significant concern, as it means that actions performed by the plugin might not be properly authorized for all user roles. While the taint analysis shows no critical or high severity unsanitized flows, and the static analysis indicates no dangerous functions are used, the lack of capability checks on all code paths could still lead to privilege escalation or unauthorized actions if an attacker can trigger these functionalities.\n\nIn conclusion, the plugin has strengths in its limited attack surface and output escaping. Nevertheless, the historical CSRF vulnerability and the absence of capability checks represent notable weaknesses. While no immediate critical flaws were found in the current static analysis, the potential for unauthorized actions due to missing capability checks warrants careful consideration, especially when paired with the past high-severity vulnerability.",[244,246],{"reason":245,"points":125},"Missing capability checks",{"reason":247,"points":248},"Past high severity vulnerability (CSRF)",15,"2026-03-16T17:37:37.920Z",{"wat":251,"direct":264},{"assetPaths":252,"generatorPatterns":257,"scriptPaths":258,"versionParams":259},[253,254,255,256],"\u002Fwp-content\u002Fplugins\u002Fusername-updater\u002Fcss\u002Feupstyle.css","\u002Fwp-content\u002Fplugins\u002Fusername-updater\u002Fcss\u002Fjquery.dataTables.min.css","\u002Fwp-content\u002Fplugins\u002Fusername-updater\u002Fjs\u002Fjquery.dataTables.min.js","\u002Fwp-content\u002Fplugins\u002Fusername-updater\u002Fjs\u002Feup-script.js",[],[255,256],[260,261,262,263],"plugins\u002Fusername-updater\u002Fcss\u002Feupstyle.css?ver=","plugins\u002Fusername-updater\u002Fcss\u002Fjquery.dataTables.min.css?ver=","plugins\u002Fusername-updater\u002Fjs\u002Fjquery.dataTables.min.js?ver=","plugins\u002Fusername-updater\u002Fjs\u002Feup-script.js?ver=",{"cssClasses":265,"htmlComments":266,"htmlAttributes":267,"restEndpoints":268,"jsGlobals":269,"shortcodeOutput":270},[],[],[],[],[],[],{"error":223,"url":272,"statusCode":273,"statusMessage":274,"message":274},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fusername-updater\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":276,"versions":277},6,[278,285,291,299,306,314],{"version":279,"download_url":280,"svn_tag_url":281,"released_at":37,"has_diff":49,"diff_files_changed":282,"diff_lines":37,"trac_diff_url":283,"vulnerabilities":284,"is_current":49},"1.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fusername-updater.1.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fusername-updater\u002Ftags\u002F1.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fusername-updater%2Ftags%2F1.0.4&new_path=%2Fusername-updater%2Ftags%2F1.0.5",[],{"version":39,"download_url":286,"svn_tag_url":287,"released_at":37,"has_diff":49,"diff_files_changed":288,"diff_lines":37,"trac_diff_url":289,"vulnerabilities":290,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fusername-updater.1.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fusername-updater\u002Ftags\u002F1.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fusername-updater%2Ftags%2F1.0.3&new_path=%2Fusername-updater%2Ftags%2F1.0.4",[],{"version":292,"download_url":293,"svn_tag_url":294,"released_at":37,"has_diff":49,"diff_files_changed":295,"diff_lines":37,"trac_diff_url":296,"vulnerabilities":297,"is_current":49},"1.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fusername-updater.1.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fusername-updater\u002Ftags\u002F1.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fusername-updater%2Ftags%2F1.0.2&new_path=%2Fusername-updater%2Ftags%2F1.0.3",[298],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":60,"download_url":300,"svn_tag_url":301,"released_at":37,"has_diff":49,"diff_files_changed":302,"diff_lines":37,"trac_diff_url":303,"vulnerabilities":304,"is_current":49},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fusername-updater.1.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fusername-updater\u002Ftags\u002F1.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fusername-updater%2Ftags%2F1.0.1&new_path=%2Fusername-updater%2Ftags%2F1.0.2",[305],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":307,"download_url":308,"svn_tag_url":309,"released_at":37,"has_diff":49,"diff_files_changed":310,"diff_lines":37,"trac_diff_url":311,"vulnerabilities":312,"is_current":49},"1.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fusername-updater.1.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fusername-updater\u002Ftags\u002F1.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fusername-updater%2Ftags%2F1.0&new_path=%2Fusername-updater%2Ftags%2F1.0.1",[313],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39},{"version":315,"download_url":316,"svn_tag_url":317,"released_at":37,"has_diff":49,"diff_files_changed":318,"diff_lines":37,"trac_diff_url":37,"vulnerabilities":319,"is_current":49},"1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fusername-updater.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fusername-updater\u002Ftags\u002F1.0\u002F",[],[320],{"id":33,"url_slug":34,"title":35,"severity":40,"cvss_score":41,"vuln_type":43,"patched_in_version":39}]