[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fPj5lsao4HPl16T7dAtdN1gNL4DjPzwcLsUidcIv17zM":3,"$fuE2FvoMvoCaBxWbJSZEvrds8Plxcmg1iep4sQkuWbRM":570,"$fucZn6Fr3kWK0Sn-txxUAMuh37skV54DjK_jAeI4_pJ8":574},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":29,"last_vuln_date":30,"fetched_at":31,"discovery_status":32,"vulnerabilities":33,"developer":108,"crawl_stats":39,"alternatives":112,"analysis":217,"fingerprints":506},"virusdie","Virusdie – One-click website security","1.1.8","Virusdie","https:\u002F\u002Fprofiles.wordpress.org\u002Fvirusdie\u002F","\u003Cp>ONE-CLICK WEBSITE SECURITY WITH VIRUSDIE WORDPRESS PLUGIN\u003C\u002Fp>\n\u003Ch3>Welcome to the most anticipated website security plugin – Virusdie WordPress Plugin!\u003C\u002Fh3>\n\u003Cp>Managing website security like malware scanning and removal, website hardening, patch management, real-time website protection against online attacks, and blacklist monitoring – is an automatic pleasure and we can prove it!\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>More than 3 million\u003C\u002Fstrong> connected websites!\u003C\u002Fli>\n\u003Cli>\u003Cstrong>99.87% malware and vulnerabilities detection rate.\u003C\u002Fstrong> The best detection rate in the industry. Virusdie detects as many threats as possible, including new kinds of threats\u003C\u002Fli>\n\u003Cli>\u003Cstrong>No false positives.\u003C\u002Fstrong> False positives rate — less than 0.0002%. You can always be sure that your antivirus won’t mislead you)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Website cleanup in one click.\u003C\u002Fstrong> The industry’s safest automatic cleanup procedures ensure that your site will remain stable after cleanup (automatic malware removal)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Real-time website protection\u003C\u002Fstrong> against attacks by Website Firewall (protection against bad bots, DoS, XSS, SQL injections, suspicious uploads and activities, etc.)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Virtual and real patch management\u003C\u002Fstrong> (website hardening). It makes a virtual patch automatically or updates your vulnerable plug-ins and other site components in seconds, minimizing the risk of future problems.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Blacklist monitoring and blacklisting tool\u003C\u002Fstrong> that help you save time for unblacklisting by an automated un-blacklist wizard.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Smooth onboarding:\u003C\u002Fstrong> only dashboard with all you need. Manage Virusdie tools in a click! Your website is in full view: entire web-security status on one page.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Friendly and responsive Virusdie support team.\u003C\u002Fstrong> We are welcome to help you and answer your questions.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>To avoid interruptions to your business, you need to keep your site free of viruses. As they say, shit happens — but when it does, you have to clean it up, and fast. Today, Virusdie makes it possible to resolve 100% of the security issues most businesses face, either fully or partially automatically. We’ve taken powerful website security tools and made them friendly and automatic in WordPress plugin format. Now, you can scan, clean, and protect your site from a single panel with just one click of the mouse. What’s more, you won’t need any help to use Virusdie. This means that you’ll save tons of time while keeping your site’s security under your control!\u003C\u002Fp>\n\u003Ch4>Free plan feature list:\u003C\u002Fh4>\n\u003Cp>1. Antivirus:\u003C\u002Fp>\n\u003Col>\n\u003Cli>No extreme server CPU load while scanning!\u003C\u002Fli>\n\u003Cli>Instant malware database update. The antivirus database is automatically updated in the background, so you won’t even have to think about doing anything manually to be sure you can eliminate as many viruses and vulnerabilities as possible.\u003C\u002Fli>\n\u003Cli>Scans once a month:\n\u003Cul>\n\u003Cli>Scanning website files for malware: all website files (not just CMS’ files), themes, plugins, PHP, JS, HTML, images, files with no type, any binary files and system files, .htaccess, and files with custom types and archives.\u003C\u002Fli>\n\u003Cli>Scanning website database. Scan posts and comments for bad URLs and suspicious content, scan posts and comments for malware and injections.\u003C\u002Fli>\n\u003Cli>Scanning for malware types (threats): malware, malicious redirects, Trojans, backdoors, shell scripts, malicious codes, bad URLs and SEO spam, defaces, code injections, browser coin miners.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Detailed scan reports with malware and threats description and recommendations.\u003C\u002Fli>\n\u003Cli>Add files to the exclusion list to ignore them in future scans.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Find out more about \u003Ca href=\"https:\u002F\u002Fvirusdie.com\u002Ftools\u002F#3rdPage\" rel=\"nofollow ugc\">Virusdie Antivirus\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>2. WAF:\u003C\u002Fp>\n\u003Col>\n\u003Cli>Don’t slow down your website while you’re using WAF!\u003C\u002Fli>\n\u003Cli>Instant Firewall rules database update.\u003C\u002Fli>\n\u003Cli>Bad requests, hacks attempts and attacks detection.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Find out more about \u003Ca href=\"https:\u002F\u002Fvirusdie.com\u002Ftools\u002F#6page\" rel=\"nofollow ugc\">Virusdie Firewall\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>3. Patch Management (website hardening)\u003C\u002Fp>\n\u003Col>\n\u003Cli>Instant vulnerabilities database update.\u003C\u002Fli>\n\u003Cli>Check site (files, themes, plugins and components) for known security vulnerabilities and alerts you if found.\u003C\u002Fli>\n\u003Cli>Scan once a month.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Find out more about \u003Ca href=\"https:\u002F\u002Fvirusdie.com\u002Ftools\u002F#4rdPage\" rel=\"nofollow ugc\">Virusdie Patch Manager\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>4. Blacklists Monitoring\u003C\u002Fp>\n\u003Col>\n\u003Cli>Checking your website more than 60+ blacklists automatically.\u003C\u002Fli>\n\u003Cli>One-click to un-blacklist.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Find out more about \u003Ca href=\"https:\u002F\u002Fvirusdie.com\u002Ftools\u002F#7page\" rel=\"nofollow ugc\">Virusdie Blacklist Monitoring\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Premium plan feature list:\u003C\u002Fh4>\n\u003Cp>(In addition to the free plan’ feature list)\u003C\u002Fp>\n\u003Cp>1. Antivirus:\u003C\u002Fp>\n\u003Col>\n\u003Cli>Daily scans and Unlimited scans.\u003C\u002Fli>\n\u003Cli>Automatic malware removal: The safest in the industry automatic malware removal – Your website continues to run stably after the automated cleanup.\u003C\u002Fli>\n\u003Cli>Unlimited site cleanups.\u003C\u002Fli>\n\u003Cli>File editor.\u003C\u002Fli>\n\u003Cli>Malicious code highlighting in the file editor.\u003C\u002Fli>\n\u003Cli>Pre-cleanup file backups.\u003C\u002Fli>\n\u003Cli>Exclusion list to add files and ignore them in future scans.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Find out more about \u003Ca href=\"https:\u002F\u002Fvirusdie.com\u002Ftools\u002F#3rdPage\" rel=\"nofollow ugc\">Virusdie Antivirus\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>1. Firewall:\u003C\u002Fp>\n\u003Col>\n\u003Cli>Basic bad request protection.\u003C\u002Fli>\n\u003Cli>XSS and SQL injection protection.\u003C\u002Fli>\n\u003Cli>DoS-attacks protection.\u003C\u002Fli>\n\u003Cli>Brute force protection by limiting login attempts.\u003C\u002Fli>\n\u003Cli>Content scraping protection.\u003C\u002Fli>\n\u003Cli>Malicious uploads prevention.\u003C\u002Fli>\n\u003Cli>IP whitelisting\u002Fblacklisting.\u003C\u002Fli>\n\u003Cli>URL blocking.\u003C\u002Fli>\n\u003Cli>Country blocking.\u003C\u002Fli>\n\u003Cli>History of blocked requests.\u003C\u002Fli>\n\u003Cli>Make custom rules to block requests based by: IP Range, Hostname, User Agent and Referrer.\u003C\u002Fli>\n\u003Cli>Make custom rules generic type for POST\u002FGET requests.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Find out more about \u003Ca href=\"https:\u002F\u002Fvirusdie.com\u002Ftools\u002F#6page\" rel=\"nofollow ugc\">Virusdie Firewall\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Patch Management:\u003C\u002Fp>\n\u003Col>\n\u003Cli>Daily and Unlimited scans.\u003C\u002Fli>\n\u003Cli>Automatic virtual vulnerability patching (website hardening).\u003C\u002Fli>\n\u003Cli>Automatic real patch management.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Find out more about \u003Ca href=\"https:\u002F\u002Fvirusdie.com\u002Ftools\u002F#4rdPage\" rel=\"nofollow ugc\">Virusdie Patch Manager\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Coming soon:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Teamwork:\u003C\u002Fstrong> you will be able to share access to your site with your team. Simple and secure!\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Website sharing.\u003C\u002Fstrong> You’ll be able to share your website access with your digital agency who manage your website security – with one click!\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Website insurance and security expert marketplace:\u003C\u002Fstrong> for being confident that in the event of a complex website infection or damage to your site, getting help from third-party security experts to restore your site won’t cost you any more than the minimum cost in your insurance policy.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Firewall statistics and attack attempts reports will be available on the free tier plan!\u003C\u002Fstrong> Keep your finger on the website pulse even for free!\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Join us on \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fgroups\u002FWebSecCommunityVirusdie\" rel=\"nofollow ugc\">Facebook Community\u003C\u002Fa> and find out more about Virusdie cloud security tools.\u003C\u002Fp>\n","Malware scanning & removal, website hardening, patching vulnerabilities, real-time protection against online attacks, blacklist monitoring in a click!",2000,35113,80,9,"2026-01-30T22:05:00.000Z","6.8.5","5.0","5.6",[20,21,22,23,24],"antivirus","firewall","malware-scanner","security","security-plugin","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.8.zip",95,4,0,"2026-02-18 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[34,69,83,93],{"id":35,"url_slug":36,"title":37,"description":38,"plugin_slug":4,"theme_slug":39,"affected_versions":40,"patched_in_version":6,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":30,"updated_date":45,"references":46,"days_to_patch":48,"patch_diff_files":49,"patch_trac_url":39,"research_status":58,"research_verified":59,"research_rounds_completed":60,"research_plan":61,"research_summary":62,"research_vulnerable_code":63,"research_fix_diff":64,"research_exploit_outline":65,"research_model_used":66,"research_started_at":67,"research_completed_at":68,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":59,"poc_model_used":39,"poc_verification_depth":39},"CVE-2025-14864","virusdie-missing-authorization-to-authenticated-subscriber-api-key-disclosure","Virusdie \u003C= 1.1.7 - Missing Authorization to Authenticated (Subscriber+) API Key Disclosure","The Virusdie - One-click website security plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.7. This is due to missing capability checks on the `vd_get_apikey` function which is hooked to `wp_ajax_virusdie_apikey`. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve the site's Virusdie API key, which could be used to access the site owner's Virusdie account and potentially compromise site security.",null,"\u003C=1.1.7","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Missing Authorization","2026-02-19 04:36:19",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8ef2e0b1-52ef-4f70-9e95-d010a586d060?source=api-prod",1,[50,51,52,53,54,55,56,57],"assets\u002Fcss\u002Fvirusdie.css","changelog.txt","inc\u002Fclass-virusdie.php","inc\u002Ftools\u002Fclass-virusdie-behavior.php","readme.txt","views\u002Fauth-pass.php","views\u002Ffree.php","views\u002Fpremium.php","researched",false,3,"This research plan outlines the steps required to exploit a Sensitive Information Exposure vulnerability in the Virusdie plugin (\u003C= 1.1.7). The vulnerability allows authenticated users with Subscriber-level permissions to retrieve the Virusdie API key due to missing authorization checks in an AJAX handler.\n\n### 1. Vulnerability Summary\n*   **ID:** CVE-2025-14864\n*   **Vulnerability:** Missing Authorization \u002F Sensitive Information Exposure\n*   **Affected Function:** `VDWS_VirusdieBehavior::vd_get_apikey`\n*   **AJAX Action:** `virusdie_apikey`\n*   **Root Cause:** The function `vd_get_apikey` (hooked via `wp_ajax_virusdie_apikey`) lacks sufficient capability checks and nonce verification in the vulnerable version (1.1.7). While the provided source code shows a `canDoAjax` check, the vulnerability description confirms that in affected versions, this check is either missing, bypassed, or insufficient, allowing Subscriber-level users to retrieve the API key.\n\n### 2. Attack Vector Analysis\n*   **Endpoint:** `\u002Fwp-admin\u002Fadmin-ajax.php`\n*   **Method:** POST or GET\n*   **Action:** `virusdie_apikey`\n*   **Authentication:** Authenticated (Subscriber or higher)\n*   **Payload:** No specific payload parameters are required beyond the `action` parameter.\n\n### 3. Code Flow\n1.  **Entry Point:** The plugin registers the AJAX action in `inc\u002Fclass-virusdie.php`:\n    `add_action( 'wp_ajax_virusdie_apikey', 'VDWS_VirusdieBehavior::vd_get_apikey' );`\n2.  **Handler Trigger:** When a request is made to `admin-ajax.php?action=virusdie_apikey`, WordPress invokes `VDWS_VirusdieBehavior::vd_get_apikey`.\n3.  **Vulnerable Check:** In version 1.1.7, `vd_get_apikey` is executed without a functioning `current_user_can('manage_options')` check or a nonce check.\n4.  **Information Disclosure:** The function calls `VDWS_Virusdie::get_api_key()`, which retrieves the sensitive Virusdie API key and outputs it via `wp_die()`.\n\n### 4. Nonce Acquisition Strategy\nBased on the provided source for `inc\u002Ftools\u002Fclass-virusdie-behavior.php`, the `vd_get_apikey` function and its helper `canDoAjax` **do not perform any nonce verification** (i.e., no `check_ajax_referer` or `wp_verify_nonce` is present). \n\n*   **Conclusion:** No nonce is required for this exploit. An authenticated session cookie is the only requirement.\n\n### 5. Exploitation Strategy\nThe agent will perform the following steps using the `http_request` tool:\n\n1.  **Authentication:** Log in as a Subscriber user to obtain valid session cookies.\n2.  **Information Retrieval:** Send a request to the AJAX endpoint requesting the API key.\n3.  **Request Details:**\n    *   **URL:** `http:\u002F\u002F[target]\u002Fwp-admin\u002Fadmin-ajax.php`\n    *   **Method:** POST\n    *   **Headers:** `Content-Type: application\u002Fx-www-form-urlencoded`\n    *   **Body:** `action=virusdie_apikey`\n\n### 6. Test Data Setup\nTo verify the disclosure, a dummy API key must be present in the database.\n1.  **Create Subscriber:**\n    `wp user create attacker attacker@example.com --role=subscriber --user_pass=password123`\n2.  **Set Dummy API Key:**\n    Use the plugin's internal class method via WP-CLI to ensure the key is stored correctly in the context of the plugin:\n    `wp eval \"require_once 'wp-content\u002Fplugins\u002Fvirusdie\u002Finc\u002Fclass-virusdie.php'; VDWS_Virusdie::set_api_key('VIRUSDIE-API-KEY-SECRET-12345');\"`\n    *(Note: The exact option name is internal, using the class method is most reliable).*\n\n### 7. Expected Results\n*   **Success:** The HTTP response body contains the string `VIRUSDIE-API-KEY-SECRET-12345`.\n*   **HTTP Status:** 200 OK.\n*   **Failure:** The response body contains `{\"success\":false,\"data\":{\"error\":\"Permission denied\"}}` or a 403 status code (indicating the patch is active).\n\n### 8. Verification Steps\nAfter receiving the response from the HTTP request:\n1.  **Match Key:** Compare the string returned in the HTTP response body with the value set during the \"Test Data Setup\" (`VIRUSDIE-API-KEY-SECRET-12345`).\n2.  **Confirm Role:** Use WP-CLI to confirm the user used for the request does not have administrative privileges:\n    `wp user get attacker --field=roles` (Should return `subscriber`).\n\n### 9. Alternative Approaches\nIf the POST request fails or returns `0`, try a GET request:\n*   **GET URL:** `http:\u002F\u002F[target]\u002Fwp-admin\u002Fadmin-ajax.php?action=virusdie_apikey`\n*   **Logic:** Some AJAX handlers do not discriminate between `$_GET` and `$_POST` (though `wp_ajax` usually expects POST).\n\nIf the `VDWS_Virusdie::set_api_key` method is unavailable via CLI, manually set the option that likely stores the key:\n*   `wp option update vd_apikey \"VIRUSDIE-API-KEY-SECRET-12345\"` (inferred from common plugin patterns).","The Virusdie plugin for WordPress is vulnerable to sensitive information exposure in versions up to 1.1.7. This is caused by missing or insufficient authorization checks in the `vd_get_apikey` function, which is accessible via the `wp_ajax_virusdie_apikey` AJAX action, allowing authenticated users with Subscriber-level access to retrieve the site's Virusdie API key.","\u002F\u002F inc\u002Fclass-virusdie.php\n\nadd_action( 'wp_ajax_virusdie_apikey', 'VDWS_VirusdieBehavior::vd_get_apikey' );\n\n---\n\n\u002F\u002F inc\u002Ftools\u002Fclass-virusdie-behavior.php\n\npublic static function canDoAjax()\n{\n    if (!current_user_can('manage_options')) {\n        wp_send_json_error(array('error' => 'Permission denied'), 403);\n        return FALSE;\n    }\n    return TRUE;\n}\n\n\u002F\u002F ... lines 265-270\n\npublic static function vd_get_apikey()\n{\n    if (!self::canDoAjax()) {\n        return;\n    }\n    wp_die(VDWS_Virusdie::get_api_key());\n}","diff -ru \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fvirusdie\u002F1.1.7\u002Finc\u002Fclass-virusdie.php \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fvirusdie\u002F1.1.8\u002Finc\u002Fclass-virusdie.php\n--- \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fvirusdie\u002F1.1.7\u002Finc\u002Fclass-virusdie.php\t2025-12-30 13:54:42.000000000 +0000\n+++ \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fvirusdie\u002F1.1.8\u002Finc\u002Fclass-virusdie.php\t2026-01-30 22:05:56.000000000 +0000\n@@ -67,12 +67,12 @@\n \n \t\tadd_filter( 'plugin_action_links_' . plugin_basename( VDWS_VIRUSDIE_PLUGIN_FILE ), array( $this, 'page_plugin_action' ) );\n \n-\t\tadd_action( 'wp_ajax_virusdie_switcher', 'VDWS_VirusdieBehavior::vd_switcher' );\n+\t\t\u002F\u002F add_action( 'wp_ajax_virusdie_switcher', 'VDWS_VirusdieBehavior::vd_switcher' );\n \t\t\u002F\u002F add_action( 'wp_ajax_nopriv_virusdie_switcher', 'VDWS_VirusdieBehavior::vd_switcher' ); \u002F\u002F Will be used in future versions\n-\t\tadd_action( 'wp_ajax_virusdie_start_scan', 'VDWS_VirusdieBehavior::vd_scan_start' );\n-\t\tadd_action( 'wp_ajax_virusdie_get_progress', 'VDWS_VirusdieBehavior::vd_get_progress' );\n-\t\tadd_action( 'wp_ajax_virusdie_apikey', 'VDWS_VirusdieBehavior::vd_get_apikey' );\n-\t\tadd_action( 'wp_ajax_virusdie_resend', 'VDWS_VirusdieBehavior::vd_resend' );\n+\t\t\u002F\u002F add_action( 'wp_ajax_virusdie_start_scan', 'VDWS_VirusdieBehavior::vd_scan_start' );\n+\t\t\u002F\u002F add_action( 'wp_ajax_virusdie_get_progress', 'VDWS_VirusdieBehavior::vd_get_progress' );\n+\t\t\u002F\u002F add_action( 'wp_ajax_virusdie_apikey', 'VDWS_VirusdieBehavior::vd_get_apikey' );\n+\t\t\u002F\u002F add_action( 'wp_ajax_virusdie_resend', 'VDWS_VirusdieBehavior::vd_resend' );\n \t}\n \n \t\u002F**\ndiff -ru \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fvirusdie\u002F1.1.7\u002Finc\u002Ftools\u002Fclass-virusdie-behavior.php \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fvirusdie\u002F1.1.8\u002Finc\u002Ftools\u002Fclass-virusdie-behavior.php\n--- \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fvirusdie\u002F1.1.7\u002Finc\u002Ftools\u002Fclass-virusdie-behavior.php\t2025-12-30 13:54:42.000000000 +0000\n+++ \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fvirusdie\u002F1.1.8\u002Finc\u002Ftools\u002Fclass-virusdie-behavior.php\t2026-01-30 22:05:56.000000000 +0000\n@@ -188,6 +188,7 @@\n \t\treturn false;\n \t}\n \n+\t\u002F*\n \tpublic static function canDoAjax()\n \t{\n \t\tif (!current_user_can('manage_options')) {\n@@ -271,5 +272,6 @@\n \t\t}\n \t\twp_die(VDWS_VirusdieApiClient::signup($_POST['vd_email'], $err));\n \t}\n+\t*\u002F\n \n }","To exploit this vulnerability, an attacker needs an authenticated session with at least Subscriber-level privileges. No nonce or complex payload is required. The attacker simply sends a request to the WordPress AJAX endpoint (\u002Fwp-admin\u002Fadmin-ajax.php) with the 'action' parameter set to 'virusdie_apikey'. The server will respond with the site's Virusdie API key in the response body.","gemini-3-flash-preview","2026-04-19 05:32:30","2026-04-19 05:33:11",{"id":70,"url_slug":71,"title":72,"description":73,"plugin_slug":4,"theme_slug":39,"affected_versions":74,"patched_in_version":75,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":76,"published_date":77,"updated_date":78,"references":79,"days_to_patch":81,"patch_diff_files":82,"patch_trac_url":39,"research_status":39,"research_verified":59,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":59,"poc_model_used":39,"poc_verification_depth":39},"CVE-2025-68576","virusdie-authenticated-subscriber-information-exposure","Virusdie \u003C= 1.1.6 - Authenticated (Subscriber+) Information Exposure","The Virusdie – One-click website security plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive user or configuration data.","\u003C=1.1.6","1.1.7","Exposure of Sensitive Information to an Unauthorized Actor","2025-12-21 00:00:00","2026-01-06 14:32:49",[80],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0fe2bc91-2c8a-46ca-99cb-187d5c688305?source=api-prod",17,[],{"id":84,"url_slug":85,"title":86,"description":87,"plugin_slug":4,"theme_slug":39,"affected_versions":74,"patched_in_version":75,"severity":41,"cvss_score":42,"cvss_vector":88,"vuln_type":44,"published_date":77,"updated_date":89,"references":90,"days_to_patch":81,"patch_diff_files":92,"patch_trac_url":39,"research_status":39,"research_verified":59,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":59,"poc_model_used":39,"poc_verification_depth":39},"CVE-2025-68577","virusdie-missing-authorization","Virusdie \u003C= 1.1.6 - Missing Authorization","The Virusdie – One-click website security plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform an unauthorized action.","CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","2026-01-06 14:35:09",[91],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8a8d1b0c-8699-4d52-b848-2826cb1ce8a3?source=api-prod",[],{"id":94,"url_slug":95,"title":96,"description":97,"plugin_slug":4,"theme_slug":39,"affected_versions":98,"patched_in_version":99,"severity":41,"cvss_score":42,"cvss_vector":100,"vuln_type":101,"published_date":102,"updated_date":103,"references":104,"days_to_patch":106,"patch_diff_files":107,"patch_trac_url":39,"research_status":39,"research_verified":59,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":59,"poc_model_used":39,"poc_verification_depth":39},"CVE-2025-53265","virusdie-cross-site-request-forgery","Virusdie \u003C= 1.1.3 - Cross-Site Request Forgery","The Virusdie – One-click website security plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.3. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to perform an unauthorized action granted they can trick a site administrator into performing an action such as clicking on a link.","\u003C=1.1.3","1.1.4","CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Cross-Site Request Forgery (CSRF)","2025-06-27 00:00:00","2025-07-16 15:20:41",[105],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F555f9bf9-5b76-4cbe-852b-5fffb1fc1b35?source=api-prod",20,[],{"slug":4,"display_name":7,"profile_url":8,"plugin_count":48,"total_installs":11,"avg_security_score":27,"avg_patch_time_days":109,"trust_score":110,"computed_at":111},14,91,"2026-05-20T01:12:32.235Z",[113,137,157,179,198],{"slug":114,"name":115,"version":116,"author":117,"author_profile":118,"description":119,"short_description":120,"active_installs":121,"downloaded":122,"rating":123,"num_ratings":124,"last_updated":125,"tested_up_to":126,"requires_at_least":127,"requires_php":128,"tags":129,"homepage":132,"download_link":133,"security_score":134,"vuln_count":135,"unpatched_count":29,"last_vuln_date":136,"fetched_at":31},"sg-security","Security Optimizer – The All-In-One Protection Plugin","1.6.0","SiteGround","https:\u002F\u002Fprofiles.wordpress.org\u002Fsiteground\u002F","\u003Cp>\u003Cstrong>Bulletproof your website security in a few clicks against a range of security breaches, including brute-force attacks, malware threats and bots, with our free WordPress security plugin – Security Optimizer.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Proactively monitor your site’s security to detect any suspicious activity and take immediate actions to protect your site and prevent further damage with these essential features:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Enable \u003Cstrong>2FA (Two-Factor Authentication)\u003C\u002Fstrong> for an extra layer of website security\u003C\u002Fli>\n\u003Cli>Set \u003Cstrong>Limit Login Attempts\u003C\u002Fstrong> to deter malicious login attempts and brute-force attacks\u003C\u002Fli>\n\u003Cli>Change your default login URL to \u003Cstrong>Custom Login URL\u003C\u002Fstrong> to avoid attacks\u003C\u002Fli>\n\u003Cli>Activate \u003Cstrong>Advanced XSS Protection\u003C\u002Fstrong> to fortify your website against malicious attacks\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Lock and Protect System Folders\u003C\u002Fstrong> to ensure no unauthorized or malicious scripts can be executed in your system folders\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Disable Themes & Plugins Editor\u003C\u002Fstrong> to safeguard your website from unauthorized access via the WordPress editor\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Hide WordPress Version\u003C\u002Fstrong> effortlessly, keeping it hidden from prying eyes\u003C\u002Fli>\n\u003Cli>Use \u003Cstrong>Activity Log\u003C\u002Fstrong> to monitor your site and quickly prevent malicious actions\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Post-Hack Actions\u003C\u002Fstrong> to take immediate actions and prevent further damages\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Developed by the website security experts at \u003Ca href=\"https:\u002F\u002Fwww.siteground.com\u002Fwordpress-plugins\u002Fsiteground-security\" rel=\"nofollow ugc\">SiteGround\u003C\u002Fa> and trusted by over 900,000 webmasters for its robust security shield and ease of use to safeguard WordPress applications from possible attacks on any hosting platform.\u003C\u002Fp>\n\u003Ch4>AWARDS:\u003C\u002Fh4>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwww.templatemonster.com\u002Fawards\u002Fwinners-2022\u002F\" rel=\"nofollow ugc\">Monster Awards 2022\u003C\u002Fa>: Best WordPress Security Plugin 🥇\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwww.templatemonster.com\u002Fawards\u002Fwinners-2021\u002F\" rel=\"nofollow ugc\">Monster Awards 2021\u003C\u002Fa>: Best WordPress Security Plugin 🥇\u003C\u002Fp>\n\u003Ch4>Plugin Video\u003C\u002Fh4>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FFOheCz7sm9A?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Ch4>Plugin Tutorial\u003C\u002Fh4>\n\u003Cp>Unveil the vast array of features and unleash the full potential of our security plugin in our \u003Ca href=\"https:\u002F\u002Fwww.siteground.com\u002Ftutorials\u002Fwordpress\u002Fsg-security\u002F\" rel=\"nofollow ugc\">Security Optimizer Tutorial\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>SITE PROTECTION FEATURES\u003C\u002Fh3>\n\u003Cp>Safeguard your WordPress application using our powerful site security toolset. Our comprehensive features are specifically designed to strengthen your website’s defenses against malware, exploits, and various malicious activities. With these tools at your disposal, you can ensure the utmost bot, malware and brute force protection for your website:\u003C\u002Fp>\n\u003Ch4>Lock and Protect System Folders\u003C\u002Fh4>\n\u003Cp>Ensure the maximum security for your application’s system folders by preventing the execution of any unauthorized or malicious scripts. The Lock and Protect System Folders feature acts as a powerful shield against potential threats.\u003C\u002Fp>\n\u003Ch4>Hide WordPress Version\u003C\u002Fh4>\n\u003Cp>Protect your website from mass attacks by hiding the WordPress version, which helps to mitigate version-specific vulnerabilities.\u003C\u002Fp>\n\u003Ch4>Disable Themes & Plugins Editor\u003C\u002Fh4>\n\u003Cp>Enhance the security of your WordPress admin area by disabling the Themes & Plugins Editor, preventing potential coding errors and unauthorized access through the editor.\u003C\u002Fp>\n\u003Ch4>Disable XML-RPC\u003C\u002Fh4>\n\u003Cp>Mitigate potential security risks by disabling the XML-RPC protocol, which has been exploited in various attacks. Please note that disabling XML-RPC will restrict WordPress from communicating with third-party systems. We recommend enabling this feature unless you have a specific need for it.\u003C\u002Fp>\n\u003Ch4>Disable RSS and ATOM Feeds\u003C\u002Fh4>\n\u003Cp>Prevent content scraping and specific attacks on your site by disabling RSS and ATOM feeds. Unless you have readers accessing your site via RSS readers, it is recommended to keep this feature enabled.\u003C\u002Fp>\n\u003Ch4>Advanced XSS Protection\u003C\u002Fh4>\n\u003Cp>Add an extra layer of website security against cross-site scripting (XSS) attacks by enabling Advanced XSS Protection, bolstering the overall security of your website.\u003C\u002Fp>\n\u003Ch4>Delete Default Readme.html\u003C\u002Fh4>\n\u003Cp>Eliminate potential vulnerabilities by deleting the default readme.txt file, which contains information about your website. By removing this file, you reduce the risk of your site being listed in vulnerable sites targeted by hackers.\u003C\u002Fp>\n\u003Ch3>Login Security\u003C\u002Fh3>\n\u003Ch4>Custom Login Url\u003C\u002Fh4>\n\u003Cp>Personalize your login URL to thwart potential attacks and create a strong entry point. Bid farewell to the default login URL and embrace a bespoke path of your choosing. Additionally, you have the freedom to modify the default sign-up URL as well.\u003C\u002Fp>\n\u003Ch4>Login Access\u003C\u002Fh4>\n\u003Cp>Restrict login page access to specific IP addresses or IP ranges, effectively thwarting malicious login attempts and deterring brute force attacks.\u003C\u002Fp>\n\u003Ch4>2FA (Two-Factor Authentication)\u003C\u002Fh4>\n\u003Cp>Immerse your website in an impenetrable shield of security with 2FA. This formidable feature demands that all admin users furnish a unique token, generated exclusively through the Google Authentication application, during the login process.\u003C\u002Fp>\n\u003Ch4>Disable Common Usernames\u003C\u002Fh4>\n\u003Cp>Don’t fall victim to predictable security breaches! The use of common usernames, such as ‘admin,’ poses a significant threat to the integrity of your website. Activate this option to disable the creation of common usernames. If any weak usernames already exist, we’ll prompt you to provide new, stronger alternatives.\u003C\u002Fp>\n\u003Ch4>Limit Login Attempts\u003C\u002Fh4>\n\u003Cp>Maintain control over unauthorized access attempts with Limit Login Attempts. Set a specific threshold for the number of login failures users can endure before consequences arise. After reaching the limit, the IP address associated with the unsuccessful login attempts will be blocked for one hour. Persistent failures will result in longer restrictions, starting with 24 hours and escalating to a week.\u003C\u002Fp>\n\u003Ch3>ACTIVITY MONITORING\u003C\u002Fh3>\n\u003Cp>Monitor your website and login page for unauthorized visitors and brute force attempts to prevent malicious actions\u003C\u002Fp>\n\u003Ch4>Activity Log\u003C\u002Fh4>\n\u003Cp>The Activity Log page provides you with a comprehensive view of the activities performed by registered, unknown, and blocked visitors. It allows you to closely monitor any suspicious behavior and take appropriate actions in case of a compromised user, plugin, or hacking attempt. You can leverage the quick tools available to swiftly block future attempts.\u003C\u002Fp>\n\u003Ch4>Weekly Security Reports\u003C\u002Fh4>\n\u003Cp>Receive a weekly traffic summary for your website directly to your inbox. This \u003Cstrong>Weekly Security Report\u003C\u002Fstrong> compiles data on both bot and human traffic, along with details about blocked login and visit attempts to proactively monitor traffic and promptly identify suspicious activity.\u003C\u002Fp>\n\u003Ch3>POST-HACK ACTIONS\u003C\u002Fh3>\n\u003Cp>Take immediate measures to protect your website if you suspect a compromise and prevent further damage. Here, you’ll find convenient solutions to address the situation effectively:\u003C\u002Fp>\n\u003Ch4>Reinstall All Free Plugins\u003C\u002Fh4>\n\u003Cp>In the event of a hack, utilizing the Reinstall All Free Plugins feature can help mitigate potential harm. This action reinstalls all of your free plugins, reducing the likelihood of additional exploits or the reuse of malicious code.\u003C\u002Fp>\n\u003Ch4>Log Out All Users\u003C\u002Fh4>\n\u003Cp>To prevent any further unauthorized activities by users or attackers, you can choose to log out all users instantly using the Log Out All Users feature.\u003C\u002Fp>\n\u003Ch4>Force Password Reset\u003C\u002Fh4>\n\u003Cp>By enforcing a password reset, you can ensure that all users are prompted to change their passwords during their next login. This not only strengthens the security of their accounts but also immediately logs out all currently logged-in users.\u003C\u002Fp>\n\u003Ch3>Requirements\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>WordPress 4.7\u003C\u002Fli>\n\u003Cli>PHP 7.0\u003C\u002Fli>\n\u003Cli>Working .htaccess file\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Data Collection\u003C\u002Fh3>\n\u003Cp>Collection of technical data is optional and is \u003Ca href=\"https:\u002F\u002Fwww.siteground.com\u002Fkb\u002Fwhat-information-wp-plugins-collect\" rel=\"nofollow ugc\">listed here\u003C\u002Fa>. This data is collected only for technical analysis, improvements and the possibility to contact the plugin user in case urgent issues need to be fixed (for example a critical security release that needs to be communicated to site owners). The plugin user can manage their preferences within the WP admin to control the collection of technical data. We advise opting in for this data collection, as it can enhance the plugin’s performance. You may find more information on data collection in our \u003Ca href=\"https:\u002F\u002Fwww.siteground.com\u002Fviewtos\u002Fsiteground_plugins_privacy_notice\" rel=\"nofollow ugc\">Plugins Privacy Notice\u003C\u002Fa>.\u003C\u002Fp>\n","Secure your WordPress site from brute-force attacks, threats, malware, and bots. Free to use and easy to set up.",1000000,32328818,90,153,"2026-03-31T11:35:00.000Z","6.9.4","4.7","7.0",[21,130,22,23,131],"login","web-application-firewall","https:\u002F\u002Fsiteground.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsg-security.1.6.0.zip",86,5,"2025-11-30 00:00:00",{"slug":138,"name":139,"version":140,"author":141,"author_profile":142,"description":143,"short_description":144,"active_installs":145,"downloaded":146,"rating":134,"num_ratings":147,"last_updated":148,"tested_up_to":126,"requires_at_least":149,"requires_php":128,"tags":150,"homepage":154,"download_link":155,"security_score":156,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"malcare-security","MalCare WordPress Security Plugin – Malware Scanner, Cleaner, Security Firewall","6.39","malcare","https:\u002F\u002Fprofiles.wordpress.org\u002Fmalcare\u002F","\u003Ch3>MALCARE SECURITY SERVICES\u003C\u002Fh3>\n\u003Cp>Security Plugin For WordPress Websites\u003Cbr \u002F>\n★★★★★\u003C\u002Fp>\n\u003Cp>A WordPress security plugin ensures that your website remains completely safe and secure, always. We created \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002F\" rel=\"nofollow ugc\">MalCare Security Plugin\u003C\u002Fa> to help website owners worry less about their site security, achieve peace of mind and focus all their energies on growing their business or website.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Why you need MalCare Security?\u003C\u002Fstrong>\u003Cbr \u002F>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002Fj3h0JF0we4o?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Difference Between MalCare Free vs Premium\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002F4ja5ix9WDCo?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Cp>\u003Cstrong>Why MalCare is best WordPress security plugin?\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002Fvt-0TrMV-TQ?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Cp>\u003Cstrong>MalCare in 1 Minute – Overview\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FH1XRntW_FeE?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003Cbr \u002F>\n\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Important Links: \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Ffeatures\u002F\" rel=\"nofollow ugc\">Security Features\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002F\" rel=\"nofollow ugc\">Why Choose MalCare?\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Ftop-wordpress-security-plugins-compared\u002F\" rel=\"nofollow ugc\">Comparisons\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fmalcare-free-premium\u002F\" rel=\"nofollow ugc\">Free vs Paid\u003C\u002Fa>\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>MalCare is the \u003Cstrong>fastest\u003C\u002Fstrong> malware detection and removal plugin loved by thousands of developers and agencies. With an industry-first \u003Cstrong>automatic one-click malware removal\u003C\u002Fstrong>, your WordPress website is clean before Google blacklists it or your web host takes it down. MalCare has been developed from the ground up after \u003Cstrong>analyzing over 240,000 websites over 2.5+ years\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>Its \u003Cstrong>intelligent scanning methodology\u003C\u002Fstrong> will \u003Cstrong>never slow down your WordPress site\u003C\u002Fstrong> and \u003Cstrong>accurately identifies\u003C\u002Fstrong> the most complex malware that typically goes undetected in other popular WordPress security plugins.\u003C\u002Fp>\n\u003Cp>The \u003Cstrong>one-click malware cleaner\u003C\u002Fstrong> offers unlimited automated cleanups while the inbuilt \u003Cstrong>powerful cloud-based firewall\u003C\u002Fstrong> ensures round-the-clock website protection against spam attacks. Moreover, you can \u003Cstrong>block countries\u003C\u002Fstrong> to mitigate hack attacks.\u003C\u002Fp>\n\u003Cp>MalCare comes integrated with a \u003Cstrong>complete website management\u003C\u002Fstrong> module that ensures better WP security and site management to your websites from a single dashboard.\u003C\u002Fp>\n\u003Cp>The WP security plugin \u003Cstrong>notifies you if the WordPress site goes down\u003C\u002Fstrong> so that you can handle the situation before you start losing visitors. Performance Check enables WordPress users to keep an eye on their \u003Cstrong>loading speed\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>MalCare offers a premium \u003Cstrong>White-Label\u003C\u002Fstrong> solution that lets agencies provide better website security to their clients without risking their business. And enables users to \u003Cstrong>generate beautiful reports\u003C\u002Fstrong> for their clients.\u003C\u002Fp>\n\u003Ch3>Why Choose MalCare WordPress Security Plugin?\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Ch4>WordPress Malware Scanner\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Cloud Based Deep malware scanner\u003C\u002Fli>\n\u003Cli>Doesn’t Slow down your WordPress site\u003C\u002Fli>\n\u003Cli>Detects malware BEFORE it’s too late\u003C\u002Fli>\n\u003Cli>NO impact on your website\u003C\u002Fli>\n\u003Cli>Finds ALL types of malware, even new & complex ones\u003C\u002Fli>\n\u003Cli>Get Alerts about Security Risks with our WordPress Vulnerability Scanner\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>WordPress Malware Removal\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>View hacked file details\u003C\u002Fli>\n\u003Cli>Cleans your site INSTANTLY, in less than 60 Secs\u003C\u002Fli>\n\u003Cli>Removes ALL traces of malware\u003C\u002Fli>\n\u003Cli>UNLIMITED hack cleanups\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>WordPress Website Protection\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Blocks hacker BOTS from attacking login page\u003C\u002Fli>\n\u003Cli>Identifies & blocks MALICIOUS traffic\u003C\u002Fli>\n\u003Cli>Enables users to HARDEN their WordPress sites\u003C\u002Fli>\n\u003Cli>Enables users to block ENTIRE countries\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Easy to Use\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Set up an account in 60 secs\u003C\u002Fli>\n\u003Cli>Configure security once & never look at it again\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Agile & responsive customer support\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Why Is MalCare Such a Game-Changer?\u003C\u002Fh3>\n\u003Cp>MalCare offers unparalleled security services. Some services are free and others are paid.\u003C\u002Fp>\n\u003Ch4>MalCare’s FREE Services –\u003C\u002Fh4>\n\u003Col>\n\u003Cli>\n\u003Ch4>Cloud-Based Malware Scanning (Free)\u003C\u002Fh4>\n\u003Cp>MalCare’s Cloud-based Scanning ensures no impact on your website ever. Moreover, it detects Complex Malware missed by other popular security plugins for WordPress.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Web-Application WordPress Firewall (Free)\u003C\u002Fh4>\n\u003Cp>Get Real-Time Protection for your WordPress website against the latest security threats with MalCare’s Smart Firewall. Block hackers & bots before they harm your site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>CAPTCHA-Based Login Page Protection (Free)\u003C\u002Fh4>\n\u003Cp>Automatically prevent brute force attacks with MalCare’s Smart Captcha-Based Login Page Protection. Round-the-clock protection against malicious traffic.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>MalCare’s PAID Services –\u003C\u002Fh4>\n\u003Col>\n\u003Cli>\n\u003Ch4>Viewing Hacked Files (Paid)\u003C\u002Fh4>\n\u003Cp>View the infected files present on your WordPress website. Learn which themes or plugins or files or folders were infected by hackers.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Industry-First Instant Malware Removal (Paid)\u003C\u002Fh4>\n\u003Cp>Clean your hacked site instantly in less than 60 secs with MalCare’s 1-Click Cleaner. Clean your website before Google blacklists it or your web host takes it down.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>WordPress Recommended Website Hardening (Paid)\u003C\u002Fh4>\n\u003Cp>Easily configure WordPress recommended best security practices with just 1-Click from right within MalCare’s dashboard. No technical knowledge needed.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Geo-blocking (Paid)\u003C\u002Fh4>\n\u003Cp>Restrict access to users based on their geographical location. Easily block all visitors from certain countries to mitigate the risk of being hacked.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Uptime Monitoring (Paid)\u003C\u002Fh4>\n\u003Cp>With MalCare’s Uptime Monitoring keep a steady eye on your WordPress site. It ensures that you are not oblivious to website downtime.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Common Hack Attacks Prevented By MalCare\u003C\u002Fh3>\n\u003Cp>MalCare protects websites against all common hack attacks which includes:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-brute-force\u002F\" rel=\"nofollow ugc\">Brute force attacks\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fjapanese-keyword-hack\u002F\" rel=\"nofollow ugc\">Japanese keyword hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-hacked-redirect\u002F\" rel=\"nofollow ugc\">WordPress redirect hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwhat-is-pharma-hack-how-to-clean-it\u002F\" rel=\"nofollow ugc\">Pharma hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fseo-spam\u002F\" rel=\"nofollow ugc\">SEO spam hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-theme-hacked\u002F\" rel=\"nofollow ugc\">WordPress theme hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fspam-link-injection-wordpress\u002F\" rel=\"nofollow ugc\">WordPress spam link injections\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Frevslider-exploit\u002F\" rel=\"nofollow ugc\">Revslider hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-timthumb\u002F\" rel=\"nofollow ugc\">TimThumb hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fadminer-php-hack\u002F\" rel=\"nofollow ugc\">Adminer.php hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fcross-site-scripting-xss-attacks-what-how-prevent-them\u002F\" rel=\"nofollow ugc\">XSS or cross-site scripting hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fhow-to-detect-and-remove-wp-vcd-malware-a-step-by-step-guide-and-a-bonus-plugin\u002F\" rel=\"nofollow ugc\">WP-VCD hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fpreventing-sql-injections\u002F\" rel=\"nofollow ugc\">SQL injection hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fwordpress-malvertising\u002F\" rel=\"nofollow ugc\">WordPress malvertising hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fremove-google-blacklist-warning\u002F\" rel=\"nofollow ugc\">Google Blacklist hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fgoogle-adwords-account-suspended\u002F\" rel=\"nofollow ugc\">Google Adwords hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fsession-hijacking-cookie-stealing\u002F\" rel=\"nofollow ugc\">Cookie stealing & session hijacking\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fhow-to-remove-phishing\u002F\" rel=\"nofollow ugc\">WordPress phishing hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Ffavicon-ico-virus-wordpress\u002F\" rel=\"nofollow ugc\">Favicon.ico virus hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fremoving-wp-feed-php-malware\u002F\" rel=\"nofollow ugc\">WP-Feed.php & WP-Tmp.php\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fhow-to-scan-malware-and-backdoors-of-your-wordpress-site\u002F\" rel=\"nofollow ugc\">Backdoor hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fcoinhive-malware-wordpress\u002F\" rel=\"nofollow ugc\">Coinhive hack\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Fblog\u002Fdeface-wordpress\u002F\" rel=\"nofollow ugc\">WordPress deface hack\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>MalCare Free vs. MalCare Premium\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\n\u003Ch4>Cloud Based Malware Scanner (FREE)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Cloud-Based Malware Scanning \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Deep Malware Scanning – Files & Database \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Website Firewall (FREE)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Web Application Firewall \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Plugin Based Firewall \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Rules update every 7 days \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Login Page Protection \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Bot Protection \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Rules update every 5 mins \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Geo-Blocking \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Website Hardening \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Instant Malware Removal (PAID)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>View Malware Insights \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Instant One-Click Clean Ups \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Automatic Clean-Ups \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Unlimited Clean-Ups \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Personalized Customer Support (Paid)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Support on WordPress forum \u003Cstrong>(Free)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>Support via email and chat \u003Cstrong>(Paid)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Who Can Benefit From MalCare?\u003C\u002Fh3>\n\u003Cp>MalCare is perfect for:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Any WordPress Websites\u003C\u002Fli>\n\u003Cli>Small Business Websites\u003C\u002Fli>\n\u003Cli>Developer Websites\u003C\u002Fli>\n\u003Cli>Web Designing Websites\u003C\u002Fli>\n\u003Cli>eCommerce Stores\u003C\u002Fli>\n\u003Cli>Niche Sites\u003C\u002Fli>\n\u003Cli>Artists & Photographers Sites\u003C\u002Fli>\n\u003Cli>Amateur & Professional Bloggers\u003C\u002Fli>\n\u003Cli>Local Business Sites\u003C\u002Fli>\n\u003Cli>Website for Startups\u003C\u002Fli>\n\u003Cli>Websites Selling Courses\u003C\u002Fli>\n\u003Cli>Influencer Sites\u003C\u002Fli>\n\u003Cli>Web Hosting Companies\u003C\u002Fli>\n\u003Cli>Website Maintenance Services or Agencies\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Detailed Setup Step-by-Step Tutorials\u003C\u002Fh3>\n\u003Cp>This WordPress security plugin works in tandem with the \u003Ca href=\"https:\u002F\u002Fwww.malcare.com\" rel=\"nofollow ugc\">MalCare\u003C\u002Fa> servers. MalCare servers do all the heavy processing and will alert you if your site has any security issues.\u003C\u002Fp>\n\u003Cp>Hence a MalCare account is needed to use the plugin. This account can also be used by our other products including \u003Ca href=\"https:\u002F\u002Fblogvault.net\" rel=\"nofollow ugc\">BlogVault\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcare.freshdesk.com\u002Fsupport\u002Fsolutions\u002Farticles\u002F35000055512-how-do-i-set-up-a-malcare-account-\" rel=\"nofollow ugc\">How to Set Up a MalCare Account?\u003C\u002Fa> (Help Doc)\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=v8L_DZllk7k&list=\" rel=\"nofollow ugc\">How to Set Up a MalCare Account?\u003C\u002Fa> (Video)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>MalCare Full Security Features List\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Ch4>Cloud Based Malware Scanner\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Daily Scan Frequency\u003C\u002Fli>\n\u003Cli>On-demand Site Scans\u003C\u002Fli>\n\u003Cli>Scan Non-WP Files\u003C\u002Fli>\n\u003Cli>Does not slow down your website ever\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Instant Malware Removal\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>View Hacked Files details\u003C\u002Fli>\n\u003Cli>Instant Automatic Malware Removal\u003C\u002Fli>\n\u003Cli>Removal of Unknown & New Malware\u003C\u002Fli>\n\u003Cli>Unlimited Malware Removal\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Intelligent Malware Protection\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Web Application Firewall\u003C\u002Fli>\n\u003Cli>IP Whitelisting\u003C\u002Fli>\n\u003Cli>CAPTCHA-based Login Page Protection\u003C\u002Fli>\n\u003Cli>Traffic Logs\u003C\u002Fli>\n\u003Cli>Login Logs\u003C\u002Fli>\n\u003Cli>Geo-Blocking\u003C\u002Fli>\n\u003Cli>Alerts for Suspicious Logins\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Website Hardening\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Block PHP Execution in Untrusted Folders\u003C\u002Fli>\n\u003Cli>Disable Files Editor\u003C\u002Fli>\n\u003Cli>Block Plugin or Theme Installation\u003C\u002Fli>\n\u003Cli>Change Security Keys\u003C\u002Fli>\n\u003Cli>Reset All Passwords\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Complete Website Management\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Centralized Dashboard\u003C\u002Fli>\n\u003Cli>Plugins & Themes Management & Update\u003C\u002Fli>\n\u003Cli>User Management\u003C\u002Fli>\n\u003Cli>Team Management\u003C\u002Fli>\n\u003Cli>Client Management\u003C\u002Fli>\n\u003Cli>Generate & Schedule Reports\u003C\u002Fli>\n\u003Cli>White-Labeling Solution\u003C\u002Fli>\n\u003Cli>Uptime Monitoring\u003C\u002Fli>\n\u003Cli>Site Speed Monitoring\u003C\u002Fli>\n\u003Cli>Blacklist Alarm\u003C\u002Fli>\n\u003Cli>Slack Integration\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Ch4>Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Email\u003C\u002Fli>\n\u003Cli>Chat\u003C\u002Fli>\n\u003Cli>Social Media\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Fans Are Raving About Us\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fvisualcomposer.com\u002Fblog\u002Fmalcare-review\u002F\" rel=\"nofollow ugc\">MalCare Review on VisualComposer\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.elegantthemes.com\u002Fblog\u002Fresources\u002Fmalcare-security-and-firewall-the-right-security-plugin-for-your-site\" rel=\"nofollow ugc\">MalCare Review on ElegantThemes\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fblog.weglot.com\u002Fideal-security-solution-malcare-review\u002F\" rel=\"nofollow ugc\">MalCare Review on Weglot\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.wpwhitesecurity.com\u002Fmalcare-wordpress-site-security-service-reviewed\u002F\" rel=\"nofollow ugc\">MalCare Review on WPWhiteSecurity\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=2yNIb4Pc_ig\" rel=\"nofollow ugc\">MalCare Reviews by WordPress Influencer Adam Preiser (Plus Real Malware Removal Demo)\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Connect With Our Team of Security Experts\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fgroups\u002FWordPressForWebCreators\u002F\" rel=\"nofollow ugc\">Join MalCare’s Facebook Community\u003C\u002Fa> – The purpose of the group is to enable Web Creators to gain valuable insights and help from community members which will be valuable to their business. So, if you are a WordPress user & want to keep up with the latest industry news and get help for your business, \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fgroups\u002FWordPressForWebCreators\u002F\" rel=\"nofollow ugc\">join us\u003C\u002Fa>!\u003C\u002Fp>\n\u003Ch3>Don’t Know Where to Getting Started? Start From Here –\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcare.freshdesk.com\u002Fsupport\u002Fsolutions\u002Farticles\u002F35000055512-how-do-i-set-up-a-malcare-account-\" rel=\"nofollow ugc\">How to Setup MalCare Account?\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fgroups\u002FWordPressForWebCreators\u002F\" rel=\"nofollow ugc\">Join MalCare Facebook Group MalCare\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fchannel\u002FUC5oQAXXvndQJuyVrWgMRWqg\" rel=\"nofollow ugc\">MalCare Tutorial Videos\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcare.freshdesk.com\u002Fsupport\u002Fhome\" rel=\"nofollow ugc\">User Help Documentations\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.malcare.com\u002Ffaq\u002F\" rel=\"nofollow ugc\">Frequently Asked Questions\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcare.freshdesk.com\u002Fsupport\u002Ftickets\u002Fnew\" rel=\"nofollow ugc\">Support for MalCare Users\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>MalCare vs. Others\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.codeinwp.com\u002Fblog\u002Fsucuri-vs-wordfence-vs-malcare\u002F\" rel=\"nofollow ugc\">MalCare vs Sucuri vs Wordfence by CodeinWP\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpmayor.com\u002Fmalcare-sucuri-wordfence-sitelock-ithemes-security-comparison\u002F\" rel=\"nofollow ugc\">MalCare vs Sucuri vs Wordfence vs SiteLock vs iThemes Security by WPMayor\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","Get Bulletproof Security for your WordPress site. WordPress security plugin packed with comprehensive Firewall, malware scanner, cleaner & more.",200000,17563155,520,"2026-03-23T09:11:00.000Z","4.0",[21,151,22,152,153],"malware-removal","vulnerabilities","wordpress-security","https:\u002F\u002Fwww.malcare.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmalcare-security.zip",100,{"slug":158,"name":159,"version":160,"author":161,"author_profile":162,"description":163,"short_description":164,"active_installs":165,"downloaded":166,"rating":167,"num_ratings":168,"last_updated":169,"tested_up_to":128,"requires_at_least":170,"requires_php":171,"tags":172,"homepage":175,"download_link":176,"security_score":167,"vuln_count":177,"unpatched_count":29,"last_vuln_date":178,"fetched_at":31},"defender-security","Defender Security – Malware Scanner, Login Security & Firewall","5.11.0","WPMU DEV - Your All-in-One WordPress Platform","https:\u002F\u002Fprofiles.wordpress.org\u002Fwpmudev\u002F","\u003Cp>\u003Cstrong>Defender adds the best in WordPress plugin security to your website with just a few clicks, including malware scanner, firewall, password protection, and login security features. Stop brute force login attacks, weak password usage, SQL injections, cross-site scripting (XSS), and other WordPress security vulnerabilities and hacks with Defender’s malware scanner, providing antivirus scans, IP blocking, firewall, activity log, security log, and two-factor authentication (2FA) login security.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>No more complex security settings, Defender’s malware scanner, firewall, and login security features add all the hardening and security you need.\u003C\u002Fp>\n\u003Cp>Defender is brought to you by the WordPress speed specialists that created Smush image optimization, now active on more than +1 million websites.\u003C\u002Fp>\n\u003Cp>Plus, connect for free to WPMU DEV’s AntiBot Global Firewall to block harmful IPs with data from over 750,000 sites.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enjoy complete site protection from malware, vulnerabilities, bot attacks, and session hijacking from the start with \u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002Fproject\u002Fwp-defender\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=defender-readme-above-the-fold&utm_content=wp_defender_pro\" rel=\"nofollow ugc\">Defender Pro\u003C\u002Fa>.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Level up security immediately with exclusive Pro features like scheduled malware scanning, Safe Repair for suspicious files, and known WordPress vulnerability detection. \u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002Fproject\u002Fwp-defender\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=defender-readme-above-the-fold&utm_content=wp_defender_pro\" rel=\"nofollow ugc\">Learn more about Pro\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>Security Recommendations\u003C\u002Fh3>\n\u003Cp>Defender’s one-click security hardening recommendations instantly adds layers of protection and security to your site.\u003C\u002Fp>\n\u003Ch3>Enhance Security and Block Hackers At Every Level:\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Malware Scanner\u003C\u002Fstrong> – Scan WordPress core files for modifications and unexpected changes which may be caused by malware. Scan for malware and tighten up the security of your files.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Outdated & Removed Plugins\u003C\u002Fstrong> – Scans for plugins removed from WordPress.org or not updated in 2+ years.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>AntiBot Global Firewall\u003C\u002Fstrong> – Connect for free to WPMU DEV to block harmful IPs with data from over 750,000 sites.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>WordPress Security Firewall\u003C\u002Fstrong> – Block or allowlist IPs, implement IP blocking, and Geo IP blocking, user agent banning and protect against brute force attacks.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Two-Factor Authentication (2FA)\u003C\u002Fstrong> – Easily set up better security with 2FA to prevent most login attacks such as brute force, App verification, backup codes, lost device email, WooCommerce 2FA, and Web Authentication.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Login Masking\u003C\u002Fstrong> – Change the location of WordPress’s default login area to improve login security.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Login Lockout\u003C\u002Fstrong> – Failed login attempts lockout for even more security assurance.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>User Agent Banning\u003C\u002Fstrong> – Fortify security by blocking bad bots and user agents from accessing your site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Headers\u003C\u002Fstrong> – Add an extra layer of defense security and protect against common attacks like: XSS, code injection, and more.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>404 Detection Security\u003C\u002Fstrong> – Automated block of bot IPs.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Configs\u003C\u002Fstrong> – Create your ideal Defender security plugin settings and export \u002F import saved configs to any other site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Geolocation IP Lockout Security\u003C\u002Fstrong> – Block users based on location and country (IP blocking).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Disable Trackbacks And Pingbacks\u003C\u002Fstrong> – Disable these notifications to enhance spam protection and site security.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Core And Server Update Security Recommendations\u003C\u002Fstrong> – Stay on top of your system security.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Antivirus Scan\u003C\u002Fstrong> – Scan for active security threats, viruses, and other malware.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Disable File Editor\u003C\u002Fstrong> – If they get in, they won’t get far.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Hide Error Reporting\u003C\u002Fstrong> – Hide code errors on the frontend so hackers can’t exploit site security.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Update Security Keys\u003C\u002Fstrong> – Update old WordPress security keys to be more encrypted and provide better security.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Prevent Information Disclosure\u003C\u002Fstrong> – Improve server security and protect sensitive files by locking down specific file types.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Prevent PHP Execution\u003C\u002Fstrong> – Defender bolsters security by automatically preventing any PHP code from being executed.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Bulk Apply Security Recommendations\u003C\u002Fstrong> – Apply multiple recommended security improvements at once for quicker site hardening.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Google reCAPTCHA Security\u003C\u002Fstrong> – Easy to add, stop fraud and abuse – including BuddyPress and WooCommerce.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Cloudflare Turnstile\u003C\u002Fstrong> – Captcha-free protection from spam and automated attacks, including BuddyPress and WooCommerce support.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Pwned Password Check\u003C\u002Fstrong> – Increase security by protecting against compromised passwords.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Force Password Reset\u003C\u002Fstrong> – Force users with selected roles to reset passwords.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Force Strong Passwords\u003C\u002Fstrong> – Ensure users create secure credentials by enforcing robust password requirements.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>User Agent Blocklist Presets\u003C\u002Fstrong> – Easily block unwanted bots and scripts using curated user agent presets.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Known Vulnerability & Suspicious Code Scan (Pro Only)\u003C\u002Fstrong> – Scan WordPress core, themes, and plugins for vulnerabilities and harmful code.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Malicious Bot Detector (Pro Only)\u003C\u002Fstrong> – Block malicious bots with layered defenses, including traps for bots that ignore robots.txt and checks for fake crawlers posing as search engines.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Google Blocklist Monitoring (Pro Only)\u003C\u002Fstrong> – Get instant alerts if your site is flagged by Google.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Session Protection (Pro Only)\u003C\u002Fstrong> – Stop session hijacking and prevent unauthorized account access.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Safe Repair For Suspicious Files (Pro Only)\u003C\u002Fstrong> – Restore or replace compromised files safely with a single click.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Automated Reports (Pro Only)\u003C\u002Fstrong> – Receive scheduled security reports straight to your inbox.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Learn The Ropes With These Hands-On Defender Security Plugin Tutorials\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002Fblog\u002Fhow-to-get-the-most-out-of-defender-security\u002F\" rel=\"nofollow ugc\">How to Get the Most Out of Defender Security\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002Fblog\u002Fstop-hackers-with-defender-wordpress-security-plugin\u002F\" rel=\"nofollow ugc\">How to Stop Hackers in Their Tracks with Defender Security\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002Fblog\u002Fdelete-suspicious-code-defender\u002F\" rel=\"nofollow ugc\">Find Out if You’re Hacked: How to Find and Delete Suspicious Code with Defender Security\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002Fblog\u002Fdefender-ip-address-lockout-firewall\u002F\" rel=\"nofollow ugc\">How to Create a Powerful and Secure Customized Firewall with Defender Security\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>WordPress Security Scans\u003C\u002Fh3>\n\u003Cp>Defender’s malware scanner security checks for suspicious code and malware. It also compares your WordPress install with the WP directory master copy, and reports any changes so you can restore the original file with a click.\u003C\u002Fp>\n\u003Ch3>Two-Factor Authentication (2FA) Security\u003C\u002Fh3>\n\u003Cp>Easily add an extra layer of protection and security to your WordPress sites with Defender’s two-factor authentication (2FA) features. Including: mobile app verification (Google Authenticator, Microsoft Authenticator, Authy), backup code generation, lost device emails, WooCommerce 2FA, Biometric Authentication (fingerprint\u002Ffacial recognition), and Hardware Key Authentication (USB security keys). Easily prevent brute force attacks and login security vulnerabilities.\u003C\u002Fp>\n\u003Ch3>Login Protection\u003C\u002Fh3>\n\u003Cp>Brute force attacks are no match for Defender’s login security. Limit login attempts so hackers can’t guess passwords. Permanently ban IPs or trigger a timed lockout after a set number of failed login attempts. Use Geo IP blocking to ban users from specific countries or locations.\u003C\u002Fp>\n\u003Ch3>Firewall Security and IP Manager\u003C\u002Fh3>\n\u003Cp>Improve your website security with Defender’s IP manager and firewall. Manually block specific IPs, import a list of banned IPs, and set automated timed and permanent lockouts. Defender makes it easy to block and unblock specific locations quickly thanks to its advanced firewall security(WAF) offering Geographical IP blocking.\u003C\u002Fp>\n\u003Ch3>User Agent Banning\u003C\u002Fh3>\n\u003Cp>Add user agents to the block or allowlist and stop bad bots from spamming and scraping your site. All major search engines and special network bots are allow-listed out of the box. Easy to set up, Defender’s user agent banning tool now includes built-in bot and script presets to help you quickly block malicious traffic. It does all the security work for you—no editing of the .htaccess file required.\u003C\u002Fp>\n\u003Ch3>Google reCAPTCHA Integration\u003C\u002Fh3>\n\u003Cp>Add reCAPTCHA security to your login \u002F registration pages, lost password forms, and post comments in a couple of steps to up security and help protect from fraud and abuse. Select reCAPTCHA type, language, location, and style to suit. As well as Google, Defender also supports the following reCAPTCHA types:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>BuddyPress reCAPTCHA\u003C\u002Fli>\n\u003Cli>WooCommerce reCAPTCHA\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Login Screen Masking\u003C\u002Fh3>\n\u003Cp>Defender makes it easy to move your login screen to a custom URL. Not only does login screen masking improve security, but it also lets you white label your login user experience and improves branding.\u003C\u002Fp>\n\u003Ch3>Force Password Reset\u003C\u002Fh3>\n\u003Cp>Enhance site security by forcing all users with selected roles to reset their password at any time. Especially helpful if you suspect a possible data breach on your site.\u003C\u002Fp>\n\u003Ch3>Security Headers\u003C\u002Fh3>\n\u003Cp>Protect your site against common attacks, such as: XSS, code injection, cross site scripting, and more. Enable the following security headers:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>X-Frame-Options\u003C\u002Fli>\n\u003Cli>X-XSS-Protection\u003C\u002Fli>\n\u003Cli>X-Content-Type-Options\u003C\u002Fli>\n\u003Cli>Strict Transport\u003C\u002Fli>\n\u003Cli>Referrer Policy\u003C\u002Fli>\n\u003Cli>Permissions-Policy\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>404 Limiter\u003C\u002Fh3>\n\u003Cp>Detect when bots are being used to scan your site for security vulnerabilities and shut them down. The 404 limiter lets you stop the scan by detecting when a bot keeps visiting pages that do not exist, which can also save you from a giant strain on your site’s performance.\u003C\u002Fp>\n\u003Ch3>Security Notifications and Reports\u003C\u002Fh3>\n\u003Cp>Defender runs surveillance and sends security notifications with information that matters. All activity and notifications are recorded in the activity log to let you see at a glance the website security actions that have been taken by the Defender security plugin.\u003C\u002Fp>\n\u003Ch3>Reduce Security Setup Time With Saved Configs\u003C\u002Fh3>\n\u003Cp>Save your Defender security plugin configurations and reapply them to your other sites in just a few clicks. You can create and save an unlimited number of security configurations.\u003C\u002Fp>\n\u003Ch3>Pwned Password Check\u003C\u002Fh3>\n\u003Cp>Entered passwords are checked against public database breach records to further boost security. If a password is identified as compromised, the user will be asked to change it.\u003C\u002Fp>\n\u003Ch3>Custom IP Block\u002FAllowlist\u003C\u002Fh3>\n\u003Cp>Create your IP block\u002Fallow list once, then apply and automatically sync it to all your other sites with just a single click. Save hours by not having to manually add IPs to each individual site. *Note: a [free WPMU DEV account] (https:\u002F\u002Fwpmudev.com\u002Fregister) is required to access this feature.\u003C\u002Fp>\n\u003Ch3>What Do People Say About Defender?\u003C\u002Fh3>\n\u003Cp>★★★★★\u003Cbr \u002F>\n“I found other pro security plugins a bit too fiddly for my taste…I’m delighted with Defender” – \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002Fkeithadv\" rel=\"nofollow ugc\">KeithADV\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>★★★★★\u003Cbr \u002F>\n“Thank you for bringing back a free and easy to use 2-Factor Authentication after Clef! Defender helps keep me aware of my site’s security.” – \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fusers\u002Fawijasa\u002F\" rel=\"ugc\">awijasa\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>★★★★★\u003Cbr \u002F>\n“Defender’s interface is very intuitive with warnings that are very helpful” – \u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002Fprofile\u002Fdjohns\" rel=\"nofollow ugc\">djohns\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>★★★★★\u003Cbr \u002F>\n“Defender Recently blocked over 3000 attacks in one week without any noticeable impact on the website. WPMUDEV knocking it out of the park on this one.” – \u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002Fprofile\u002Fdavidoswald\u002F\" rel=\"nofollow ugc\">David Oswald\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Secure Websites, More Trust, Better Profit\u003C\u002Fh3>\n\u003Cp>If you’re running a business website or eCommerce store, privacy, security, uptime and trust are essential.\u003C\u002Fp>\n\u003Cp>The Defender security plugin is here to help you: it’s a one of a kind WordPress security plugin that makes web security easy for anyone, for free!\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Malware scanner\u003C\u002Fli>\n\u003Cli>Google two-factor authentication (2FA)\u003C\u002Fli>\n\u003Cli>Web Authentication\u003C\u002Fli>\n\u003Cli>Firewall setup and configuration\u003C\u002Fli>\n\u003Cli>One-click site hardening and security tweaking\u003C\u002Fli>\n\u003Cli>WordPress core file scanning and repair\u003C\u002Fli>\n\u003Cli>Ongoing firewall security\u003C\u002Fli>\n\u003Cli>Google reCAPTCHA\u003C\u002Fli>\n\u003Cli>Security headers\u003C\u002Fli>\n\u003Cli>One-click security configs\u003C\u002Fli>\n\u003Cli>Login Screen Masking\u003C\u002Fli>\n\u003Cli>Pwned Password Check\u003C\u002Fli>\n\u003Cli>IP Blocklist manager and logging\u003C\u002Fli>\n\u003Cli>Geo IP blocking\u003C\u002Fli>\n\u003Cli>User agent banning\u003C\u002Fli>\n\u003Cli>Unlimited file scans\u003C\u002Fli>\n\u003Cli>Timed Lockout brute force login attack shield for login security\u003C\u002Fli>\n\u003Cli>404 limiter for blocking vulnerability scans\u003C\u002Fli>\n\u003Cli>IP lockout notifications and security reports\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>All the above is free and will enhance WordPress security for you. If you need extra security for your WordPress site, \u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=defender-readme&utm_content=you_should_get_wpmudev_membership#trial\" rel=\"nofollow ugc\">you should get a WPMU DEV Membership\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Our Membership gives you access to Defender Pro – which security features include automated scanning, scheduled malware scans for Core, themes, plugins and other files, audit logs, firewall protection, Safe Repair, Blocklist monitoring – alongside Snapshot Pro cloud backups, the Hub with automated plugin, theme and core updates and safe-upgrade scans, all our premium WordPress plugins, 24\u002F7 WordPress support and if your sites already been hacked our team of security experts will clean it up at no additional cost.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=defender-readme&utm_content=and_you_can_find_out_more_here#trial\" rel=\"nofollow ugc\">It’s an incredible deal, and you can find out more here\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>About Us\u003C\u002Fh3>\n\u003Cp>WPMU DEV is a premium supplier of quality WordPress plugins and themes. For premium support with any WordPress-related issues you can join us here:\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=defender-readme&utm_content=wpmu_dev_link\" rel=\"nofollow ugc\">https:\u002F\u002Fwpmudev.com\u002F\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Don’t forget to stay up to date on everything WordPress from the Internet’s number one resource:\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwpmudev.com\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=defender-readme&utm_content=wpmu_dev_blog_link\" rel=\"nofollow ugc\">WPMU DEV Blog\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Hey, one more thing… we hope you \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002FWPMUDEV\u002F\" rel=\"nofollow ugc\">enjoy our free offerings\u003C\u002Fa> as much as we’ve loved making them for you!\u003C\u002Fp>\n","WordPress security plugin with malware scanner, IP blocking, audit logs, antivirus scans, firewall, 2FA, brute force login security, and more.",90000,4087538,96,330,"2026-04-07T13:07:00.000Z","6.4","8.0.0",[21,173,174,22,23],"login-security","malware","https:\u002F\u002Fwpmudev.com\u002Fproject\u002Fwp-defender\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdefender-security.5.11.0.zip",7,"2024-06-28 00:00:00",{"slug":180,"name":181,"version":182,"author":183,"author_profile":184,"description":185,"short_description":186,"active_installs":187,"downloaded":188,"rating":167,"num_ratings":189,"last_updated":190,"tested_up_to":126,"requires_at_least":17,"requires_php":128,"tags":191,"homepage":193,"download_link":194,"security_score":195,"vuln_count":196,"unpatched_count":29,"last_vuln_date":197,"fetched_at":31},"bulletproof-security","BulletProof Security","7.1","AITpro","https:\u002F\u002Fprofiles.wordpress.org\u002Faitpro\u002F","\u003Cp>WordPress Security Protection: Malware scanner, Firewall, Login Security, DB Backup, Anti-Spam… View Security feature highlights below. View BulletProof Security feature details under the FAQ help section below. Effective, Reliable & Easy to use WordPress Security Plugin.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>BulletProof Security is a proactive security plugin that automatically fixes 100+ known issues\u002Fconflicts with other plugins\u003C\u002Fstrong>.\u003Cbr \u002F>\n* \u003Ca href=\"https:\u002F\u002Fforum.ait-pro.com\u002Fforums\u002Ftopic\u002Fsetup-wizard-autofix\u002F\" title=\"BPS Setup Wizard AutoFix\" rel=\"nofollow ugc\">BPS Setup Wizard AutoFix\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>BulletProof Security Installation and Setup Video Tutorial\u003C\u002Fh4>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FRZ1ARaEE0_I?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fp>\n\u003Ch4>BulletProof Security Feature Highlights\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>One-Click Setup Wizard\u003C\u002Fli>\n\u003Cli>Setup Wizard AutoFix (AutoWhitelist|AutoSetup|AutoCleanup)\u003C\u002Fli>\n\u003Cli>MScan Malware Scanner\u003C\u002Fli>\n\u003Cli>.htaccess Website Security Protection (Firewalls)\u003C\u002Fli>\n\u003Cli>Hidden Plugin Folders|Files Cron (HPF)\u003C\u002Fli>\n\u003Cli>Login Security & Monitoring\u003C\u002Fli>\n\u003Cli>JTC-Lite (Limited version of BPS Pro JTC Anti-Spam|Anti-Hacker)\u003C\u002Fli>\n\u003Cli>Idle Session Logout (ISL)\u003C\u002Fli>\n\u003Cli>Auth Cookie Expiration (ACE)\u003C\u002Fli>\n\u003Cli>DB Backup: Full|Partial DB Backups | Manual|Scheduled DB Backups | Email Zip Backups | Cron Delete Old Backups\u003C\u002Fli>\n\u003Cli>DB Table Prefix Changer\u003C\u002Fli>\n\u003Cli>Security Logging\u003C\u002Fli>\n\u003Cli>HTTP Error Logging\u003C\u002Fli>\n\u003Cli>FrontEnd|BackEnd Maintenance Mode\u003C\u002Fli>\n\u003Cli>Extensive System Info (System Info page)\u003C\u002Fli>\n\u003Cli>WordPress Automatic Update Options\u003C\u002Fli>\n\u003Cli>Force Strong Passwords (FSP)\u003C\u002Fli>\n\u003Cli>Send email alerts when new Plugin & Theme updates are available\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>BulletProof Security Pro Feature Highlights\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>One-Click Setup Wizard\u003C\u002Fli>\n\u003Cli>Setup Wizard AutoFix (AutoWhitelist|AutoSetup|AutoCleanup)\u003C\u002Fli>\n\u003Cli>AutoRestore Intrusion Detection & Prevention System (ARQ IDPS)\u003C\u002Fli>\n\u003Cli>Quarantine Intrusion Detection & Prevention System (ARQ IDPS)\u003C\u002Fli>\n\u003Cli>Real-time File Monitor (IDPS)\u003C\u002Fli>\n\u003Cli>MScan Malware Scanner\u003C\u002Fli>\n\u003Cli>DB Monitor Intrusion Detection System (IDS)\u003C\u002Fli>\n\u003Cli>DB Diff Tool: data comparison tool\u003C\u002Fli>\n\u003Cli>DB Backup: Full|Partial DB Backups | Manual|Scheduled DB Backups | Email Zip Backups | Cron Delete Old Backups\u003C\u002Fli>\n\u003Cli>DB Status & Info: extensive database status & info\u003C\u002Fli>\n\u003Cli>Plugin Firewall (IP Firewall): Automated Whitelisting & IP Address Updated in Real-time\u003C\u002Fli>\n\u003Cli>JTC Anti-Spam|Anti-Hacker\u003C\u002Fli>\n\u003Cli>Uploads Folder Anti-Exploit Guard (UAEG)\u003C\u002Fli>\n\u003Cli>.htaccess Website Security Protection (Firewalls)\u003C\u002Fli>\n\u003Cli>Hidden Plugin Folders|Files Cron (HPF)\u003C\u002Fli>\n\u003Cli>Custom php.ini Website Security\u003C\u002Fli>\n\u003Cli>Login Security & Monitoring w\u002FDashboard Alerting|Status Display & additional options\u002Ffeatures\u003C\u002Fli>\n\u003Cli>Idle Session Logout (ISL)\u003C\u002Fli>\n\u003Cli>Auth Cookie Expiration (ACE)\u003C\u002Fli>\n\u003Cli>File|Folder Lock: File Locking | Detect & Lock Folders that were not created by you\u003C\u002Fli>\n\u003Cli>FrontEnd|BackEnd Maintenance Mode\u003C\u002Fli>\n\u003Cli>Security Logging\u003C\u002Fli>\n\u003Cli>HTTP Error Logging\u003C\u002Fli>\n\u003Cli>PHP Error Logging\u003C\u002Fli>\n\u003Cli>DB Table Prefix Changer\u003C\u002Fli>\n\u003Cli>Pro-Tools: 16 mini-plugins\u003C\u002Fli>\n\u003Cli>Heads Up Dashboard Status Display\u003C\u002Fli>\n\u003Cli>Extensive System Info (System Info page)\u003C\u002Fli>\n\u003Cli>WordPress Automatic Update Options\u003C\u002Fli>\n\u003Cli>Force Strong Passwords (FSP)\u003C\u002Fli>\n\u003Cli>Send email alerts when new Plugin & Theme updates are available\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.ait-pro.com\u002Fbps-features\u002F\" title=\"BulletProof Security Features\" rel=\"nofollow ugc\">View All BulletProof Security Pro Feature Details\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>BulletProof Security Recommended Video Tutorials\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fforum.ait-pro.com\u002Fvideo-tutorials\u002F#custom-code\" title=\"BulletProof Security Custom Code Video Tutorial\" rel=\"nofollow ugc\">BulletProof Security Custom Code Video Tutorial\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fforum.ait-pro.com\u002Fvideo-tutorials\u002F#security-log-firewall\" title=\"BulletProof Security Security Log Video Tutorial\" rel=\"nofollow ugc\">BulletProof Security Security Log Video Tutorial\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Help Info\u003C\u002Fh3>\n\u003Cp>For details about BulletProof Security plugin features and frequently asked questions see the \u003Ca href=\"https:\u002F\u002Fforum.ait-pro.com\u002Fforums\u002Ftopic\u002Fbulletproof-security-plugin-frequently-asked-questions\u002F\" title=\"AIT-pro.com Forum\" rel=\"nofollow ugc\">BulletProof Security Plugin Frequently Asked Questions\u003C\u002Fa> forum topic. Extensive Help Info can be found on the \u003Ca href=\"https:\u002F\u002Fforum.ait-pro.com\u002Fforums\u002Ftopic\u002Fread-me-first-free\u002F#bps-free-general-troubleshooting\" title=\"AIT-pro.com Forum\" rel=\"nofollow ugc\">AIT-pro.com Forum\u003C\u002Fa> website and by clicking the Question Mark Help buttons on BulletProof Security plugin pages.\u003C\u002Fp>\n","WordPress Security Protection: Malware scanner, Firewall, Login Security, DB Backup, Anti-Spam...",30000,4516831,674,"2025-12-08T15:11:00.000Z",[21,173,22,192,23],"secure","https:\u002F\u002Fforum.ait-pro.com\u002Fread-me-first\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbulletproof-security.7.1.zip",89,12,"2026-01-06 00:00:00",{"slug":199,"name":200,"version":201,"author":202,"author_profile":203,"description":204,"short_description":205,"active_installs":206,"downloaded":207,"rating":123,"num_ratings":208,"last_updated":209,"tested_up_to":126,"requires_at_least":210,"requires_php":18,"tags":211,"homepage":214,"download_link":215,"security_score":167,"vuln_count":60,"unpatched_count":29,"last_vuln_date":216,"fetched_at":31},"wp-malware-removal","Malcure Malware Shield — Removal, Repair, Monitor","19.9.1","Malcure Web Security","https:\u002F\u002Fprofiles.wordpress.org\u002Fmalcure\u002F","\u003Cp>Is your website acting strangely? Seeing ‘Deceptive Site Ahead’ warnings, Japanese spam, SEO spam, or random redirects? Time to fix and monitor your site with \u003Cstrong>Malcure Malware Shield\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch3>Malcure Malware Shield: The Powerful Antivirus\u003C\u002Fh3>\n\u003Cp>Just as your computer requires antivirus, your website demands specialized \u003Cstrong>antivirus-grade protection\u003C\u002Fstrong>. Malcure Malware Shield delivers comprehensive, \u003Cstrong>antivirus-style\u003C\u002Fstrong> detection with advanced signatures to identify viruses, trojans, backdoors, adware, and ransomware. Unlike basic security plugins, it operates with the precision of an antivirus engine, scanning every layer of your site—from core files to the database—to ensure your website remains virus-free and secure.\u003C\u002Fp>\n\u003Ch3>Malware Removal, Hack Repair & SEO Spam Cleanup\u003C\u002Fh3>\n\u003Cp>Malware attacks are evolving. Standard scanners often miss hidden backdoors and database infections. If your current security plugin says “All Clear” but your site is still broken, you need \u003Cstrong>Malcure Malware Shield\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Malcure Malware Shield\u003C\u002Fstrong> is the intelligent, lightweight security solution. We believe security should be simple on the surface but deep under the hood. No complex settings. No bloat. Just activate and scan.\u003C\u002Fp>\n\u003Cp>Lightweight, API-driven scanning runs only on demand or on scheduled scans — no persistent background processes.\u003C\u002Fp>\n\u003Cp>Unlike scanners that delay new malware definitions for days, Malcure delivers real-time threat intelligence to every user so you’re protected against the latest threats as soon as they emerge.\u003C\u002Fp>\n\u003Ch3>What Our Users Say\u003C\u002Fh3>\n\u003Cp>Quotes are verbatim from WordPress.org support reviews, except for bracketed edits (for example, competitor names removed).\u003C\u002Fp>\n\u003Ch4>Best by far, better than [competitor name removed] and other giants\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>“You can see it is a bunch of geeks that created this, with skill and visual creativity at that. I spent hours trying to find a plugin like this. So many options and such bad results until now. Great job guys. You deserve it. Simple and effective. (Disclaimer to other potential readers: there are many types of hacks\u002Fmalware out there, every scenario is different, but start with the Malcure scan and see how it goes. 9\u002F10 you won’t be disappointed, my guess)” — \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Ftopic\u002Fbest-by-far-better-than-wordfence-and-other-giants\u002F\" rel=\"ugc\">@dalingzaf\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>The ONLY plugin that scans files…\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>“I am a web developer and have tried many malware removal plugins, including popular ones [competitor names removed]. However, none of them detected some unusual files that were actually malware causing regular attacks. Some of these files were in JPG format.” — \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Ftopic\u002Fthe-only-plugin-that-scans-files-in-real-time-2\u002F\" rel=\"ugc\">@devzeeshanx\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>Best Malware Removal Plugin in just few minutes\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>“Most security plugins that are free only scan the code, but Malcure Malware Removal Plugin scans the wordpress database and the code files in few minutes. Accurately shows which Database table row is infected and it helps resolve the hacking attempt instantly. Saves a lot of time for the developers. Thank You Team Malcure” — \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Ftopic\u002Fbest-malware-removal-plugin-in-just-few-minutes\u002F\" rel=\"ugc\">@s3630\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>It’s not just a “teaser”\u003C\u002Fh4>\n\u003Cblockquote>\n\u003Cp>“This plugin really found the malware, and removed it. Really for free. Thanks guys, I’m going to donate now!” — \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Ftopic\u002Fits-not-just-a-teaser\u002F\" rel=\"ugc\">@halucska\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch3>Malware Removal & Hack Repair\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Checksum Verification:\u003C\u002Fstrong> We verify core, plugin, and theme file integrity against the official repository checksums served by our SaaS API endpoint.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Deep Scan:\u003C\u002Fstrong> If checksums fail, Malcure runs a full scan against malware detection signatures detecting estimated 50,000+ variants.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Inspect & Repair:\u003C\u002Fstrong> Inspect infected database records and files. Assists in cleaning compromised files and database entries.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SEO Spam Specialist:\u003C\u002Fstrong> Detects and removes the notorious “Japanese Keyword Hack” and pharma spam from your files and database, helping restore your Google rankings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Virus Scanner & Threat Detection\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Database Scan:\u003C\u002Fstrong> Scans database tables for malicious injections and spam links.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>File Scan:\u003C\u002Fstrong> Scans core files, themes, plugins, images, and uploads for backdoors and obfuscated code.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Vulnerability Detection:\u003C\u002Fstrong> Checks your core, plugins, and themes for known security flaws.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>DeepScan™ Technology:\u003C\u002Fstrong> Scans backups, archives, images, and hidden files where malware hides.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Ultra-High Precision:\u003C\u002Fstrong> Uses intelligent checksum verification (comparing your files to official core\u002Fplugin\u002Ftheme checksums) to dramatically reduce false alarms compared to heuristic-only scanners.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Intelligent Health Monitor\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Always-On Guard:\u003C\u002Fstrong> Continuous monitoring via \u003Cstrong>Scheduled Scans\u003C\u002Fstrong> (daily\u002Fweekly\u002Fmonthly) configurable cadence.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Instant Alerts:\u003C\u002Fstrong> Every time a scheduled scan completes, you get an instant email report telling you if your site is clean or infected.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Event Log:\u003C\u002Fstrong> Track the events leading up to a malware incident for faster root-cause analysis.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Powered by Malcure API: Real-Time Threat Intelligence\u003C\u002Fh3>\n\u003Cp>Hackers don’t sleep, and neither do we. Malcure Malware Shield connects to our real-time API to fetch the latest threat definitions.\u003C\u002Fp>\n\u003Cp>This plugin relies on the Malcure API to provide real-time threat intelligence and checksum verification.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Data Transmission:\u003C\u002Fstrong> To perform scans, the plugin sends file checksums and your site’s domain to Malcure servers. No sensitive user data is transmitted.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Terms & Privacy:\u003C\u002Fstrong> Use of the API is subject to our \u003Ca href=\"https:\u002F\u002Fwww.malcure.com\u002F?p=1720&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Terms of Use\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=3&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Zero-Day Alerts:\u003C\u002Fstrong> Our API serves new threat-intelligence in real-time, ensuring the site is scanned against the latest vulnerabilities.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Smart Checksums:\u003C\u002Fstrong> We verify your core files, themes, and plugins against the official repository checksums using our API, ensuring absolute integrity.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Lightweight:\u003C\u002Fstrong> The scanner only uses minimum resources to keep your server fast and responsive.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Why Keep Malcure Malware Shield Installed?\u003C\u002Fh3>\n\u003Ch4>Reinfection Risk & Continuous Monitoring\u003C\u002Fh4>\n\u003Cp>Malware cleanup is not a one-and-done task. New vulnerabilities and reinfections can appear without warning, so continuous monitoring and scheduled scans help catch issues early—before SEO damage, blacklists, or downtime. You get email notification with the results to rest assured that the site is clean or when immediate action is required.\u003C\u002Fp>\n\u003Cp>Cleaning your site is just step one. Malcure is your anti-malware health monitor.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Continuous Monitoring:\u003C\u002Fstrong> Scheduled scans watch your site for changes so you don’t have to.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Real-Time Event Log:\u003C\u002Fstrong> See exactly what’s happening on your site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Early Warning:\u003C\u002Fstrong> Catch new infections before Google blacklists you.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Recurrence Prevention:\u003C\u002Fstrong> Scheduled scans and integrity checks catch reinfections before they spread.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>No Bloat:\u003C\u002Fstrong> Designed to run on-demand or as per schedule without slowing down your site.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Who This Plugin Is For\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Site owners\u003C\u002Fstrong> who want clear, actionable results (what was flagged and where).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Agencies & developers\u003C\u002Fstrong> who need fast triage across multiple sites.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>WooCommerce \u002F membership \u002F lead-gen sites\u003C\u002Fstrong> where downtime, SEO brand-reputation damage are expensive.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Anyone\u003C\u002Fstrong> who wants a scanner that cuts through the noise to focus on \u003Cem>signal\u003C\u002Fem>—real threats with practical remediation paths.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>How It Works (Scan \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> Review \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> Clean \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> Monitor)\u003C\u002Fh4>\n\u003Col>\n\u003Cli>\n\u003Cp>\u003Cstrong>Scan\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Go to \u003Cstrong>Malcure Scanner\u003C\u002Fstrong> in your Admin Dashboard.\u003C\u002Fli>\n\u003Cli>Run a scan to check your files and database for vulnerabilities, malware, backdoors, suspicious code, and integrity issues.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Review\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Malcure reports findings with clear locations (file paths \u002F database records) so you can verify what changed and why it was flagged.\u003C\u002Fli>\n\u003Cli>Use the results to decide what should be repaired, deleted, or kept (for example, legitimate custom code).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Clean & Recover\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>The free edition helps you identify issues, inspect data and understand what needs fixing.\u003C\u002Fli>\n\u003Cli>The Advanced Edition adds Whitelisting, Advanced Scan Filters, File Operations, WP CLI Automation, Deployment, Bulk Client-Servicing Features, Background Scan & Premium Support (Expertise).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Monitor\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Set up scheduled scans to keep your site continuously monitored.\u003C\u002Fli>\n\u003Cli>Get email alerts for new infections or integrity issues.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>Is It Free?\u003C\u002Fh4>\n\u003Cp>We believe in 100% transparency.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Free Forever:\u003C\u002Fstrong> Professional-grade Detection (Knowledge). You see every infected file and database row (exact file path & line number), so you can clean it yourself for free.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Free Forever:\u003C\u002Fstrong> Real-time Threat Intelligence & Monitoring.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Pro Upgrade:\u003C\u002Fstrong> Whitelisting, Advanced Scan Filters, File Operations, WP CLI Automation, Deployment, Bulk Client-Servicing Features, Background Scan & Premium Support (Expertise).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>You are never forced to pay to \u003Cem>find\u003C\u002Fem> a hack.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FEbSbxiTOc8k?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Ch4>Core Features (Free Forever)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Deep Malware Scan:\u003C\u002Fstrong> Scans core files, themes, plugins, images, and your entire database for vulnerabilities, viruses, trojans, backdoors, and \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=60&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">malicious redirects\u003C\u002Fa>.\n\u003Cul>\n\u003Cli>\u003Cstrong>Files:\u003C\u002Fstrong> Scans core files, themes, plugins, images, and uploads for backdoors, shells including variants like C99, R57, RootShell, dolohan, Crystal Shell, Matamu, Cybershell, W4cking, Sniper, Predator, Jackal, Phantasma, GFS, Dive, Dx, obfuscated code and many more known and unknown variants.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Database:\u003C\u002Fstrong> Scans database tables for malicious injections, recurring malware and spam links.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SEO Spam Detection:\u003C\u002Fstrong> Specifically checks page titles and database records for “Japanese Keyword Hack”, “Pharma Hack” and other SEO spam symptoms.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Vulnerability Scanner:\u003C\u002Fstrong> Checks your installed plugins and themes against our real-time database of known security vulnerabilities.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Intelligent Checksum Verification:\u003C\u002Fstrong> Automatically verifies your core files, themes, and plugins against the official checksums. If a file has been tampered with, we know instantly.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Uncompromising Detection:\u003C\u002Fstrong> Detects variants like C99, R57, RootShell, dolohan, Crystal Shell, Matamu, Cybershell, W4cking, Sniper, Predator, Jackal, Phantasma, GFS, Dive, Dx, obfuscated code and many more known and unknown variants.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Attack Surface Hardening & Firewall:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>\u003Cstrong>Block Path Traversal:\u003C\u002Fstrong> Stops attackers from accessing sensitive system files.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Block PHP Uploads:\u003C\u002Fstrong> Prevents malicious scripts from being uploaded to your site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Stop User Enumeration:\u003C\u002Fstrong> Blocks bots from fishing for your username.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>REST API Protection:\u003C\u002Fstrong> Prevents user data leakage via the WP REST API.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=1622&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Security Hardening\u003C\u002Fa>:\u003C\u002Fstrong> Learn more about securing your site.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Recurrence Watchdog (Background Monitor):\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>\u003Cstrong>Set it and forget it:\u003C\u002Fstrong> Malcure runs silently in the background using scheduled scans (configurable cadence) + integrity baseline to monitor changes.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Stay Ahead:\u003C\u002Fstrong> Automatically catch new infections before they spread or damage your SEO rankings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Incident Response Toolkit:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>\u003Cstrong>Nuke User Sessions:\u003C\u002Fstrong> Instantly force-logout every user on the site to kick out intruders.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Salt Shuffler:\u003C\u002Fstrong> One-click rotation of \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5230&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">security keys (salts)\u003C\u002Fa> to invalidate all browser cookies.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Forensic Flight Recorder (Event Log):\u003C\u002Fstrong> Track every security event. Know exactly \u003Cem>when\u003C\u002Fem> and \u003Cem>how\u003C\u002Fem> a breach might have occurred with our 100-day event log.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Google Search Console Integration:\u003C\u002Fstrong> Connect directly to Google to fetch security warnings and blacklist status in real-time.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Real-Time API Updates:\u003C\u002Fstrong> Connects to the Malcure Cloud to fetch the latest threats and vulnerabilities.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Upgrade to Advanced Edition\u003C\u002Fh4>\n\u003Cp>For mission-critical websites that demand comprehensive protection and recovery tools.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>1-Click Surgical Repair:\u003C\u002Fstrong> Inspect, Delete, or Repair infected files instantly.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Advanced Whitelisting:\u003C\u002Fstrong> Stop false alarms. Supports files, folders, and \u003Cstrong>Database Records\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>WP-CLI Integration:\u003C\u002Fstrong> Complete command-line control for automated scanning and reporting, including async scan start\u002Fstatus\u002Fcancel, definitions export\u002Fimport, forced definition sync, and full official checksum refresh.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Automatic Definition Updates:\u003C\u002Fstrong> Definitions update automatically in the background.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>On-Demand Background Scans:\u003C\u002Fstrong> Trigger deep scans immediately without keeping your browser open.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Advanced Scan Filters:\u003C\u002Fstrong> For when you are specifically looking for something in the files or database or want to include, exclude specific files & directories\u003C\u002Fli>\n\u003Cli>\u003Cstrong>File Operations:\u003C\u002Fstrong> Critical file operations like deletion.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Bulk Client-Servicing Features:\u003C\u002Fstrong> Like copying scan results to generate report for clients.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Background Scan:\u003C\u002Fstrong> For when you want to trigger a scan and forget it. The scan continues and emails you upon completion.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Premium Support (Expertise):\u003C\u002Fstrong> When you want to consult or want to exploit advanced features or need help troubleshooting.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>High-Priority Support:\u003C\u002Fstrong> Direct access to our security analysts.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=116&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">\u003Cstrong>Get Malcure Advanced Edition\u003C\u002Fstrong>\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Additional Resources for Malware Removal\u003C\u002Fh4>\n\u003Cp>Follow these expert guides to remove malware, recover lost traffic, and restore your online reputation:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=1540&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">A step by step guide to remove the malware\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=13946&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Japanese Keyword Hack: How to Remove SEO Spam\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5728&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">What is the Pharma Hack & How to fix it\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=14143&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Fix Google Ads Disapproved for Malicious Software\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=14477&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Prevent SQL Injection Attacks\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5265&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Live Malware Infection Removal & Analysis\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=7207&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Fix “This Site May Harm Your Computer” Warning\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=60&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Comprehensive Guide to Removing JavaScript Redirect Malware\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5699&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Fix a Blank WP-Admin Page\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=9102&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Malcure WP CLI Integration & Cheatsheet\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=14375&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Prevent Brute Force Attacks\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5230&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">How to Change Salt Keys\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Expert Malware Removal Service\u003C\u002Fh4>\n\u003Cp>In over your head? Our security analysts are on standby. We offer a complete \u003Cstrong>Malware Removal Service\u003C\u002Fstrong> that includes:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>100% Removal Guarantee:\u003C\u002Fstrong> We guarantee to remove all malware from your website.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Same Day Service:\u003C\u002Fstrong> Fast turnaround time to get your business back online.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Manual Inspection:\u003C\u002Fstrong> Our experts manually inspect critical files (htaccess, wp-config, index.php) and your database.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Blacklist Removal:\u003C\u002Fstrong> We handle the removal of your site from blacklists like Google, Norton, McAfee, etc.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Hardening:\u003C\u002Fstrong> We identify the root cause and patch vulnerabilities to prevent future infections.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>15-Day Cover:\u003C\u002Fstrong> Security analysts available 24\u002F7\u002F365 to ensure your site stays clean.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=107&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">\u003Cstrong>Book Expert Malware Removal\u003C\u002Fstrong>\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Troubleshooting\u003C\u002Fh3>\n\u003Ch4>Some files are detected by Malcure Malware Shield as “suspicious”. What gives?\u003C\u002Fh4>\n\u003Cp>Malcure’s DeepScan checks each file for malware. However some files aren’t pure malware but may contain code that is suspicious and could potentially do nasty things. You should carefully review and analyse them to see if they indeed do anything nasty.\u003C\u002Fp>\n\u003Ch4>I can’t get Malcure Malware Shield to work. It hangs \u002F doesn’t complete the scan \u002F breaks for some reason.\u003C\u002Fh4>\n\u003Cp>If you think that the plugin is broken, \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5677&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">please report it here\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Malcure Malware Shield (or for that matter other plugins) may break on malware affected \u002F broken websites. \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=116&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Malcure Advanced Edition\u003C\u002Fa> integrates with WP CLI and allows you to complete the scan from WP CLI even when the site is blocked by the webhost or when you are unable to login to the website.\u003C\u002Fp>\n\u003Ch4>My site is infected however Malcure Malware Shield doesn’t detect the infection.\u003C\u002Fh4>\n\u003Cp>Malware keeps evolving. If you come across malware that Malcure Malware Shield is not able to identify, you may \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=157&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">please report it here\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>The scan gets stuck midway. What should I do?\u003C\u002Fh4>\n\u003Cp>In case of such an event, please file a support request with us and we’ll be more than happy to troubleshoot the issue.\u003C\u002Fp>\n\u003Cp>Please visit \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=5677&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">this page\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>I cleaned my site but it got infected again. What should I do?\u003C\u002Fh4>\n\u003Cp>Malware cleanup is a waste of time and effort unless you find the root cause behind the malware infection and monitor for recurrence. How was someone able to infect your website? Have you plugged in that security hole?\u003C\u002Fp>\n\u003Cp>Please read \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002Fblog\u002Fsecurity\u002Fwhy-do-wordpress-websites-get-hacked\u002F?utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Why Do Websites Get Hacked\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>Google Safe Browsing site status (or some other scanner) still shows my site as infected. What should I do?\u003C\u002Fh4>\n\u003Cp>First make sure you purge your site cache. Second, Google (and other scanners) cache the results for some time. You’ll need to force or refresh the scan. You can also file a request with us to \u003Ca href=\"https:\u002F\u002Fwww.malcure.com\u002F?p=107&utm_source=readmefaq&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">get your site off any blacklists\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>I found a suspicious file, what now?\u003C\u002Fh4>\n\u003Cp>If Malcure flags it, it’s likely malicious. You can inspect the file content using our built-in inspector. If you’re unsure, consider our \u003Ca href=\"https:\u002F\u002Fmalcure.com\u002F?p=107&utm_source=readme&utm_medium=web&utm_campaign=wpmr\" rel=\"nofollow ugc\">Expert Malware Removal Service\u003C\u002Fa>.\u003C\u002Fp>\n","Fast malware removal & security shield. Fix hacks, stop redirects, clean SEO spam. Real-time threat intelligence. No bloat.",10000,618632,70,"2026-04-08T00:01:00.000Z","3.7.4",[20,22,23,212,213],"virus","vulnerability-scanner","https:\u002F\u002Fmalcure.com\u002F?p=116&utm_source=plugin-header&utm_medium=web&utm_campaign=wpmr","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-malware-removal.19.9.1.zip","2025-09-03 00:00:00",{"attackSurface":218,"codeSignals":245,"taintFlows":467,"riskAssessment":495,"analyzedAt":505},{"hooks":219,"ajaxHandlers":241,"restRoutes":242,"shortcodes":243,"cronEvents":244,"entryPointCount":29,"unprotectedCount":29},[220,226,230,233,237],{"type":221,"name":222,"callback":223,"file":224,"line":225},"action","init","start_session","inc\\class-virusdie.php",57,{"type":221,"name":227,"callback":228,"file":224,"line":229},"wp_logout","end_session",60,{"type":221,"name":231,"callback":228,"file":224,"line":232},"wp_login",61,{"type":221,"name":234,"callback":235,"file":224,"line":236},"plugins_loaded","load_i18n",63,{"type":221,"name":238,"callback":239,"file":224,"line":240},"admin_menu","action_admin_menu",64,[],[],[],[],{"dangerousFunctions":246,"sqlUsage":247,"outputEscaping":249,"fileOperations":14,"externalRequests":48,"nonceChecks":48,"capabilityChecks":29,"bundledLibraries":466},[],{"prepared":29,"raw":29,"locations":248},[],{"escaped":250,"rawEcho":251,"locations":252},93,121,[253,257,260,262,265,268,270,273,274,276,277,279,280,281,282,284,286,287,289,291,293,295,297,298,300,302,304,306,308,309,311,313,314,316,318,320,322,324,325,327,329,330,331,333,335,337,339,341,343,345,347,348,350,351,353,354,356,357,359,360,362,363,366,367,369,371,372,374,375,376,377,378,380,382,384,386,388,389,391,393,395,396,398,399,401,403,405,407,408,409,410,411,413,415,417,419,421,423,425,426,428,429,431,432,434,435,437,438,440,441,444,446,448,450,453,454,456,458,460,462,464],{"file":254,"line":255,"context":256},"inc\\tools\\class-virusdie-site.php",191,"raw output",{"file":258,"line":259,"context":256},"inc\\tools\\class-virusdie-view.php",53,{"file":258,"line":261,"context":256},65,{"file":263,"line":264,"context":256},"views\\auth-pass.php",34,{"file":266,"line":267,"context":256},"views\\auth.php",28,{"file":269,"line":109,"context":256},"views\\error.php",{"file":271,"line":272,"context":256},"views\\free.php",33,{"file":271,"line":264,"context":256},{"file":271,"line":275,"context":256},67,{"file":271,"line":275,"context":256},{"file":271,"line":278,"context":256},71,{"file":271,"line":13,"context":256},{"file":271,"line":27,"context":256},{"file":271,"line":27,"context":256},{"file":271,"line":283,"context":256},98,{"file":271,"line":285,"context":256},122,{"file":271,"line":285,"context":256},{"file":271,"line":288,"context":256},125,{"file":271,"line":290,"context":256},126,{"file":271,"line":292,"context":256},128,{"file":271,"line":294,"context":256},131,{"file":271,"line":296,"context":256},137,{"file":271,"line":296,"context":256},{"file":271,"line":299,"context":256},140,{"file":271,"line":301,"context":256},141,{"file":271,"line":303,"context":256},143,{"file":271,"line":305,"context":256},146,{"file":271,"line":307,"context":256},166,{"file":271,"line":307,"context":256},{"file":271,"line":310,"context":256},169,{"file":271,"line":312,"context":256},177,{"file":271,"line":312,"context":256},{"file":271,"line":315,"context":256},180,{"file":271,"line":317,"context":256},181,{"file":271,"line":319,"context":256},183,{"file":271,"line":321,"context":256},186,{"file":271,"line":323,"context":256},208,{"file":271,"line":323,"context":256},{"file":271,"line":326,"context":256},211,{"file":271,"line":328,"context":256},223,{"file":271,"line":328,"context":256},{"file":271,"line":328,"context":256},{"file":271,"line":332,"context":256},226,{"file":271,"line":334,"context":256},227,{"file":271,"line":336,"context":256},229,{"file":271,"line":338,"context":256},232,{"file":271,"line":340,"context":256},236,{"file":271,"line":342,"context":256},242,{"file":271,"line":344,"context":256},245,{"file":271,"line":346,"context":256},297,{"file":271,"line":346,"context":256},{"file":271,"line":349,"context":256},309,{"file":271,"line":349,"context":256},{"file":271,"line":352,"context":256},321,{"file":271,"line":352,"context":256},{"file":271,"line":355,"context":256},333,{"file":271,"line":355,"context":256},{"file":271,"line":358,"context":256},345,{"file":271,"line":358,"context":256},{"file":271,"line":361,"context":256},366,{"file":271,"line":361,"context":256},{"file":364,"line":365,"context":256},"views\\php-error.php",11,{"file":364,"line":365,"context":256},{"file":364,"line":368,"context":256},16,{"file":370,"line":272,"context":256},"views\\premium.php",{"file":370,"line":264,"context":256},{"file":370,"line":373,"context":256},52,{"file":370,"line":373,"context":256},{"file":370,"line":240,"context":256},{"file":370,"line":283,"context":256},{"file":370,"line":283,"context":256},{"file":370,"line":379,"context":256},101,{"file":370,"line":381,"context":256},102,{"file":370,"line":383,"context":256},104,{"file":370,"line":385,"context":256},107,{"file":370,"line":387,"context":256},113,{"file":370,"line":387,"context":256},{"file":370,"line":390,"context":256},116,{"file":370,"line":392,"context":256},117,{"file":370,"line":394,"context":256},119,{"file":370,"line":285,"context":256},{"file":370,"line":397,"context":256},145,{"file":370,"line":397,"context":256},{"file":370,"line":400,"context":256},148,{"file":370,"line":402,"context":256},149,{"file":370,"line":404,"context":256},151,{"file":370,"line":406,"context":256},154,{"file":370,"line":319,"context":256},{"file":370,"line":319,"context":256},{"file":370,"line":319,"context":256},{"file":370,"line":321,"context":256},{"file":370,"line":412,"context":256},187,{"file":370,"line":414,"context":256},189,{"file":370,"line":416,"context":256},192,{"file":370,"line":418,"context":256},196,{"file":370,"line":420,"context":256},202,{"file":370,"line":422,"context":256},205,{"file":370,"line":424,"context":256},257,{"file":370,"line":424,"context":256},{"file":370,"line":427,"context":256},269,{"file":370,"line":427,"context":256},{"file":370,"line":430,"context":256},281,{"file":370,"line":430,"context":256},{"file":370,"line":433,"context":256},293,{"file":370,"line":433,"context":256},{"file":370,"line":436,"context":256},305,{"file":370,"line":436,"context":256},{"file":370,"line":439,"context":256},326,{"file":370,"line":439,"context":256},{"file":442,"line":443,"context":256},"views\\reg-error.php",15,{"file":445,"line":443,"context":256},"views\\scan-error.php",{"file":447,"line":443,"context":256},"views\\site-error.php",{"file":449,"line":443,"context":256},"views\\sync-error.php",{"file":451,"line":452,"context":256},"views\\virusdie-footer.php",30,{"file":451,"line":452,"context":256},{"file":455,"line":81,"context":256},"views\\virusdie-header.php",{"file":455,"line":457,"context":256},18,{"file":455,"line":459,"context":256},37,{"file":461,"line":106,"context":256},"views\\welcome.php",{"file":461,"line":463,"context":256},26,{"file":461,"line":465,"context":256},29,[],[468,485],{"entryPoint":469,"graph":470,"unsanitizedCount":48,"severity":41},"init (inc\\tools\\class-virusdie-behavior.php:24)",{"nodes":471,"edges":483},[472,478],{"id":473,"type":474,"label":475,"file":476,"line":477},"n0","source","$_SERVER['SERVER_NAME']","inc\\tools\\class-virusdie-behavior.php",54,{"id":479,"type":480,"label":481,"file":476,"line":477,"wp_function":482},"n1","sink","file_get_contents() [SSRF\u002FLFI]","file_get_contents",[484],{"from":473,"to":479,"sanitized":59},{"entryPoint":486,"graph":487,"unsanitizedCount":29,"severity":494},"\u003Cclass-virusdie-behavior> (inc\\tools\\class-virusdie-behavior.php:0)",{"nodes":488,"edges":491},[489,490],{"id":473,"type":474,"label":475,"file":476,"line":477},{"id":479,"type":480,"label":481,"file":476,"line":477,"wp_function":482},[492],{"from":473,"to":479,"sanitized":493},true,"low",{"summary":496,"deductions":497},"The Virusdie plugin v1.1.8 exhibits a mixed security posture. On one hand, the static analysis shows a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. Furthermore, all detected SQL queries use prepared statements, which is a strong defense against SQL injection. However, concerns arise from the output escaping, where only 43% of outputs are properly escaped, indicating a potential risk for Cross-Site Scripting (XSS) vulnerabilities. The presence of one flow with an unsanitized path, although not classified as critical or high, warrants attention as it could be a vector for path traversal or similar attacks.\n\nThe plugin's vulnerability history is a significant concern. With four known medium-severity CVEs, all of which are currently unpatched according to the provided data, this plugin carries a substantial risk. The common types of vulnerabilities found (Exposure of Sensitive Information, Missing Authorization, CSRF) are serious and suggest recurring issues with access control and data handling. The fact that the last vulnerability was reported in 2026 indicates that these are recent and unaddressed security flaws.\n\nIn conclusion, while the plugin has a minimal attack surface and good practices in database query handling, the unpatched historical vulnerabilities and the moderate percentage of unescaped output present significant risks. The presence of unsanitized paths also adds to the potential attack vectors. Users should exercise extreme caution and prioritize patching or finding an alternative if these vulnerabilities remain unaddressed.",[498,500,502],{"reason":499,"points":106},"4 unpatched medium severity CVEs",{"reason":501,"points":443},"43% of outputs not properly escaped",{"reason":503,"points":504},"1 flow with unsanitized path",10,"2026-03-16T18:38:10.580Z",{"wat":507,"direct":529},{"assetPaths":508,"generatorPatterns":517,"scriptPaths":518,"versionParams":520},[509,510,511,512,513,514,515,516],"\u002Fwp-content\u002Fplugins\u002Fvirusdie\u002Fassets\u002Fcss\u002Fvirusdie.css","\u002Fwp-content\u002Fplugins\u002Fvirusdie\u002Fassets\u002Fcss\u002Fjquery-jvectormap-2.0.5.css","\u002Fwp-content\u002Fplugins\u002Fvirusdie\u002Fassets\u002Fjs\u002Fvdws-socketio.js","\u002Fwp-content\u002Fplugins\u002Fvirusdie\u002Fassets\u002Fjs\u002Fprogressbar.js","\u002Fwp-content\u002Fplugins\u002Fvirusdie\u002Fassets\u002Fjs\u002Fvdws-login.js","\u002Fwp-content\u002Fplugins\u002Fvirusdie\u002Fassets\u002Fjs\u002Fvdws-account.js","\u002Fwp-content\u002Fplugins\u002Fvirusdie\u002Fassets\u002Fjs\u002Fvdws-scan.js","\u002Fwp-content\u002Fplugins\u002Fvirusdie\u002Fassets\u002Fjs\u002Fvdws-resend.js",[],[519],"https:\u002F\u002Fnew.virusdie.com\u002Fsocket.io\u002Fsocket.io.js",[521,522,523,524,525,526,527,528],"virusdie\u002Fassets\u002Fcss\u002Fvirusdie.css?ver=","virusdie\u002Fassets\u002Fcss\u002Fjquery-jvectormap-2.0.5.css?ver=","virusdie\u002Fassets\u002Fjs\u002Fvdws-socketio.js?ver=","virusdie\u002Fassets\u002Fjs\u002Fprogressbar.js?ver=","virusdie\u002Fassets\u002Fjs\u002Fvdws-login.js?ver=","virusdie\u002Fassets\u002Fjs\u002Fvdws-account.js?ver=","virusdie\u002Fassets\u002Fjs\u002Fvdws-scan.js?ver=","virusdie\u002Fassets\u002Fjs\u002Fvdws-resend.js?ver=",{"cssClasses":530,"htmlComments":534,"htmlAttributes":556,"restEndpoints":559,"jsGlobals":560,"shortcodeOutput":569},[531,532,533],"vdws-login","vdws-scan","vdws-progressbar",[535,536,537,538,539,540,541,542,543,544,545,546,547,548,549,550,551,552,553,554,555],"\u003C!-- Plugin Name: Virusdie | One-click website security -->","\u003C!-- Description: One-Click Website security with Virusdie Wordpress Plugin -->","\u003C!-- Primary class file for the Virusdie Plugin. -->","\u003C!-- Make sure the file is not directly accessible. -->","\u003C!-- Plugin initiation. -->","\u003C!-- Plugin version, name, path, URL -->","\u003C!-- Plugin option names -->","\u003C!-- Virusdie REST API server and access key -->","\u003C!-- Plugin sites -->","\u003C!-- Include class files -->","\u003C!-- Initialize the plugin -->","\u003C!-- Setup scheduled events -->","\u003C!-- Class VDWS_VirusdieApiClient -->","\u003C!-- VDWS_VirusdieHelper constructor -->","\u003C!-- VDWS_Virusdie_API class constructor -->","\u003C!-- VDWS_Virusdie_User constructor -->","\u003C!-- VDWS_Virusdie_Site constructor -->","\u003C!-- VDWS_Virusdie_Behavior constructor -->","\u003C!-- VDWS_Virusdie_Messages constructor -->","\u003C!-- VDWS_Virusdie_View constructor -->","\u003C!-- VDWS_Virusdie_Geo constructor -->",[557,558],"data-vdws-apikey","data-vdws-id",[],[561,562,563,564,565,566,567,568],"VDWS_VIRUSDIE_PLUGIN_VERSION","VDWS_VIRUSDIE_PLUGIN_URL","VDWS_VIRUSDIE_SITE_PANEL","vdws_site_url","vdws_api_key","vdws_current_user_id","VDWS_VIRUSDIE_PLUGIN_SLUG","VDWS_VIRUSDIE_PLUGIN_FILE",[],{"error":493,"url":571,"statusCode":572,"statusMessage":573,"message":573},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fvirusdie\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":463,"versions":575},[576,581,588,598,608,617,628,639,650,661,672,683,694,705,716,727,738,749,760,771,782,793,804,815,826,837],{"version":6,"download_url":26,"svn_tag_url":577,"released_at":39,"has_diff":59,"diff_files_changed":578,"diff_lines":39,"trac_diff_url":579,"vulnerabilities":580,"is_current":493},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.1.7&new_path=%2Fvirusdie%2Ftags%2F1.1.8",[],{"version":75,"download_url":582,"svn_tag_url":583,"released_at":39,"has_diff":59,"diff_files_changed":584,"diff_lines":39,"trac_diff_url":585,"vulnerabilities":586,"is_current":59},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.1.6&new_path=%2Fvirusdie%2Ftags%2F1.1.7",[587],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":589,"download_url":590,"svn_tag_url":591,"released_at":39,"has_diff":59,"diff_files_changed":592,"diff_lines":39,"trac_diff_url":593,"vulnerabilities":594,"is_current":59},"1.1.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.1.5&new_path=%2Fvirusdie%2Ftags%2F1.1.6",[595,596,597],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":599,"download_url":600,"svn_tag_url":601,"released_at":39,"has_diff":59,"diff_files_changed":602,"diff_lines":39,"trac_diff_url":603,"vulnerabilities":604,"is_current":59},"1.1.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.1.4&new_path=%2Fvirusdie%2Ftags%2F1.1.5",[605,606,607],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":99,"download_url":609,"svn_tag_url":610,"released_at":39,"has_diff":59,"diff_files_changed":611,"diff_lines":39,"trac_diff_url":612,"vulnerabilities":613,"is_current":59},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.1.3&new_path=%2Fvirusdie%2Ftags%2F1.1.4",[614,615,616],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":618,"download_url":619,"svn_tag_url":620,"released_at":39,"has_diff":59,"diff_files_changed":621,"diff_lines":39,"trac_diff_url":622,"vulnerabilities":623,"is_current":59},"1.1.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.1.2&new_path=%2Fvirusdie%2Ftags%2F1.1.3",[624,625,626,627],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":629,"download_url":630,"svn_tag_url":631,"released_at":39,"has_diff":59,"diff_files_changed":632,"diff_lines":39,"trac_diff_url":633,"vulnerabilities":634,"is_current":59},"1.1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.1.1&new_path=%2Fvirusdie%2Ftags%2F1.1.2",[635,636,637,638],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":640,"download_url":641,"svn_tag_url":642,"released_at":39,"has_diff":59,"diff_files_changed":643,"diff_lines":39,"trac_diff_url":644,"vulnerabilities":645,"is_current":59},"1.1.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.1.0&new_path=%2Fvirusdie%2Ftags%2F1.1.1",[646,647,648,649],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":651,"download_url":652,"svn_tag_url":653,"released_at":39,"has_diff":59,"diff_files_changed":654,"diff_lines":39,"trac_diff_url":655,"vulnerabilities":656,"is_current":59},"1.1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.1.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.16&new_path=%2Fvirusdie%2Ftags%2F1.1.0",[657,658,659,660],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":662,"download_url":663,"svn_tag_url":664,"released_at":39,"has_diff":59,"diff_files_changed":665,"diff_lines":39,"trac_diff_url":666,"vulnerabilities":667,"is_current":59},"1.0.16","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.16.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.16\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.15&new_path=%2Fvirusdie%2Ftags%2F1.0.16",[668,669,670,671],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":673,"download_url":674,"svn_tag_url":675,"released_at":39,"has_diff":59,"diff_files_changed":676,"diff_lines":39,"trac_diff_url":677,"vulnerabilities":678,"is_current":59},"1.0.15","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.15.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.15\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.14&new_path=%2Fvirusdie%2Ftags%2F1.0.15",[679,680,681,682],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":684,"download_url":685,"svn_tag_url":686,"released_at":39,"has_diff":59,"diff_files_changed":687,"diff_lines":39,"trac_diff_url":688,"vulnerabilities":689,"is_current":59},"1.0.14","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.14.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.14\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.13&new_path=%2Fvirusdie%2Ftags%2F1.0.14",[690,691,692,693],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":695,"download_url":696,"svn_tag_url":697,"released_at":39,"has_diff":59,"diff_files_changed":698,"diff_lines":39,"trac_diff_url":699,"vulnerabilities":700,"is_current":59},"1.0.13","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.13.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.13\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.12&new_path=%2Fvirusdie%2Ftags%2F1.0.13",[701,702,703,704],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":706,"download_url":707,"svn_tag_url":708,"released_at":39,"has_diff":59,"diff_files_changed":709,"diff_lines":39,"trac_diff_url":710,"vulnerabilities":711,"is_current":59},"1.0.12","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.12.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.12\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.11&new_path=%2Fvirusdie%2Ftags%2F1.0.12",[712,713,714,715],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":717,"download_url":718,"svn_tag_url":719,"released_at":39,"has_diff":59,"diff_files_changed":720,"diff_lines":39,"trac_diff_url":721,"vulnerabilities":722,"is_current":59},"1.0.11","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.11.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.11\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.10&new_path=%2Fvirusdie%2Ftags%2F1.0.11",[723,724,725,726],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":728,"download_url":729,"svn_tag_url":730,"released_at":39,"has_diff":59,"diff_files_changed":731,"diff_lines":39,"trac_diff_url":732,"vulnerabilities":733,"is_current":59},"1.0.10","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.10.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.10\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.9&new_path=%2Fvirusdie%2Ftags%2F1.0.10",[734,735,736,737],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":739,"download_url":740,"svn_tag_url":741,"released_at":39,"has_diff":59,"diff_files_changed":742,"diff_lines":39,"trac_diff_url":743,"vulnerabilities":744,"is_current":59},"1.0.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.8&new_path=%2Fvirusdie%2Ftags%2F1.0.9",[745,746,747,748],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":750,"download_url":751,"svn_tag_url":752,"released_at":39,"has_diff":59,"diff_files_changed":753,"diff_lines":39,"trac_diff_url":754,"vulnerabilities":755,"is_current":59},"1.0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.7&new_path=%2Fvirusdie%2Ftags%2F1.0.8",[756,757,758,759],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":761,"download_url":762,"svn_tag_url":763,"released_at":39,"has_diff":59,"diff_files_changed":764,"diff_lines":39,"trac_diff_url":765,"vulnerabilities":766,"is_current":59},"1.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.6&new_path=%2Fvirusdie%2Ftags%2F1.0.7",[767,768,769,770],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":772,"download_url":773,"svn_tag_url":774,"released_at":39,"has_diff":59,"diff_files_changed":775,"diff_lines":39,"trac_diff_url":776,"vulnerabilities":777,"is_current":59},"1.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.5&new_path=%2Fvirusdie%2Ftags%2F1.0.6",[778,779,780,781],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":783,"download_url":784,"svn_tag_url":785,"released_at":39,"has_diff":59,"diff_files_changed":786,"diff_lines":39,"trac_diff_url":787,"vulnerabilities":788,"is_current":59},"1.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.4&new_path=%2Fvirusdie%2Ftags%2F1.0.5",[789,790,791,792],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":794,"download_url":795,"svn_tag_url":796,"released_at":39,"has_diff":59,"diff_files_changed":797,"diff_lines":39,"trac_diff_url":798,"vulnerabilities":799,"is_current":59},"1.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.3&new_path=%2Fvirusdie%2Ftags%2F1.0.4",[800,801,802,803],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":805,"download_url":806,"svn_tag_url":807,"released_at":39,"has_diff":59,"diff_files_changed":808,"diff_lines":39,"trac_diff_url":809,"vulnerabilities":810,"is_current":59},"1.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.2&new_path=%2Fvirusdie%2Ftags%2F1.0.3",[811,812,813,814],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":816,"download_url":817,"svn_tag_url":818,"released_at":39,"has_diff":59,"diff_files_changed":819,"diff_lines":39,"trac_diff_url":820,"vulnerabilities":821,"is_current":59},"1.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.1&new_path=%2Fvirusdie%2Ftags%2F1.0.2",[822,823,824,825],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":827,"download_url":828,"svn_tag_url":829,"released_at":39,"has_diff":59,"diff_files_changed":830,"diff_lines":39,"trac_diff_url":831,"vulnerabilities":832,"is_current":59},"1.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fvirusdie%2Ftags%2F1.0.0&new_path=%2Fvirusdie%2Ftags%2F1.0.1",[833,834,835,836],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":838,"download_url":839,"svn_tag_url":840,"released_at":39,"has_diff":59,"diff_files_changed":841,"diff_lines":39,"trac_diff_url":39,"vulnerabilities":842,"is_current":59},"1.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvirusdie.1.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fvirusdie\u002Ftags\u002F1.0.0\u002F",[],[843,844,845,846],{"id":70,"url_slug":71,"title":72,"severity":41,"cvss_score":42,"vuln_type":76,"patched_in_version":75},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":42,"vuln_type":101,"patched_in_version":99},{"id":84,"url_slug":85,"title":86,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":75},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6}]