[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fYoxdoA-GlRDeBpSFhj8AvaQTrsyS-nZ_ifJOoVV5xSc":3,"$f7gzf7f_csqqqJhL3PQpLuaSmW3Sjk8BT0QY5R1u6tZg":795},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":11,"num_ratings":11,"last_updated":13,"tested_up_to":14,"requires_at_least":15,"requires_php":16,"tags":17,"homepage":21,"download_link":22,"security_score":23,"vuln_count":11,"unpatched_count":11,"last_vuln_date":24,"fetched_at":25,"vulnerabilities":26,"developer":27,"crawl_stats":24,"alternatives":32,"analysis":137,"fingerprints":767},"whats-going-on","What's going on","1.3","jaimenj","https:\u002F\u002Fprofiles.wordpress.org\u002Fjaimenj\u002F","\u003Cp>A very simple firewall for WordPress that allows you to see all real requests to your WordPress and protect you from Internet attacks. It’s a WAF, a Web Application Firewall that is installed in front of WordPress. It’s installed in the server with the plugin, and it checks requests from the web browsers, bots or webcrawlers to your WordPress. It executes the WAF codes before every request to PHP files of WordPress, so it also works before every request to the WordPress cache.\u003C\u002Fp>\n\u003Cp>Features:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Feel free to contribute in GitHub to improve the project.\u003C\u002Fli>\n\u003Cli>It’s free, completely free.\u003C\u002Fli>\n\u003Cli>Detection and protection of DoS attacks.\u003C\u002Fli>\n\u003Cli>Detection and notification of possible DDoS attacks.\u003C\u002Fli>\n\u003Cli>It can protect you against SQL injection, XSS and Xploit attacks using your own Regexes.\u003C\u002Fli>\n\u003Cli>Permanent block or bypass of custom IPs, it allows you to configure IPs with your own Regexes too.\u003C\u002Fli>\n\u003Cli>Log and show Regex errors, for debug and improve your Regexes.\u003C\u002Fli>\n\u003Cli>Save payloads, all or only when match a regex.\u003C\u002Fli>\n\u003Cli>Block and allow countries and continents.\u003C\u002Fli>\n\u003Cli>404s detections.\u003C\u002Fli>\n\u003Cli>Show URLs or IPs doing 404s.\u003C\u002Fli>\n\u003Cli>Show IPs that are doing most of the visits.\u003C\u002Fli>\n\u003Cli>Show URLs most visited.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Uninstall\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Uninstall .user.ini file.\u003C\u002Fli>\n\u003Cli>Deactivate the plugin into the Plugins menu in the admin panel of WordPress.\u003C\u002Fli>\n\u003Cli>Delete into the Plugins menu.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>All the options configured into the plugin are removed when plugin is deleted, not when plugin is deactivated. All the database tables are removed when plugin is deactivated. So if you want to remove the plugin and all data stored, first deactivate the plugin and then remove it from the plugin admin zone into the WordPress backend.\u003C\u002Fp>\n","A simple Web Application Firewall for WordPress.",0,1385,"2022-06-23T19:43:00.000Z","6.0.11","5.0","7.4",[18,19,20],"firewall","security","waf","https:\u002F\u002Fjnjsite.com\u002Fwhats-going-on-for-wordpress\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwhats-going-on.1.3.zip",85,null,"2026-04-06T09:54:40.288Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":28,"total_installs":11,"avg_security_score":23,"avg_patch_time_days":29,"trust_score":30,"computed_at":31},2,30,84,"2026-04-07T12:55:31.787Z",[33,56,77,98,118],{"slug":34,"name":35,"version":36,"author":37,"author_profile":38,"description":39,"short_description":40,"active_installs":41,"downloaded":42,"rating":43,"num_ratings":44,"last_updated":45,"tested_up_to":46,"requires_at_least":15,"requires_php":47,"tags":48,"homepage":51,"download_link":52,"security_score":53,"vuln_count":54,"unpatched_count":11,"last_vuln_date":55,"fetched_at":25},"security-malware-firewall","Login Security, FireWall, Malware removal by CleanTalk","2.176","CleanTalk Inc","https:\u002F\u002Fprofiles.wordpress.org\u002Fcleantalk\u002F","\u003Cp>Brute force, Login security & Two Factor Auth (2FA). Limit login. Malware & Vulnerabilities scan. FireWall. Enterprise ready security plugin.\u003C\u002Fp>\n\u003Ch3>SECURITY PLUGIN BY CLEANTALK (SPBCT)\u003C\u002Fh3>\n\u003Cp>We focus on eliminating the most common security threats for WordPress. At the same time, we strive to ensure that \u003Cstrong>site performance remains unaffected\u003C\u002Fstrong>. To achieve this, each release goes through automated and expert-driven testing pipelines. We also verify performance using Google PageSpeed Insights and GTMetrix. Typically, we release a new version twice a month to keep features up to date and protection strong.\u003C\u002Fp>\n\u003Ch4>SECURITY FEATURES\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Limit Login Attempts and rate limits for logins.\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Two Factor Authentication (2FA)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Custom wp-login URL (wp-login.php)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Hide Login Default Login Page\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Disable or Stop User Enumeration\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Brute force protection for WordPress accounts and passwords\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Protection for WordPress login form\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security FireWall by IP, Networks or Countries\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Web Application Firewall (WAF)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Real-time traffic monitor (Visitors per pages, IPs, Countires and hits counts per page)\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Malware scanner with auto-cure function\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Daily auto malware scan\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Vulnerabilities scanner among installed plugins and themes\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security weekly reports to email\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Notifications of login events to your website\u003C\u002Fstrong>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>FREE TRIAL THEN $9 PER YEAR\u003C\u002Fh4>\n\u003Cp>CleanTalk is a Cloud security service that protects your website from online threats and provides you great security instruments to control your website security. We provide detailed security stats for all of our security features to have a full control of security.\u003C\u002Fp>\n\u003Cp>We believe the most honest approach is when every user pays a small fee for using the service, rather than relying on a freemium model where some users subsidize others. The fee is as low as price of a good cup of coffee! So, the security plugin does not have a PRO version-it is completely free and works in combination with our premium Cloud security service at cleantalk.org. Every user has full access to all features of both the service and the plugin. Also, please take a note about \u003Ca href=\"https:\u002F\u002Fdeveloper.wordpress.org\u002Fplugins\u002Fwordpress-org\u002Fdetailed-plugin-guidelines\u002F#6-software-as-a-service-is-permitted\" rel=\"nofollow ugc\">WordPress.org policy\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>BRUTE FORCE PROTECTION\u003C\u002Fh3>\n\u003Cp>Our default anti–brute-force policy works as follows,\u003C\u002Fp>\n\u003Cul>\n\u003Cli>For any failed login attempt to the WordPress admin area, the plugin introduces a brief delay of a few seconds.\u003C\u002Fli>\n\u003Cli>The plugin reviews the security audit log every hour. If any IP address records 10 or more login attempts in that period, it will be blocked for 24 hours.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>ALL BRUTE FORCE PROTECTION FUNCTIONS\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Maximum failed attemtps to login before ban (default is 5).\u003C\u002Fstrong> A failed attempt happens when either the login or password is incorrect.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Time frame to count login attempts (default is 15 minutes).\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Ban to login time frame from 2 minutes to 24 hours (default is 1 hour).\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Two-factor authentication (2FA) with abillity to apply policy to specific users roles.\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Prevent collecting of login on password reset error.\u003C\u002Fstrong> The option exclude the info about the login existing on password change error. Error message will be replaced with followed text: “If the user with the specified credentials exists, check your email for the password reset confirmation link. Then visit login page.”\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Audit Log.\u003C\u002Fstrong> Keeps track of actions in the WP Dashboard to let you know what is happening on your blog. With the Security Audit Log is very easy to see user activity in order to understand what changes have done and who made them. Security Audit Log shows who logged in and when and how much time they spent on each page.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Two Factor Authentication (2FA).\u003C\u002Fstrong> It requires a bit of your time but Two Factor (2 Step) Authentication immediately gives a much higher level of security.With your first authorization, the CleanTalk Security plugin remembers your browser and you won’t have to input your authorization code every time anymore. However, if you started to use a new device or a new browser then you are required to input your security authorization code. CleanTalk security plugin will remember your browser for 30 days.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Change the URL of the wp-login page.\u003C\u002Fstrong> This option helps you change the default wp-login URL (wp-login.php). Hackers use scripts for massive brute-force attacks, and since most sites use a default login page URL, hackers configure scripts for such URLs. When you change the URL of the authorization page, hackers will not have the opportunity to perform brute-force attacks in scripts in automatic mode. This option does not change files and does not rewrite URLs in system files. To return the address of the default authorization page, it is enough to disable the option in the plugin settings or set a new value. If you are using caching plugins, then you need to add a new authorization page in the caching exceptions.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Leaked password check.\u003C\u002Fstrong> This feature enhances your website’s security by continuously monitoring users’ passwords for potential exposure in known data breaches and on the dark web. It works in the background and requires no action from users unless a leak is detected.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>SECURITY FIREWALL\u003C\u002Fh3>\n\u003Cp>To enhance the security of your site, you can use the CleanTalk Security FireWall, which will allow you to block access by HTTP\u002FHTTPS to your website for individual IP addresses, IP networks and block access to users from specific countries. Use personal BlackList to block IP addresses with a suspicious activity to enhance the WordPress security.\u003C\u002Fp>\n\u003Cp>Security FireWall may significantly reduce the risk of hacking and reduces the load on your web server. CleanTalk Security is fully compatible with the most popular VPN services. Also, CleanTalk security supports all search engines Google, Bing, Yahoo, Baidu, MSN, Yandex and etc.\u003C\u002Fp>\n\u003Ch4>LIST OF FIREWALL FUNCTIONS\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Blocks or bypass visitors by IP, IP Network. Country blocking.\u003C\u002Fstrong> It also has option to avoid blocking hits from major search engines like Google, Bing, Yahoo, Baidu, Yandex and etc.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Traffic control.\u003C\u002Fstrong> CleanTalk security Traffic Control will track every single visitor no matter if they are using JavaScript or not and provides many valuable traffic parameters. Another option in Security Traffic Control – “Block user after requests amounts more than” – blocks access to the site for any IP that has exceeded the number of HTTP requests per hour. If this number of requests will be exceeded, this IP will be added to the Security FireWall Black List for 24 hours. Security Firewall has a limit for requests to your website (by default 1000 requests per hour, so you can change it) and if any IP exceed this threshold it will be added to security firewall for next 24 hours. It allows you to break some of the DDoS attacks.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Limit Login Attempts.\u003C\u002Fstrong> Limit Login Attempts – is a part of brute-force protection and security firewall.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Web Application FireWall (WAF) for WordPress Security Plugin\u003C\u002Fstrong>. The main purpose of Web Application FireWall (WAF) is real-time protection from unauthorized access, even if there are critical known\u002Funknown vulnerabilities. Security Web Application FireWall catches all requests to your website and checks HTTP parameters that include,\n\u003Cul>\n\u003Cli>SQL Injection,\u003C\u002Fli>\n\u003Cli>Cross Site Scripting (XSS),\u003C\u002Fli>\n\u003Cli>uploading files from non-authorised users,\u003C\u002Fli>\n\u003Cli>PHP constructions\u002Fcode,\u003C\u002Fli>\n\u003Cli>the presence of malicious code in the downloaded files.\u003Cbr \u002F>\nIn addition to effective information security and information security applications are required to know what is quality of protection and CleanTalk Security has logged all blocked requests that allow you to know and analyze accurate information.\u003C\u002Fli>\n\u003Cli>You can see your Cleantalk Security Logs in your \u003Ca href=\"https:\u002F\u002Fcleantalk.org\u002Fmy\u002Flogs_firewall\" rel=\"nofollow ugc\">Dashboard\u003C\u002Fa> CleanTalk’s research team updates WAF database each time as we find a vulnerability, it means plugin’s users get protection even against unpublished vulnurebilites.\u003C\u002Fli>\n\u003Cli>Learn more how to set up and test \u003Ca href=\"https:\u002F\u002Fcleantalk.org\u002Fhelp\u002Fsecurity-waf\" title=\"About Web Application Firewall\" rel=\"nofollow ugc\">About Security Web Application Firewall\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Email Notifications when administrators or users are logged in.\u003C\u002Fstrong> We added this option to our security plugin. Now you can receive notifications if you want to know about an unauthorized entrance to your WP Dashboard. Notification will be sent only when a user was able to authorize entering login and password. If you are logged into the admin panel from the saved session, then the alert won’t be sent.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>MALWARE SCANNER WITH AUTO-CURE FUNCTION\u003C\u002Fh3>\n\u003Cp>Scans WordPress files for hacker files or code for hacker code. Performs antivirus functions. Security Malware Scanner runs manually by users requests or automaticaly by WordPress cron. All of the results will send in your Security CleanTalk Dashboard with the details and you will be able to investigate them and see if that was a legitimate change or some bad code was injected.\u003C\u002Fp>\n\u003Cp>If you are unsure how to identify, remove, or clean malware using the plugin, you can book a \u003Ca href=\"https:\u002F\u002Fcleantalk.org\u002Fwordpress-malware-removal\" rel=\"nofollow ugc\">malware removal service\u003C\u002Fa> with our Security & Pentest team.\u003C\u002Fp>\n\u003Cp>As an alternative, you can use the \u003Ca href=\"https:\u002F\u002Fcleantalk.org\u002Fwebsite-malware-scanner\" rel=\"nofollow ugc\">Website Malware Scanner\u003C\u002Fa> for frontend security and malware checks. It scans by URL and requires no plugins.\u003C\u002Fp>\n\u003Ch4>LIST OF MALWARE SCANNER, ANTIVIRUS FUNCTIONS\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Malware autoscanning.\u003C\u002Fstrong> Scans the website automatically at intervals ranging from once every 12 hours to once every 30 days.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Cure malware.\u003C\u002Fstrong> It cures infected files automatically if the scanner knows cure methods for these specific cases. If the option is disabled then when the scanning process ends you will be presented with several actions you can do to the found files,\n\u003Cul>\n\u003Cli>\u003Cstrong>Cure.\u003C\u002Fstrong> Malicious code will be removed from the file.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Replace.\u003C\u002Fstrong> The file will be replaced with the original file.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Delete.\u003C\u002Fstrong> The file will be put in quarantine. Do nothing.\u003Cbr \u002F>\nBefore any action is chosen, backups of the files will be created and if the cure is unsuccessful it’s possible to restore each file.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Malware Heuristic Check\u003C\u002Fstrong>. This option allows you to check files of plugins and themes with heuristic analysis. Probably it will find more than you expect.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Malware scanner to find SQL Injections.\u003C\u002Fstrong> The CleanTalk Security Malware Scanner allows you to find code that allows performing SQL injection. It is this problem that the scanner solves.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Operating system cron tasks analysis.\u003C\u002Fstrong> This functional provides an overview of scheduled cron jobs on server that perform automated tasks.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>DB Trigger analysis.\u003C\u002Fstrong> Will search for known malicious signatures in database triggers.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>List unknown files.\u003C\u002Fstrong> Shows the list of found unknown files in the malware scanner report. Unknown files do not have known virus signatures and do not have suspicious code. Meanwhile, unknown files do not belong to the public plugins and themes at wordpress.org.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>File System Watcher.\u003C\u002Fstrong> File system Watcher monitors changes in the file system. This allows to quickly respond to a site infection by tracking which files were affected. The Watcher makes file system snapshots as often as one hour and show difference up to seven days time frame.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Feedback System.\u003C\u002Fstrong> If you don’t have programming experience and don’t know, is there security issue or not, you send some files to CleanTalk Cloud and we check them for malware code. After checking we send you an email notification with results, is there viruses or not. Please, look at our guide How malware file analysis works \u003Ca href=\"https:\u002F\u002Fcleantalk.org\u002Fhelp\u002Ffiles-analysis\" title=\"About Scanner Feedback System\" rel=\"nofollow ugc\">About Scanner Feedback System\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>LIST OF THE MOST ACTIVE MALWARES BY FILENAMES\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>radio.php\u003C\u002Fli>\n\u003Cli>admin-ajax.php\u003C\u002Fli>\n\u003Cli>.1235512.css\u003C\u002Fli>\n\u003Cli>8sjdakSJ3.php\u003C\u002Fli>\n\u003Cli>wso.php\u003C\u002Fli>\n\u003Cli>cmd.php\u003C\u002Fli>\n\u003Cli>shell.php\u003C\u002Fli>\n\u003Cli>reverse_shell.php\u003C\u002Fli>\n\u003Cli>admin.php\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>The list is actual on July 15th, 2025. The latest data is the article \u003Ca href=\"https:\u002F\u002Fresearch.cleantalk.org\u002Fmajor-signs-of-malware-on-an-infected-wordpress-site\u002F\" rel=\"nofollow ugc\">Is my site infected?\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>VULNERABILITIES SCANNER AMONG INSTALLED PLUGINS AND THEMES\u003C\u002Fh3>\n\u003Cp>Plugin checks installed plugins and themes for known (published) vulnerabilities. If finds vulnerable plugin\u002Ftheme, it sends an Email notification and shows data in the \u003Cem>Critical updates\u003C\u002Fem> tab.\u003C\u002Fp>\n\u003Cp>List of the most recent vulnerabilities found and published by CleanTalk Research team,\u003C\u002Fp>\n\u003Cul>\n\u003Cli>CVE-2025-5921 – SureForms – Unauthenticated XSS – POC, 200k+ installs.\u003C\u002Fli>\n\u003Cli>CVE-2025-3582 – Newsletter – Stored XSS to JS Backdoor Creation – POC, 300k+ installs.\u003C\u002Fli>\n\u003Cli>CVE-2025-2560 – Ninja Forms – Stored XSS to JS Backdoor Creation – POC, 700k+ installs.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>The list is effective on July 18th, 2025. Updates are avaible on \u003Ca href=\"https:\u002F\u002Fresearch.cleantalk.org\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fresearch.cleantalk.org\u002F\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>MISCELLANEOUS SECURITY OPTIONS\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Send additional HTTP headers option.\u003C\u002Fstrong> There are several additional http-headers which added to the every http-requests by the plugin if this option is enabled:\n\u003Cul>\n\u003Cli>“X-Content-Type-Options” improves the security of your site (and your users) against some types of drive-by-downloads.\u003C\u002Fli>\n\u003Cli>“X-XSS-Protection” header improves the security of your site against some types of XSS (cross-site scripting) attacks.\u003C\u002Fli>\n\u003Cli>“Strict-Transport-Security” response header (often abbreviated as HSTS) informs browsers that the site should only be accessed using HTTPS, and that any future attempts to access it using HTTP should automatically be converted to HTTPS.\u003C\u002Fli>\n\u003Cli>“Referrer-Policy” make the \u003Ccode>Referer\u003C\u002Fcode> http-header transferring more strictly.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Collect and send PHP logs.\u003C\u002Fstrong> Collect and send PHP error logs to your CleanTalk Dashboard where you can list them.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Prevent collecting of authors logins.\u003C\u002Fstrong> Prevent visitors from collecting logins of the content authors from the website links (like example.com\u002F?author=1). Also this function known as Stop User Enumeration.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Prevent collecting of user login on password reset.\u003C\u002Fstrong> The password reset error will not contain the data about selected username does not exist.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Disable REST API for non-authenticated users.\u003C\u002Fstrong> Turn this on to deny access to WordPress REST API for non-authenticated users. Denied requests will get a 401 HTTP Code (Unauthorized).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Disable the WordPress endpoint “users” REST API.\u003C\u002Fstrong> Disables access to \u002Fwp-json\u002Fwp\u002Fv2\u002Fusers and \u002Fwp-json\u002Fwp\u002Fv2\u002Fusers\u002F”id_user”.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Disable File Editor.\u003C\u002Fstrong> By prohibiting file editing, you protect the site from malicious attacks that may try to change the code and gain access to the site or steal confidential information.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>TRANSLATE INTO YOUR LANGUAGE\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Thank you for helping translate the plugin!\u003C\u002Fli>\n\u003Cli>感谢您帮助翻译这个插件！ (Gǎnxiè nín bāngzhù fānyì zhège chājìan!)\u003C\u002Fli>\n\u003Cli>प्लगइन का अनुवाद करने में मदद के लिए धन्यवाद! (Plugin ka anuvaad karne mein madad ke liye dhanyavaad!)\u003C\u002Fli>\n\u003Cli>¡Gracias por ayudar a traducir el complemento!\u003C\u002Fli>\n\u003Cli>Merci d’avoir aidé à traduire le plugin !\u003C\u002Fli>\n\u003Cli>شكرًا لمساعدتك في ترجمة الإضافة! (Shukran limusaa’adatika fi tarjamat al-idafa!)\u003C\u002Fli>\n\u003Cli>প্লাগইন অনুবাদে সাহায্য করার জন্য ধন্যবাদ! (Plug-in onubade shahajjo korar jonno dhonnobad!)\u003C\u002Fli>\n\u003Cli>Спасибо за помощь в переводе плагина! (Spasibo za pomoshch v perevode plagina!)\u003C\u002Fli>\n\u003Cli>Obrigado por ajudar a traduzir o plugin! (Obrigada if female)\u003C\u002Fli>\n\u003Cli>پلگ ان کا ترجمہ کرنے میں مدد کرنے کا شکریہ! (Plug-in ka tarjuma karne mein madad karne ka shukriya!)\u003C\u002Fli>\n\u003Cli>Terima kasih telah membantu menerjemahkan plugin!\u003C\u002Fli>\n\u003Cli>Danke, dass du beim Übersetzen des Plugins geholfen hast!\u003C\u002Fli>\n\u003Cli>プラグインの翻訳を手伝ってくれてありがとうございます！ (Puraguin no hon’yaku o tetsudatte kurete arigatou gozaimasu!)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Ftranslate.wordpress.org\u002Fprojects\u002Fwp-plugins\u002Fsecurity-malware-firewall\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Ftranslate.wordpress.org\u002Fprojects\u002Fwp-plugins\u002Fsecurity-malware-firewall\u002F\u003C\u002Fa>\u003C\u002Fp>\n","Brute force, Login security & Two Factor Auth (2FA). Limit login. Malware & Vulnerabilities scan. FireWall. Enterprise ready security plugin.",30000,2627149,96,379,"2026-03-31T08:59:00.000Z","7.0","7.2",[18,49,50,19,20],"login","malware","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fsecurity-malware-firewall\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsecurity-malware-firewall.2.176.zip",86,5,"2025-12-08 16:28:49",{"slug":57,"name":58,"version":59,"author":60,"author_profile":61,"description":62,"short_description":63,"active_installs":64,"downloaded":65,"rating":66,"num_ratings":67,"last_updated":68,"tested_up_to":69,"requires_at_least":70,"requires_php":16,"tags":71,"homepage":73,"download_link":74,"security_score":67,"vuln_count":75,"unpatched_count":11,"last_vuln_date":76,"fetched_at":25},"security-ninja","Security Ninja – WordPress Security & Firewall","5.277","cleverplugins","https:\u002F\u002Fprofiles.wordpress.org\u002Fcleverplugins\u002F","\u003Cp>Security Ninja is a lightweight \u003Cstrong>WordPress security plugin\u003C\u002Fstrong> that helps protect your site from common attacks and security mistakes — without turning your dashboard into a cockpit.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Free includes a basic Web Application Firewall (WAF)\u003C\u002Fstrong> (based on the 8G ruleset) to block common malicious requests, plus 50+ security checks, a full vulnerability scanner, and a core integrity scanner to spot risky settings and unexpected file changes.\u003C\u002Fp>\n\u003Cp>Upgrade to Pro if you need deeper protection like advanced malware scanning\u002Fcleanup, stronger WAF controls (e.g. country blocking), and more automation\u002Falerting.\u003C\u002Fp>\n\u003Cp>This plugin can be downloaded for free without any paid subscription from \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fsecurity-ninja\u002F\" rel=\"ugc\">the official WordPress repository\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Why Security Ninja\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Included for free\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Basic Firewall (8G-based)\u003C\u002Fstrong> – Blocks common malicious requests and bot noise before it becomes a problem.\u003Cbr \u002F>\n– \u003Cstrong>50+ Security Tests\u003C\u002Fstrong> – Fast audit of common WordPress security misconfigurations.\u003Cbr \u002F>\n– \u003Cstrong>Vulnerability Scanner\u003C\u002Fstrong> – Highlights known issues in plugins\u002Fthemes so you can patch faster.\u003Cbr \u002F>\n– \u003Cstrong>Core Scanner\u003C\u002Fstrong> – Detect modified or unexpected files in WordPress core folders.\u003Cbr \u002F>\n– \u003Cstrong>Basic Events Logger\u003C\u002Fstrong> – Logs \u003Cstrong>firewall events\u003C\u002Fstrong> and \u003Cstrong>login attempts (successful\u002Ffailed)\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Pro adds\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Advanced Malware Scanner\u003C\u002Fstrong> – Detect and clean malicious code and suspicious files.\u003Cbr \u002F>\n– \u003Cstrong>Advanced Firewall\u002FWAF controls\u003C\u002Fstrong> – e.g. country blocking, stronger rules and automation.\u003Cbr \u002F>\n– \u003Cstrong>Secure Login & 2FA\u003C\u002Fstrong> – Add stronger authentication and login protections.\u003Cbr \u002F>\n– \u003Cstrong>Automation & reporting\u003C\u002Fstrong> – Scheduled scans, reports, and advanced tracking.\u003Cbr \u002F>\n– \u003Cstrong>AI Security Advisor\u003C\u002Fstrong> – Get a single, privacy-focused security report (no PII sent; uses WordPress 7 AI Connectors or WP Security Ninja AI).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Key Features\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Security Ninja is a lightweight \u003Cstrong>WordPress firewall plugin\u003C\u002Fstrong> and security toolkit designed to protect your website from hackers, malware, brute-force attacks, and known vulnerabilities — without slowing it down.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Comprehensive WordPress Security Testing\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Security Ninja performs 50+ advanced security tests to identify vulnerabilities before hackers exploit them. This includes:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Brute-force protection\u003C\u002Fstrong> – Blocks unauthorized login attempts to prevent forced entry.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>File integrity monitoring\u003C\u002Fstrong> – Detects unauthorized changes to WordPress core files, themes, and plugins.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Database security checks\u003C\u002Fstrong> – Identifies weak database permissions and potential SQL injection threats.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>User role audits\u003C\u002Fstrong> – Ensures no unauthorized administrator accounts exist.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security misconfiguration scans\u003C\u002Fstrong> – Identifies and fixes weak settings that could compromise security.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Enhanced Vulnerability Scanner\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Stay Ahead of Threats\u003C\u002Fstrong> – Our vulnerability scanner proactively alerts you to known vulnerabilities, allowing you to address potential threats before they exploit your website.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Comprehensive Protection\u003C\u002Fstrong> – Security Ninja not only checks and warns for common issues but also checks for known vulnerabilities in plugins and themes.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Peace of Mind\u003C\u002Fstrong> – Knowing your site is monitored for the latest vulnerabilities means you can focus on what matters most, growing your business and creating content, worry-free.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Core Scanner – Comprehensive Protection for Your WordPress Installation\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>The Core Scanner module adds a critical layer of security by ensuring your WordPress installation remains untampered and free of unauthorized files.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Full Core File Integrity Check\u003C\u002Fstrong>: Every file in your core WordPress folders is scanned to ensure it hasn’t been modified or compromised.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Detection of Unknown Files\u003C\u002Fstrong>: The scanner flags any extra or unknown files in your core WordPress directories, alerting you to potential threats.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Built-in File Viewer\u003C\u002Fstrong>: Review flagged files directly within your WordPress dashboard using the integrated file viewer for a clear and easy inspection.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Restore Core Files\u003C\u002Fstrong>: If a core WordPress file has been altered, you can quickly restore it with a single click, ensuring your site is running the official version.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Easy File Management\u003C\u002Fstrong>: For unknown or suspicious files, you have the option to delete them right from the interface, keeping your WordPress installation clean and secure.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Advanced Malware Scanner – Detect & Remove Malware Instantly (PRO)\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Security Ninja includes a high-performance malware scanner that automatically checks your WordPress core, plugins and themes for:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Malicious scripts and backdoors\u003C\u002Fstrong> – Identifies hidden malware and harmful injections.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Trojan and virus detection\u003C\u002Fstrong> – Scans for suspicious PHP and JavaScript entries.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>One-click malware removal\u003C\u002Fstrong> – Instantly quarantine and delete infected files.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>WordPress Firewall & Real-Time Threat Protection\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Security Ninja includes a \u003Cstrong>basic firewall for free\u003C\u002Fstrong> (8G-based) to block common malicious requests. Upgrade to Pro for more advanced WAF controls.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Basic protection (Free)\u003C\u002Fstrong> – Blocks common exploit patterns and bad requests.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Advanced protection (Pro)\u003C\u002Fstrong> – Country blocking, stronger controls, and additional intelligence\u002Fautomation.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Brute-force & bot mitigation\u003C\u002Fstrong> – Reduce noisy and abusive traffic hitting WordPress.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Login Security & Two-Factor Authentication (2FA) (PRO)\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Your WordPress login page is a primary target for hackers. Security Ninja enhances login security with:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Two-Factor Authentication (2FA)\u003C\u002Fstrong> – Requires additional verification for safer logins.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Brute-force attack protection\u003C\u002Fstrong> – Limits failed login attempts to block unauthorized access.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Rename login\u003C\u002Fstrong> – Getting a lot of requests to your login form? Hide it for spammers.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>One-Click Security Fixes & WordPress Hardening (PRO)\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Manually fixing security issues is time-consuming. Security Ninja provides one-click hardening to:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Disable XML-RPC\u003C\u002Fstrong> – Blocks common DDoS attacks and brute-force exploits.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Restrict file editing\u003C\u002Fstrong> – Prevents unauthorized theme and plugin modifications.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Hide PHP error messages\u003C\u002Fstrong> – Stops hackers from exploiting sensitive error details.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>And many more fixes to harden your WordPress security!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Events Logger \u002F Activity Tracking\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Security Ninja includes a \u003Cstrong>basic events logger for free\u003C\u002Fstrong> so you can see what’s happening on your site.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Free:\u003C\u002Fstrong> firewall events + login attempts (successful\u002Ffailed).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Pro:\u003C\u002Fstrong> deeper tracking, alerting, and reporting.\u003C\u002Fli>\n\u003Cli>Export security logs for audits and compliance reports.\u003C\u002Fli>\n\u003Cli>Includes webhook functionality so you can integrate with other services (e.g. Slack\u002FDiscord\u002Fwebhooks).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Automated Security Scans & Reports (PRO)\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Security Ninja performs scheduled security scans and sends reports directly to your inbox.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Set up daily, weekly, or monthly security scans.\u003C\u002Fli>\n\u003Cli>Receive email alerts about vulnerabilities and malware infections.\u003C\u002Fli>\n\u003Cli>Analyze detailed reports to keep your website secure.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Block Spam & Malicious Bots Instantly (PRO)\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Hackers and spammers use bots to exploit WordPress websites. Security Ninja prevents:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Fake registrations and spam comments\u003C\u002Fstrong> – Stops bots from even getting to your site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Malicious bot attacks\u003C\u002Fstrong> – Blocks scripts attempting to hack your site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Unwanted traffic\u003C\u002Fstrong> – Reduces server load by preventing unnecessary bot access.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Join thousands of satisfied users who trust Security Ninja to keep their websites safe. Start protecting your online presence today and help yourself to peace of mind.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Why Security Ninja is Best WordPress Security Plugin\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Security Ninja is the best WordPress security plugin because it provides a comprehensive, lightweight, and easy-to-use solution to protect your website from hackers, malware, and vulnerabilities. With 50+ security tests, an advanced malware scanner, a firewall, and two-factor authentication (2FA), it ensures complete website protection without slowing down performance.\u003C\u002Fp>\n\u003Cp>Unlike bloated security plugins, Security Ninja is optimized for speed and efficiency. It offers one-click security fixes, automated scans, real-time threat detection, and login protection, making it ideal for beginners and advanced users alike. Trusted since 2011, it keeps thousands of websites secure while offering proactive protection against cyber threats.\u003C\u002Fp>\n\u003Ch3>Extensions\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>MainWP – The MainWP Dashboard allows administrators to manage many WordPress websites from a central location.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Install the \u003Cstrong>FREE \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fsecurity-ninja-for-mainwp\u002F\" rel=\"ugc\">Security Ninja for MainWP Extension\u003C\u002Fa>\u003C\u002Fstrong> to get an overview of all websites you have installed Security Ninja on!\u003C\u002Fp>\n\u003Cp>https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fsecurity-ninja-for-mainwp\u002F\u003C\u002Fp>\n\u003Ch3>Security Tests for your website\u003C\u002Fh3>\n\u003Cp>Security Ninja – Your WordPress Guardian\u003C\u002Fp>\n\u003Ch3>Key Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Cstrong>Immediate Vulnerability Alerts\u003C\u002Fstrong>: Get instant notifications about vulnerabilities to keep your website safe and secure.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Comprehensive One-click Security Audit\u003C\u002Fstrong>: With just one click, perform over 50+ detailed security checks that scrutinize every corner of your site for security vulnerabilities and performance issues.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>You’re in Command\u003C\u002Fstrong>: Security Ninja respects your autonomy, providing insights and recommendations without making unsolicited changes to your site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Holistic Security Evaluation\u003C\u002Fstrong>: Comprehensive checks on everything from the WordPress core, plugins, and themes to ensure they are up-to-date and secure.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Proactive Defense Strategies\u003C\u002Fstrong>: Equip yourself with the tools and knowledge to prevent attacks before they happen, safeguarding your site from potential threats.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Optimization Beyond Security\u003C\u002Fstrong>: Improve your site’s performance with database optimization tips, ensuring a seamless experience for your users.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Knowledge\u003C\u002Fstrong>: Each test comes with an easy-to-understand explanation, documentation, and actionable steps to fix identified issues.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Customized Security Insights\u003C\u002Fstrong>: Tailored security assessments to check critical updates and configurations specific to your WordPress setup for a personalized protection strategy.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Future-Proof Your Site\u003C\u002Fstrong>: Stay ahead with tests that include the latest WordPress features and best practices for site security.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Prevent Unauthorized Access\u003C\u002Fstrong>: Strengthen your defenses with checks designed to prevent weak passwords and unauthorized file access.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Secure Configuration Checks\u003C\u002Fstrong>: Ensure your website is configured according to security best practices, from file permissions to security headers, for comprehensive protection against threats.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Enhance your website’s security, performance, and user experience with Security Ninja – your trusted partner in WordPress protection.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>Security Ninja Pro\u003C\u002Fstrong> has extra features: Firewall, Filter Suspicious Queries, Country Blocking, Core Scanner, Malware Scanner, Auto Fixer for some of the tests, Events Logger & Scheduled Scans.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cp>An all-in-one security solution for any site. With premium support and continuous updates Security Ninja \u003Cstrong>Pro\u003C\u002Fstrong> is a perfect tool to keep your site safe. \u003Ca href=\"https:\u002F\u002Fwpsecurityninja.com\u002F?utm_source=wordpressorg&utm_medium=content&utm_campaign=readme&utm_content=see-what-pro-offers\" rel=\"nofollow ugc\">See what the PRO version offers\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Automatically block \u003Cstrong>600+ million bad IPs\u003C\u002Fstrong> with one click! \u003Ca href=\"https:\u002F\u002Fwpsecurityninja.com\u002F?utm_source=wordpressorg&utm_medium=content&utm_campaign=readme&utm_content=cloud-firewall\" rel=\"nofollow ugc\">Security Ninja Pro Firewall\u003C\u002Fa> will help you stay one step ahead of bad guys by using the collective know-how of millions of attacked sites, and ban bad guys before they even open your site.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>Read more about Pro features on the \u003Ca href=\"https:\u002F\u002Fwpsecurityninja.com\u002F?utm_source=wordpressorg&utm_medium=content&utm_campaign=readme&utm_content=readmoreaboutpro\" rel=\"nofollow ugc\">Security Ninja website\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cp>\u003Cstrong>What others say about the plugin\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpmayor.com\u002Fsecurity-ninja-review-wordpress-security-plugin\u002F\" rel=\"nofollow ugc\">WP Mayor: “Easy-to-Use WordPress Security Plugin”\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwplift.com\u002Fsecurity-ninja-review\" rel=\"nofollow ugc\">WPLift\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.wpexplorer.com\u002Fwordpress-security-can-security-ninja-keep-your-site-safe\u002F\" rel=\"nofollow ugc\">WPExplorer\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwploop.com\u002Fsecurity-ninja-review\u002F\" rel=\"nofollow ugc\">WP Loop\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.bitcatcha.com\u002Fblog\u002Fsecurity-ninja-plugin-review\u002F\" rel=\"nofollow ugc\">Bitcatcha.com\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.webhostingsecretrevealed.net\u002Fblog\u002Fwordpress-blog\u002F10-actionable-wordpress-security-tips\u002F\" rel=\"nofollow ugc\">WebHostingSecretRevealed\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.ravisinghblog.in\u002Fwp-security-ninja-review\u002F\" rel=\"nofollow ugc\">Ravi Singh\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Ftutorials7.com\u002Fsecurity-ninja-review.html\" rel=\"nofollow ugc\">Tutorials 7\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.onlinedecoded.com\u002Fsecurity-ninja-review\u002F\" rel=\"nofollow ugc\">onlinedecoded.com\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Tests\u003C\u002Fstrong>\u003Cbr \u002F>\n* The tests include:\u003Cbr \u002F>\n  * brute-force attack on user accounts to test password strength\u003Cbr \u002F>\n  * numerous installation parameters tests\u003Cbr \u002F>\n  * file permissions\u003Cbr \u002F>\n  * version hiding\u003Cbr \u002F>\n  * 0-day exploits tests\u003Cbr \u002F>\n  * debug and auto-update modes tests\u003Cbr \u002F>\n  * database configuration tests\u003Cbr \u002F>\n  * Apache and PHP related tests\u003Cbr \u002F>\n  * WP options tests\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Complete list of tests:\n\u003Cul>\n\u003Cli>Check if Application Passwords feature is enabled (new to WP 5.6)\u003C\u002Fli>\n\u003Cli>Check if WordPress core is up to date\u003C\u002Fli>\n\u003Cli>Check if automatic WordPress core updates are enabled\u003C\u002Fli>\n\u003Cli>Check if plugins are up to date\u003C\u002Fli>\n\u003Cli>Check if there are deactivated plugins\u003C\u002Fli>\n\u003Cli>Check if active plugins have been updated in the last 12 months\u003C\u002Fli>\n\u003Cli>Check if active plugins are compatible with your version of WP\u003C\u002Fli>\n\u003Cli>Check if themes are up to date\u003C\u002Fli>\n\u003Cli>Check if there are any deactivated themes\u003C\u002Fli>\n\u003Cli>Check if full WordPress version info is revealed in page’s meta data\u003C\u002Fli>\n\u003Cli>Check if REST API links are displayed in page’s meta data\u003C\u002Fli>\n\u003Cli>Check the PHP version is up to date\u003C\u002Fli>\n\u003Cli>Check the MySQL version\u003C\u002Fli>\n\u003Cli>Check if server response headers contain detailed PHP version info\u003C\u002Fli>\n\u003Cli>Check if expose_php PHP directive is turned off\u003C\u002Fli>\n\u003Cli>Check if user with username “admin” and administrator privileges exists\u003C\u002Fli>\n\u003Cli>Check if “anyone can register” option is enabled\u003C\u002Fli>\n\u003Cli>Check user’s password strength with a brute-force attack\u003C\u002Fli>\n\u003Cli>Check for display of unnecessary information on failed login attempts\u003C\u002Fli>\n\u003Cli>Check if database table prefix is the default one\u003C\u002Fli>\n\u003Cli>Check if security keys and salts have proper values\u003C\u002Fli>\n\u003Cli>Check the age of security keys and salts\u003C\u002Fli>\n\u003Cli>Test the strength of WordPress database password\u003C\u002Fli>\n\u003Cli>Check if general debug mode is enabled\u003C\u002Fli>\n\u003Cli>Check if the debug.log file exists\u003C\u002Fli>\n\u003Cli>Check if database debug mode is enabled\u003C\u002Fli>\n\u003Cli>Check if JavaScript debug mode is enabled\u003C\u002Fli>\n\u003Cli>Check if display_errors PHP directive is turned off\u003C\u002Fli>\n\u003Cli>Check if WordPress installation address is the same as the site address\u003C\u002Fli>\n\u003Cli>Check if wp-config.php file has the right permissions (chmod) set\u003C\u002Fli>\n\u003Cli>Check if register_globals PHP directive is turned off\u003C\u002Fli>\n\u003Cli>Check if PHP safe mode is disabled\u003C\u002Fli>\n\u003Cli>Check if allow_url_include PHP directive is turned off\u003C\u002Fli>\n\u003Cli>Check if plugins\u002Fthemes file editor is enabled\u003C\u002Fli>\n\u003Cli>Check if uploads folder is browsable by browsers\u003C\u002Fli>\n\u003Cli>Test if user with ID 1 and administrator role exists\u003C\u002Fli>\n\u003Cli>Check if Windows Live Writer link is present in pages’ header data\u003C\u002Fli>\n\u003Cli>Check if wp-config.php is present on the default location\u003C\u002Fli>\n\u003Cli>Check if MySQL server is connectable from outside with the WP user\u003C\u002Fli>\n\u003Cli>Check if EditURI link is present in pages’ header data\u003C\u002Fli>\n\u003Cli>Check if TimThumb script is used in the active theme\u003C\u002Fli>\n\u003Cli>Check if the server is vulnerable to the Shellshock bug #6271\u003C\u002Fli>\n\u003Cli>Check if the server is vulnerable to the Shellshock bug #7169\u003C\u002Fli>\n\u003Cli>Check if admin interface is delivered via SSL\u003C\u002Fli>\n\u003Cli>Check if MySQL account used by WordPress has too many permissions\u003C\u002Fli>\n\u003Cli>Test if a list of usernames can be fetched by looping through user IDs on http:\u002F\u002Fsiteurl.com\u002F?author={ID} (also called username enumeration)\u003C\u002Fli>\n\u003Cli>Check if server response headers contain Strict-Transport-Security\u003C\u002Fli>\n\u003Cli>Check if server response headers contain X-Frame-Options\u003C\u002Fli>\n\u003Cli>Check if server response headers contain X-Content-Type-Options\u003C\u002Fli>\n\u003Cli>Check if server response headers contain Content-Security-Policy\u003C\u002Fli>\n\u003Cli>Check if server response headers contain Strict-Transport-Security\u003C\u002Fli>\n\u003Cli>Check if server response headers contain Referrer-Policy\u003C\u002Fli>\n\u003Cli>Check if server response headers contain Feature-Policy\u003C\u002Fli>\n\u003Cli>Check for unwanted files in your root folder you should remove\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>License info\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fcarhartl\u002Fjquery-cookie\" rel=\"nofollow ugc\">jQuery Cookie Plugin, Copyright 2013 Klaus Hartl\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>The vulnerability scanner uses data from the \u003Ca href=\"https:\u002F\u002Fnvd.nist.gov\u002F\" rel=\"nofollow ugc\">National Vulnerability Database – NVD\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>This product includes IP2Location LITE data available from \u003Ca href=\"https:\u002F\u002Flite.ip2location.com\" rel=\"nofollow ugc\">https:\u002F\u002Flite.ip2location.com\u003C\u002Fa>.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>This plugin uses the \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fcollizo4sky\u002Fpersist-admin-notices-dismissal\" rel=\"nofollow ugc\">Persist Admin notice Dismissals\u003C\u002Fa> by Collins Agbonghama @collizo4sky\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Firewall rules are based on 8G Firewall by Jeff Starr – https:\u002F\u002Fperishablepress.com\u002F8g-blacklist\u002F\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>How can I report security bugs?\u003C\u002Fh4>\n\u003Cp>You can report security bugs through the Patchstack Vulnerability Disclosure Program. The Patchstack team help validate, triage and handle any security vulnerabilities. \u003Ca href=\"https:\u002F\u002Fpatchstack.com\u002Fdatabase\u002Fvdp\u002Fsecurity-ninja\" rel=\"nofollow ugc\">Report a security vulnerability.\u003C\u002Fa>\u003C\u002Fp>\n","WordPress security plugin with free basic firewall\u002FWAF, vulnerability and core scanning, and 50+ core integrity checks.",7000,852876,92,99,"2026-04-05T21:30:00.000Z","6.9.4","4.7",[18,50,19,72,20],"vulnerability","https:\u002F\u002Fwpsecurityninja.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsecurity-ninja.5.277.zip",1,"2025-07-23 00:00:00",{"slug":78,"name":79,"version":80,"author":81,"author_profile":82,"description":83,"short_description":84,"active_installs":85,"downloaded":86,"rating":87,"num_ratings":88,"last_updated":89,"tested_up_to":69,"requires_at_least":90,"requires_php":91,"tags":92,"homepage":95,"download_link":96,"security_score":97,"vuln_count":11,"unpatched_count":11,"last_vuln_date":24,"fetched_at":25},"advanced-ip-blocker","Advanced IP Blocker","8.9.10","IniLerm","https:\u002F\u002Fprofiles.wordpress.org\u002Finilerm\u002F","\u003Cp>\u003Cstrong>Advanced IP Blocker\u003C\u002Fstrong> is your all-in-one security solution to safeguard your WordPress website from a wide range of threats. This plugin provides a comprehensive suite of tools to automatically detect and block malicious activity, including brute-force attacks, vulnerability scanning, and spam bots. With its intuitive interface, you can easily manage whitelists, blocklists, and view detailed security logs to understand exactly how your site is being protected.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>Important Note on PHP Version:\u003C\u002Fstrong>\u003Cbr \u002F>\n  To ensure maximum security and access to all features, we strongly recommend using \u003Cstrong>PHP 8.1 or higher\u003C\u002Fstrong>. Some advanced features (like the local MaxMind database or full 2FA management via WP-CLI) require PHP 8.1.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cp>\u003Cstrong>Key Features:\u003C\u002Fstrong>\u003Cbr \u002F>\n*   \u003Cstrong>(NEW) Granular JS Challenge Modes:\u003C\u002Fstrong> You can now choose exactly how the security challenge behaves. Select “Managed” for ultimate security requiring human interaction (a checkbox), or “Automatic” for an invisible, transparent Proof-of-Work execution that stops bots silently. Apply different modes per module!\u003Cbr \u002F>\n*   \u003Cstrong>(NEW) Country Selector Copy\u002FPaste:\u003C\u002Fstrong> Say goodbye to manually selecting 50+ countries. You can now instantly copy and paste a raw list of 2-letter country codes directly into Geoblocking, Geo-Challenge, and Whitelist Login fields.\u003Cbr \u002F>\n*   \u003Cstrong>(NEW) AIB Cloud Network V3:\u003C\u002Fstrong> Upgrade to the next-generation distributed threat intelligence network. The new API V3 provides secure, individual API Keys per site, drastically improving synchronization reliability, threat telemetry, and global network stability.\u003Cbr \u002F>\n*   \u003Cstrong>(NEW) Whitelist Login Countries:\u003C\u002Fstrong> Take absolute control over administrative access. Easily restrict your WordPress login page and XML-RPC to only allow connections from specific, whitelisted countries, instantly blocking unauthorized foreign login attempts.\u003Cbr \u002F>\n*   \u003Cstrong>(IMPROVED) Bulk Import\u002FExport for Blocked IPs & Whitelist:\u003C\u002Fstrong> Seamlessly import massive lists of IPs via CSV or manual entry. The system now features a bulletproof “Bulk Import” type, strict duration inheritance, and intelligent conflict resolution.\u003Cbr \u002F>\n*   \u003Cstrong>(NEW) Internal Security & Forensics:\u003C\u002Fstrong> A complete audit suite solely for WordPress. Track every sensitive event (plugin installs, settings changes, user logins) and monitor your critical files for unauthorized modifications with the integrated File Integrity Monitor.\u003Cbr \u002F>\n*   \u003Cstrong>(NEW) Activity Audit Log:\u003C\u002Fstrong> Gain complete visibility into what’s happening on your site. Who deactivated a plugin? Who changed a setting? The Audit Log answers these questions with timestamped, immutable records.\u003Cbr \u002F>\n*   \u003Cstrong>(NEW) Deep Scan Email Reports:\u003C\u002Fstrong> Get a weekly security summary delivered to your inbox, detailing pending updates, vulnerability status, and recent attack trends.\u003Cbr \u002F>\n*   \u003Cstrong>Username Blocking & Rules:\u003C\u002Fstrong> Gain granular control over login security. Creating Advanced Rules to block, challenge, or score specific usernames (e.g., “admin”, “test”).\u003Cbr \u002F>\n*   \u003Cstrong>Enhanced Lockdown Notifications:\u003C\u002Fstrong> Distributed Lockdowns (404\u002F403) now fully support Email and Push notifications, ensuring you never miss a critical security event.\u003Cbr \u002F>\n*   \u003Cstrong>Improved Logging:\u003C\u002Fstrong> New “Endpoint Challenge” event type provides deeper visibility into challenges served during automated lockdowns.\u003Cbr \u002F>\n*   \u003Cstrong>Server IP Reputation Check. Instantly audit your web server’s IP address against major blacklists (Spamhaus, AbuseIPDB) to diagnose SEO and email delivery issues.\u003Cbr \u002F>\n*   **HTTP Security Headers.\u003C\u002Fstrong> Easily configure essential security headers like HSTS, X-Frame-Options, and Permissions-Policy to harden your site against clickjacking, sniffing, and other browser-based attacks. Includes a “Report-Only” mode for CSP.\u003Cbr \u002F>\n*   \u003Cstrong>Site Health & Vulnerability Scanner. Audit your WordPress environment instantly. Detects outdated plugins, insecure PHP versions, and checks your installed plugins against a database of 30,000+ known vulnerabilities.\u003Cbr \u002F>\n*   **PERFORMANCE BOOST: High-Speed Community Database. Migrated the “Community Defense Network” blocklist to a dedicated, indexed database table. This allows checking thousands of malicious IPs in microseconds with zero impact on site memory usage.\u003Cbr \u002F>\n*   **WordPress 6.9 Ready. Fully tested and compatible with the latest WordPress core update.\u003Cbr \u002F>\n*   **Community Defense Network. Join forces with other WordPress admins. The plugin now shares anonymous attack data to build a global, real-time blocklist of verified threats. Protect your site with community-powered intelligence.\u003Cbr \u002F>\n*   **Auto-Cleaning Logic. Smart expiration handling ensures your blocklists stay fresh and performant, automatically removing stale IPs from both the database and external firewalls (Cloudflare\u002F.htaccess).\u003Cbr \u002F>\n*   **Cloud Edge Defense (Cloudflare). Connect your site directly to Cloudflare’s global network. Automatically sync your blocklists to the cloud to stop attackers before they reach your server. Zero server load protection.\u003Cbr \u002F>\n*   **Server-Level Firewall (.htaccess). Extreme performance upgrade. Write blocking rules and file hardening protections directly to your .htaccess file. Blocks threats instantly without loading PHP or WordPress.\u003Cbr \u002F>\n*   **IMPROVED: Smart Bot Verification. Enhanced logic to correctly identify legitimate traffic from iOS devices (iCloud Private Relay) and social media previews, eliminating false positives while keeping impostors out.\u003Cbr \u002F>\n*   **File Hardening.\u003C\u002Fstrong> Protect your most sensitive files (\u003Ccode>wp-config.php\u003C\u002Fcode>, \u003Ccode>readme.html\u003C\u002Fcode>, \u003Ccode>.git\u003C\u002Fcode>) at the server level with a single click.\u003Cbr \u002F>\n*   \u003Cstrong>AbuseIPDB Integration.\u003C\u002Fstrong> Proactively block attackers before they strike. The plugin can now check visitor IPs against AbuseIPDB’s real-time, crowdsourced database of malicious IPs and block those with a high abuse score on their very first request.\u003Cbr \u002F>\n*   \u003Cstrong>Edge Firewall Mode!\u003C\u002Fstrong> Protect any PHP file or standalone application within your WordPress directory (even if it’s not part of WordPress). Ideal for securing custom scripts, legacy applications, or folders like \u003Ccode>\u002Fscan\u002F\u003C\u002Fcode>. (Requires manual configuration).\u003Cbr \u002F>\n*   \u003Cstrong>Advanced Rules Engine!\u003C\u002Fstrong> Create powerful, custom security rules with multiple conditions (IP, Country, ASN, URI, User-Agent) and actions (Block, Challenge, or add Threat Score).\u003Cbr \u002F>\n*   \u003Cstrong>Known Bot Verification.\u003C\u002Fstrong> A powerful new security layer that uses reverse DNS lookups to verify legitimate crawlers like Googlebot and Bingbot. This completely neutralizes attackers who try to bypass security rules by faking their User-Agent, assigning high threat scores to impostors.\u003Cbr \u002F>\n*   \u003Cstrong>Onboarding Setup Wizard.\u003C\u002Fstrong> A brand new step-by-step wizard that guides new users through the essential security configurations (IP whitelisting, WAF, and bot traps) in under a minute, ensuring a strong security posture from day one.\u003Cbr \u002F>\n*   \u003Cstrong>Major Refactor: Codebase Modernization.\u003C\u002Fstrong> The entire plugin architecture has been refactored into a modern, modular structure. Logic for admin pages, AJAX, actions, and settings is now handled by dedicated classes, making the plugin more stable, performant, and easier to maintain and extend in the future.\u003Cbr \u002F>\n*   \u003Cstrong>Advanced IP Spoofing Protection.\u003C\u002Fstrong> A zero-trust “Trusted Proxies” system ensures the plugin always identifies the true visitor IP, even behind complex setups like Cloudflare or a custom reverse proxy. It neutralizes attacks that attempt to fake their IP, preventing block evasion and the framing of innocent users.\u003Cbr \u002F>\n*   \u003Cstrong>Geo-Challenge.\u003C\u002Fstrong> A smarter way to handle traffic from high-risk countries. Instead of a hard block, it presents a quick, invisible JavaScript challenge that stops bots but is seamless for human visitors. This reduces unwanted traffic without affecting potential legitimate users.\u003Cbr \u002F>\n*   \u003Cstrong>ENHANCEMENT: Full Bulk-Action Support.\u003C\u002Fstrong> IP management is now faster than ever. Both the Whitelist and the Blocked IPs list now support full bulk actions, allowing you to select and remove multiple entries at once, or unblock all IPs with a single click.\u003Cbr \u002F>\n*   \u003Cstrong>Endpoint Lockdown Mode:\u003C\u002Fstrong> Automatically shields \u003Ccode>wp-login.php\u003C\u002Fcode> and \u003Ccode>xmlrpc.php\u003C\u002Fcode> with a JavaScript challenge during sustained distributed attacks, preventing server overload.\u003Cbr \u002F>\n*   \u003Cstrong>Two-Factor Authentication (2FA):\u003C\u002Fstrong> Secure user accounts with industry-standard TOTP authentication, backup codes, role enforcement, and a central admin management dashboard.\u003Cbr \u002F>\n*   \u003Cstrong>IP Trust & Threat Scoring System:\u003C\u002Fstrong> An intelligent defense that assigns “threat points” to IPs for malicious actions, blocking them only when they reach a configurable score. More accurate and context-aware than simple rules.\u003Cbr \u002F>\n*   \u003Cstrong>Attack Signature Engine (Beta):\u003C\u002Fstrong> Proactively stops distributed botnet attacks by identifying and blocking the attacker’s “fingerprint” (signature) instead of just individual IPs.\u003Cbr \u002F>\n*   \u003Cstrong>Web Application Firewall (WAF):\u003C\u002Fstrong> Block malicious requests (SQLi, XSS, etc.) with a customizable ruleset.\u003Cbr \u002F>\n*   \u003Cstrong>And much more:\u003C\u002Fstrong> Rate Limiting, Country & ASN Blocking (with Spamhaus support), ASN Whitelisting, Push Notifications, Google reCAPTCHA, Honeypots, Active User Session Management, and Full WP-CLI Support.\u003C\u002Fp>\n","A complete WordPress security firewall: blocks IPs, bots & countries. Includes an intelligent WAF, Threat Scoring, Geo-Challenge, 2FA, and Anti-Sp &hellip;",1000,27735,94,15,"2026-04-04T10:59:00.000Z","6.7","8.1",[93,18,94,19,20],"country-block","ip-blocker","https:\u002F\u002Fadvaipbl.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fadvanced-ip-blocker.8.9.10.zip",100,{"slug":99,"name":100,"version":101,"author":102,"author_profile":103,"description":104,"short_description":105,"active_installs":106,"downloaded":107,"rating":97,"num_ratings":108,"last_updated":109,"tested_up_to":110,"requires_at_least":111,"requires_php":16,"tags":112,"homepage":115,"download_link":116,"security_score":67,"vuln_count":75,"unpatched_count":11,"last_vuln_date":117,"fetched_at":25},"bitfire","BitFire Security – Firewall, WAF, Bot\u002FSpam Blocker, Login Security","4.8.2","Cory Marsh","https:\u002F\u002Fprofiles.wordpress.org\u002Fbitslip6\u002F","\u003Ch3>Real-Time Security for WordPress\u003C\u002Fh3>\n\u003Cp>BitFire protects your website from bots, hackers, malware, and critical vulnerabilities – before they can cause damage.\u003C\u002Fp>\n\u003Cp>This plugin brings advanced security technology used by large enterprises to your WordPress site, now available in a free version. Whether you manage a business website, blog, or WooCommerce store, BitFire gives you powerful protection and visibility into your traffic.\u003C\u002Fp>\n\u003Ch3>Smarter Protection with AI\u003C\u002Fh3>\n\u003Cp>Most security plugins wait for updates to detect new threats. BitFire takes a different approach: it uses artificial intelligence and real-time request analysis to \u003Cstrong>stop zero-day attacks\u003C\u002Fstrong>, bots, and malicious users \u003Cstrong>before\u003C\u002Fstrong> they get access to your site.\u003C\u002Fp>\n\u003Cp>Our AI learns what normal traffic looks like for your site and blocks anything suspicious – without you needing to configure endless rules.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>“Unlike traditional firewalls that allow everything by default and react to known threats, BitFire only allows verified traffic – stopping new and unknown attacks instantly.”\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch3>Key Features\u003C\u002Fh3>\n\u003Ch4>🔐 Security Highlights (Free & Pro)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Stop Bots Automatically\u003C\u002Fstrong> – Block fake users, spam bots, and scanners (no captchas needed).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Malware Scanner\u003C\u002Fstrong> – Scan your site for infected or unknown files using a fast hash-based scanner.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Real-Time Traffic Monitor\u003C\u002Fstrong> – See who’s visiting your site, including IP, city, browser, request rate, and referrer.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Login Protection\u003C\u002Fstrong> – Block bots from abusing your login page, detect phishing attacks, and stop brute-force attempts.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Human \u002F Bot Detection\u003C\u002Fstrong> – BitFire can tell the difference between real users and fake browsers with 99.7% accuracy.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>IP Reputation\u003C\u002Fstrong> – Block over 300,000 known malicious IPs with real-time threat intelligence.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>🚀 Built for Speed\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>BitFire logs traffic in \u003Cstrong>under 2ms per request\u003C\u002Fstrong>, thanks to a high-performance binary logging engine.\u003C\u002Fli>\n\u003Cli>Unlike bulky WAFs that rely on large rule sets, BitFire looks at the \u003Cstrong>intent\u003C\u002Fstrong> behind every request – giving you \u003Cstrong>faster speeds\u003C\u002Fstrong> and fewer false positives.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>🔍 Live Traffic Monitoring\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Track every visitor request in real time  \u003C\u002Fli>\n\u003Cli>Remove blind spots and gain confidence in your site security\u003C\u002Fli>\n\u003Cli>Filter traffic by IP, URL, response code, or user-agent  \u003C\u002Fli>\n\u003Cli>View bot fingerprints from over 3,000 known bots and 180 real browsers  \u003C\u002Fli>\n\u003Cli>See what was blocked and why\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>🛡 Runtime Protection (PRO)\u003C\u002Fh4>\n\u003Cp>BitFire includes WordPress’s first Runtime Application Self Protection (RASP) firewall.\u003C\u002Fp>\n\u003Cp>This means BitFire watches what your plugins and code are doing in real time and blocks anything suspicious – including:\u003Cbr \u002F>\n– Unauthorized file modifications (File RASP)\u003Cbr \u002F>\n– Suspicious database queries (Database RASP)\u003Cbr \u002F>\n– Unauthorized account creation or privilege escalation (Authentication RASP)\u003Cbr \u002F>\n– Dangerous outbound network requests (Network RASP)\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>“It’s like a bodyguard inside your WordPress server – watching every move and stopping threats before they execute.”\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch3>What’s Included in the Free Version?\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Traffic logger (current day only)\u003C\u002Fli>\n\u003Cli>Real-time bot and malware detection\u003C\u002Fli>\n\u003Cli>File scanner with fast hash matching\u003C\u002Fli>\n\u003Cli>Block plugin and theme enumeration tools\u003C\u002Fli>\n\u003Cli>Live IP and user-agent request viewer\u003C\u002Fli>\n\u003Cli>Block hacking tools like WPScan, Nmap, Nikto, etc.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>What’s in BitFire Pro?\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Web Firewall rated A+ by cloudbric with real-time updates\u003C\u002Fli>\n\u003Cli>Full Runtime Self Protection engine (File, Database, Account, and Network protection)\u003C\u002Fli>\n\u003Cli>Advanced login protection and phishing detection\u003C\u002Fli>\n\u003Cli>Malware scanner with 14 million+ clean file hashes\u003C\u002Fli>\n\u003Cli>Automatic browser fingerprinting and allowlists\u003C\u002Fli>\n\u003Cli>Auto-configured CSP and security headers (A+ rating)\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Increased traffic logging and historical view to 30 days\u003C\u002Fp>\n\u003Cp>** Independent WAF testing by Cloudbric https:\u002F\u002Flabs.cloudbric.com\u002Fwafer **\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>BitFire [PRO] – 🇦  (94%)\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>MalCare [PRO] – 🇫  (34%)\u003C\u002Fli>\n\u003Cli>WordFence [PRO] – 🇩  (41%)\u003C\u002Fli>\n\u003Cli>iThemes Security – 🇫  (2%)\u003C\u002Fli>\n\u003Cli>Ninja Firewall [PRO] – 🇩  (67%)\u003C\u002Fli>\n\u003Cli>Site Ground Security – 🇫  (2%)\u003C\u002Fli>\n\u003Cli>Shield Security [PRO] – 🇫  (2%)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Trusted by Enterprises, Now Available to You\u003C\u002Fh3>\n\u003Cp>BitFire is used by major organizations on our managed enterprise platform and developed by a veteran security architect with over 20 years of experience defending Fortune 500s and critical infrastructure.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>This free release brings our best bot detection and traffic logging features to the WordPress community – at no cost.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch3>Learn More\u003C\u002Fh3>\n\u003Cp>Visit \u003Ca href=\"https:\u002F\u002Fbitfire.co\" rel=\"nofollow ugc\">https:\u002F\u002Fbitfire.co\u003C\u002Fa> for:\u003Cbr \u002F>\n– Full product comparison\u003Cbr \u002F>\n– Malware removal services\u003Cbr \u002F>\n– Pro pricing\u003Cbr \u002F>\n– Support\u003C\u002Fp>\n\u003Ch3>Privacy \u002F Monitoring \u002F Data Collection\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\n\u003Cp>Privacy.  We take privacy very seriously. BitFire inspects all traffic going to the webserver and takes care to filter out any potentially sensitive information by replacing it with \u003Cstrong>\u003Cem>redacted\u003C\u002Fem>\u003C\u002Fstrong>. The config.ini file includes a list of common sensitive field names under the “filtered_logging” section. You can add additional fields to filter in the config file by adding a line “filtered_logging[field_name] = true” and replacing “field_name” with the name of the desired parameter to filter.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>BitFire includes an error handler which monitors it’s operation. In the event an error is detected in the BitFire software; including during install, an alert can be sent to BitFire’s developer team. The development team monitors these errors in real time and includes fixes for any detected errors in each new release.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Malware scanner. BitFire sends tiny 64bit hashes (signatures, or fingerprints) of every file to our hash database. For instance, index.php may hash to the number: 812612388126487. The database is many gigabytes and centrally located on our servers. BitFire uses that information to determine if a file has been modified or is a known good file and sends the results back to your site. Client hashes are never stored off your server.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Log data and configuration data is stored locally on the filesystem in the wp-content\u002Fuploads\u002Fbitfire_RANDOM directory. This directory is unique and hidden from the Internet and protected by an .htaccess file. Web servers that are configured to allow directory listings will want to ensure that the file wp-content\u002Fuploads\u002Findex.php is present to prevent directory listings. The random directory name is 12 characters long and is generated on install. The directory is not accessible from the Internet and is protected by a .htaccess file.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Fol>\n","Real-time firewall that stops bots, malware, and hackers with real AI, file protection, and traffic analytics without slowing down your site",300,13935,7,"2025-09-21T22:57:00.000Z","6.8.5","6.1",[113,18,114,19,20],"activity-log","malware-scanner","https:\u002F\u002Fbitfire.co\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbitfire.4.8.2.zip","2025-08-01 00:00:00",{"slug":119,"name":120,"version":121,"author":122,"author_profile":123,"description":124,"short_description":125,"active_installs":97,"downloaded":126,"rating":97,"num_ratings":127,"last_updated":128,"tested_up_to":129,"requires_at_least":130,"requires_php":131,"tags":132,"homepage":135,"download_link":136,"security_score":66,"vuln_count":11,"unpatched_count":11,"last_vuln_date":24,"fetched_at":25},"anti-hacker","Anti-Hacker – Security Plugin","0.6.4","emiliocini","https:\u002F\u002Fprofiles.wordpress.org\u002Femiliocini\u002F","\u003Cp>\u003Cstrong>Anti-Hacker\u003C\u002Fstrong> is a \u003Cstrong>WordPress Security plugin\u003C\u002Fstrong>. It gives you the best security solutions with its powerful and easy-to-use features. Without physically changing any directory or file, Anti-Hacker can take your website’s security to the next level with the ultimate wordpress protection technology.\u003Cbr \u002F>\nOur team have worked with vulnerabilities scanner for long time, and now, we have created a thecnology to protect the other side, making the life of hackers really hard, and force them to choose a new target that is not you.\u003C\u002Fp>\n\u003Cp>The plugin avoid vulnerability scanner to detect yor wordpress information and sensitive data, as version, themes, plugins, valid users and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Anti-Hacker\u003C\u002Fstrong> also offer the protections bellow:\u003Cbr \u002F>\n* Brute Force attacks\u003Cbr \u002F>\n* Hide wp-admin\u003Cbr \u002F>\n* Detection of sensitive files exposed\u003Cbr \u002F>\n* XML-RPC attacks\u003Cbr \u002F>\n* XSS, SQL Injection, PHP Injection, CMD Injection and Transversal Directory\u003Cbr \u002F>\n* Detect and block vulnerability scanner activities\u003Cbr \u002F>\n* HTTP Header level attack\u003Cbr \u002F>\n* and more.\u003C\u002Fp>\n\u003Cp>It hides the WP sensitive information, common paths, plugins, and themes paths, users, offering the \u003Cstrong>best protection against real hacker and bots attacks\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>Note! \u003Cstrong>No file or directory is physically changed\u003C\u002Fstrong>. All the changes are made by server rewrite rules without affecting the SEO or the loading speed.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Anti-Hacker\u003C\u002Fstrong> works with other security plugins without any problem.\u003C\u002Fp>\n\u003Cp>Anti-Hacker is compatible with all servers, hosting services, and also supports WP Multisite.\u003C\u002Fp>\n\u003Cp>Over 90,000 hacking attacks per minute strike WordPress sites and WordPress hosting around the world, hitting not only large corporate websites packed with sensitive data, but also sites belonging to small businesses, independent entrepreneurs, and individuals running personal blogs.\u003C\u002Fp>\n\u003Cp>Security of WordPress sites typically tops the list of concerns for new and experienced website owners alike.\u003C\u002Fp>\n\u003Cp>For owners of WordPress sites, statistics like that one raises particular worries about the security not just of individual WordPress sites, but of WordPress itself.\u003C\u002Fp>\n","Anti-Hacker protects your Wordpress against hackers attacks, hiding sensitive information that would be used to exploit your site, detecting and fixin &hellip;",4439,3,"2024-11-16T01:47:00.000Z","6.7.0","4.3","5.6",[18,133,134,19,20],"hacker","hide-admin","http:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-anti-hacker\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fanti-hacker.0.6.zip",{"attackSurface":138,"codeSignals":221,"taintFlows":468,"riskAssessment":754,"analyzedAt":766},{"hooks":139,"ajaxHandlers":189,"restRoutes":210,"shortcodes":211,"cronEvents":212,"entryPointCount":108,"unprotectedCount":75},[140,146,150,154,160,164,168,172,176,180,185],{"type":141,"name":142,"callback":143,"priority":67,"file":144,"line":145},"action","admin_bar_menu","add_admin_bar_menu","whats-going-on-backend-controller.php",20,{"type":141,"name":147,"callback":148,"file":144,"line":149},"admin_menu","add_admin_page",21,{"type":141,"name":151,"callback":152,"file":144,"line":153},"init","wgo_download_files_controller",22,{"type":155,"name":156,"callback":157,"file":158,"line":159},"filter","cron_schedules","add_cron_intervals","whats-going-on-cronjobs.php",25,{"type":141,"name":161,"callback":162,"file":158,"line":163},"wgo_cron_check_waf_install","check_waf_install",28,{"type":141,"name":165,"callback":166,"file":158,"line":167},"wgo_cron_remove_old_data_hook","remove_old_data",34,{"type":141,"name":169,"callback":170,"file":158,"line":171},"wgo_cron_fill_country_columns_hook","fill_country_columns",40,{"type":141,"name":173,"callback":174,"file":158,"line":175},"wgo_cron_notify_ddos_hook","notify_ddos",46,{"type":141,"name":177,"callback":178,"file":158,"line":179},"wgo_cron_process_ban_rules_hook","process_ban_rules",52,{"type":141,"name":181,"callback":182,"file":183,"line":184},"template_redirect","save_404s","whats-going-on.php",47,{"type":141,"name":186,"callback":187,"file":183,"line":188},"admin_enqueue_scripts","enqueue_admin_css_js",48,[190,195,197,199,202,205,207],{"action":191,"nopriv":192,"callback":191,"hasNonce":192,"hasCapCheck":193,"file":194,"line":145},"wgo_show_payloads",false,true,"whats-going-on-ajax-controller.php",{"action":196,"nopriv":192,"callback":196,"hasNonce":192,"hasCapCheck":193,"file":194,"line":149},"wgo_main_server_processing",{"action":198,"nopriv":192,"callback":198,"hasNonce":192,"hasCapCheck":193,"file":194,"line":153},"wgo_all_ips_and_counters",{"action":200,"nopriv":192,"callback":200,"hasNonce":192,"hasCapCheck":193,"file":194,"line":201},"wgo_all_ips_404s",23,{"action":203,"nopriv":192,"callback":203,"hasNonce":192,"hasCapCheck":193,"file":194,"line":204},"wgo_all_urls_404s",24,{"action":206,"nopriv":192,"callback":206,"hasNonce":192,"hasCapCheck":193,"file":194,"line":159},"wgo_all_blocks",{"action":208,"nopriv":192,"callback":208,"hasNonce":192,"hasCapCheck":192,"file":194,"line":209},"wgo_main_chart",26,[],[],[213,214,216,218,219],{"hook":161,"callback":161,"file":158,"line":29},{"hook":165,"callback":165,"file":158,"line":215},36,{"hook":169,"callback":169,"file":158,"line":217},42,{"hook":173,"callback":173,"file":158,"line":188},{"hook":177,"callback":177,"file":158,"line":220},54,{"dangerousFunctions":222,"sqlUsage":223,"outputEscaping":260,"fileOperations":235,"externalRequests":11,"nonceChecks":28,"capabilityChecks":159,"bundledLibraries":464},[],{"prepared":224,"raw":88,"locations":225},43,[226,230,232,234,236,238,241,243,246,248,250,252,254,256,258],{"file":227,"line":228,"context":229},"view\\sub-main-chart.php",241,"$wpdb->get_var() with variable interpolation",{"file":227,"line":231,"context":229},242,{"file":233,"line":224,"context":229},"view\\whats-going-on-view.php",{"file":233,"line":235,"context":229},44,{"file":194,"line":237,"context":229},265,{"file":239,"line":53,"context":240},"whats-going-on-database.php","$wpdb->get_results() with variable interpolation",{"file":239,"line":242,"context":240},95,{"file":244,"line":245,"context":240},"whats-going-on-ia-ban-rules.php",37,{"file":244,"line":247,"context":240},41,{"file":244,"line":249,"context":240},45,{"file":244,"line":251,"context":240},49,{"file":244,"line":253,"context":240},53,{"file":244,"line":255,"context":240},126,{"file":244,"line":257,"context":240},189,{"file":244,"line":259,"context":240},218,{"escaped":179,"rawEcho":261,"locations":262},116,[263,266,268,269,271,273,274,276,277,279,281,282,283,285,286,287,289,292,293,295,296,297,298,300,302,304,306,308,311,312,313,314,316,317,318,319,320,321,322,323,325,327,329,331,333,335,337,339,341,343,345,347,349,351,353,355,357,358,360,362,364,366,368,370,371,372,374,376,379,380,381,383,385,387,388,390,391,393,395,396,398,399,400,402,404,406,408,409,412,413,415,417,419,421,423,425,426,428,430,432,434,436,438,440,442,443,445,447,448,450,452,454,456,458,460,462],{"file":264,"line":159,"context":265},"view\\ajax-last-blocks.php","raw output",{"file":264,"line":267,"context":265},27,{"file":264,"line":29,"context":265},{"file":264,"line":270,"context":265},35,{"file":264,"line":272,"context":265},39,{"file":264,"line":171,"context":265},{"file":275,"line":153,"context":265},"view\\ajax-last-ips-doing-404s.php",{"file":275,"line":204,"context":265},{"file":275,"line":278,"context":265},29,{"file":280,"line":153,"context":265},"view\\ajax-last-urls-doing-404s.php",{"file":280,"line":204,"context":265},{"file":280,"line":278,"context":265},{"file":284,"line":149,"context":265},"view\\ajax-most-visited-from.php",{"file":284,"line":201,"context":265},{"file":284,"line":163,"context":265},{"file":288,"line":267,"context":265},"view\\sub-ban-rules.php",{"file":290,"line":291,"context":265},"view\\sub-banned-ips.php",16,{"file":290,"line":245,"context":265},{"file":290,"line":294,"context":265},38,{"file":290,"line":272,"context":265},{"file":290,"line":224,"context":265},{"file":290,"line":184,"context":265},{"file":299,"line":204,"context":265},"view\\sub-countries-continents.php",{"file":299,"line":301,"context":265},63,{"file":299,"line":303,"context":265},66,{"file":299,"line":305,"context":265},122,{"file":299,"line":307,"context":265},158,{"file":309,"line":310,"context":265},"view\\sub-ddos.php",19,{"file":309,"line":310,"context":265},{"file":309,"line":235,"context":265},{"file":309,"line":235,"context":265},{"file":315,"line":291,"context":265},"view\\sub-last-blocks.php",{"file":315,"line":291,"context":265},{"file":315,"line":215,"context":265},{"file":315,"line":245,"context":265},{"file":315,"line":272,"context":265},{"file":315,"line":235,"context":265},{"file":315,"line":188,"context":265},{"file":315,"line":251,"context":265},{"file":227,"line":324,"context":265},58,{"file":227,"line":326,"context":265},60,{"file":227,"line":328,"context":265},68,{"file":227,"line":330,"context":265},72,{"file":227,"line":332,"context":265},76,{"file":227,"line":334,"context":265},78,{"file":227,"line":336,"context":265},117,{"file":227,"line":338,"context":265},119,{"file":227,"line":340,"context":265},131,{"file":227,"line":342,"context":265},133,{"file":227,"line":344,"context":265},145,{"file":227,"line":346,"context":265},147,{"file":227,"line":348,"context":265},159,{"file":227,"line":350,"context":265},161,{"file":227,"line":352,"context":265},173,{"file":227,"line":354,"context":265},175,{"file":227,"line":356,"context":265},187,{"file":227,"line":257,"context":265},{"file":227,"line":359,"context":265},201,{"file":227,"line":361,"context":265},203,{"file":227,"line":363,"context":265},211,{"file":227,"line":365,"context":265},215,{"file":227,"line":367,"context":265},217,{"file":227,"line":369,"context":265},248,{"file":227,"line":369,"context":265},{"file":227,"line":369,"context":265},{"file":227,"line":373,"context":265},252,{"file":227,"line":375,"context":265},254,{"file":377,"line":378,"context":265},"view\\sub-most-visited-from.php",32,{"file":377,"line":167,"context":265},{"file":377,"line":272,"context":265},{"file":382,"line":278,"context":265},"view\\sub-regexes-errors.php",{"file":384,"line":278,"context":265},"view\\sub-regexes.php",{"file":384,"line":386,"context":265},62,{"file":384,"line":23,"context":265},{"file":389,"line":235,"context":265},"view\\sub-suspicious-behaviors.php",{"file":389,"line":175,"context":265},{"file":389,"line":392,"context":265},51,{"file":389,"line":394,"context":265},82,{"file":389,"line":30,"context":265},{"file":389,"line":397,"context":265},89,{"file":233,"line":251,"context":265},{"file":233,"line":253,"context":265},{"file":233,"line":401,"context":265},65,{"file":233,"line":403,"context":265},69,{"file":233,"line":405,"context":265},112,{"file":233,"line":407,"context":265},130,{"file":233,"line":340,"context":265},{"file":410,"line":411,"context":265},"waf-going-on.php",75,{"file":410,"line":87,"context":265},{"file":410,"line":414,"context":265},134,{"file":410,"line":416,"context":265},137,{"file":410,"line":418,"context":265},153,{"file":410,"line":420,"context":265},184,{"file":410,"line":422,"context":265},198,{"file":410,"line":424,"context":265},223,{"file":410,"line":231,"context":265},{"file":410,"line":427,"context":265},267,{"file":410,"line":429,"context":265},301,{"file":410,"line":431,"context":265},373,{"file":410,"line":433,"context":265},398,{"file":410,"line":435,"context":265},404,{"file":410,"line":437,"context":265},504,{"file":194,"line":439,"context":265},150,{"file":194,"line":441,"context":265},286,{"file":158,"line":326,"context":265},{"file":158,"line":444,"context":265},132,{"file":158,"line":446,"context":265},148,{"file":158,"line":359,"context":265},{"file":158,"line":449,"context":265},243,{"file":158,"line":451,"context":265},250,{"file":244,"line":453,"context":265},77,{"file":244,"line":455,"context":265},90,{"file":244,"line":457,"context":265},114,{"file":244,"line":459,"context":265},200,{"file":244,"line":461,"context":265},212,{"file":244,"line":463,"context":265},226,[465],{"name":466,"version":24,"knownCves":467},"DataTables",[],[469,485,495,508,539,551,561,569,597,611,634,654,728,737,746],{"entryPoint":470,"graph":471,"unsanitizedCount":75,"severity":484},"_check_regexes_uri (waf-going-on.php:209)",{"nodes":472,"edges":482},[473,477],{"id":474,"type":475,"label":476,"file":410,"line":231},"n0","source","$_SERVER['REQUEST_URI']",{"id":478,"type":479,"label":480,"file":410,"line":231,"wp_function":481},"n1","sink","echo() [XSS]","echo",[483],{"from":474,"to":478,"sanitized":192},"medium",{"entryPoint":486,"graph":487,"unsanitizedCount":75,"severity":484},"_check_countries (waf-going-on.php:338)",{"nodes":488,"edges":493},[489,492],{"id":474,"type":475,"label":490,"file":410,"line":491},"$_SERVER",351,{"id":478,"type":479,"label":480,"file":410,"line":431,"wp_function":481},[494],{"from":474,"to":478,"sanitized":192},{"entryPoint":496,"graph":497,"unsanitizedCount":75,"severity":484},"_remove_countries_to_block (whats-going-on-backend-controller.php:326)",{"nodes":498,"edges":506},[499,502],{"id":474,"type":475,"label":500,"file":144,"line":501},"$_REQUEST",328,{"id":478,"type":479,"label":503,"file":144,"line":504,"wp_function":505},"file_put_contents() [File Write]",336,"file_put_contents",[507],{"from":474,"to":478,"sanitized":192},{"entryPoint":509,"graph":510,"unsanitizedCount":11,"severity":538},"\u003Cwhats-going-on-view> (view\\whats-going-on-view.php:0)",{"nodes":511,"edges":533},[512,515,518,520,524,526,528,531],{"id":474,"type":475,"label":513,"file":233,"line":514},"$_GET",31,{"id":478,"type":479,"label":516,"file":233,"line":215,"wp_function":517},"get_var() [SQLi]","get_var",{"id":519,"type":475,"label":513,"file":233,"line":514},"n2",{"id":521,"type":479,"label":522,"file":233,"line":294,"wp_function":523},"n3","get_results() [SQLi]","get_results",{"id":525,"type":475,"label":476,"file":233,"line":251},"n4",{"id":527,"type":479,"label":480,"file":233,"line":251,"wp_function":481},"n5",{"id":529,"type":475,"label":530,"file":233,"line":514},"n6","$_GET (x2)",{"id":532,"type":479,"label":480,"file":233,"line":407,"wp_function":481},"n7",[534,535,536,537],{"from":474,"to":478,"sanitized":193},{"from":519,"to":521,"sanitized":193},{"from":525,"to":527,"sanitized":193},{"from":529,"to":532,"sanitized":193},"low",{"entryPoint":540,"graph":541,"unsanitizedCount":127,"severity":538},"\u003Cwaf-going-on> (waf-going-on.php:0)",{"nodes":542,"edges":548},[543,544,545,547],{"id":474,"type":475,"label":476,"file":410,"line":231},{"id":478,"type":479,"label":480,"file":410,"line":231,"wp_function":481},{"id":519,"type":475,"label":546,"file":410,"line":491},"$_SERVER (x2)",{"id":521,"type":479,"label":480,"file":410,"line":431,"wp_function":481},[549,550],{"from":474,"to":478,"sanitized":192},{"from":519,"to":521,"sanitized":192},{"entryPoint":552,"graph":553,"unsanitizedCount":11,"severity":538},"wgo_main_server_processing (whats-going-on-ajax-controller.php:30)",{"nodes":554,"edges":559},[555,558],{"id":474,"type":475,"label":556,"file":194,"line":557},"$_POST",121,{"id":478,"type":479,"label":522,"file":194,"line":305,"wp_function":523},[560],{"from":474,"to":478,"sanitized":193},{"entryPoint":562,"graph":563,"unsanitizedCount":11,"severity":538},"\u003Cwhats-going-on-ajax-controller> (whats-going-on-ajax-controller.php:0)",{"nodes":564,"edges":567},[565,566],{"id":474,"type":475,"label":556,"file":194,"line":557},{"id":478,"type":479,"label":522,"file":194,"line":305,"wp_function":523},[568],{"from":474,"to":478,"sanitized":193},{"entryPoint":570,"graph":571,"unsanitizedCount":596,"severity":538},"_save_main_configs (whats-going-on-backend-controller.php:166)",{"nodes":572,"edges":591},[573,576,579,582,583,586,587,590],{"id":474,"type":475,"label":574,"file":144,"line":575},"$_REQUEST['days_to_store']",168,{"id":478,"type":479,"label":577,"file":144,"line":575,"wp_function":578},"update_option() [Settings Manipulation]","update_option",{"id":519,"type":475,"label":580,"file":144,"line":581},"$_REQUEST['im_behind_proxy']",169,{"id":521,"type":479,"label":577,"file":144,"line":581,"wp_function":578},{"id":525,"type":475,"label":584,"file":144,"line":585},"$_REQUEST['notification_email']",170,{"id":527,"type":479,"label":577,"file":144,"line":585,"wp_function":578},{"id":529,"type":475,"label":588,"file":144,"line":589},"$_REQUEST['autoreload_datatables']",171,{"id":532,"type":479,"label":577,"file":144,"line":589,"wp_function":578},[592,593,594,595],{"from":474,"to":478,"sanitized":192},{"from":519,"to":521,"sanitized":192},{"from":525,"to":527,"sanitized":192},{"from":529,"to":532,"sanitized":192},4,{"entryPoint":598,"graph":599,"unsanitizedCount":28,"severity":538},"_save_dos_configs (whats-going-on-backend-controller.php:187)",{"nodes":600,"edges":608},[601,603,604,607],{"id":474,"type":475,"label":602,"file":144,"line":257},"$_REQUEST['limit_requests_per_minute']",{"id":478,"type":479,"label":577,"file":144,"line":257,"wp_function":578},{"id":519,"type":475,"label":605,"file":144,"line":606},"$_REQUEST['limit_requests_per_hour']",190,{"id":521,"type":479,"label":577,"file":144,"line":606,"wp_function":578},[609,610],{"from":474,"to":478,"sanitized":192},{"from":519,"to":521,"sanitized":192},{"entryPoint":612,"graph":613,"unsanitizedCount":596,"severity":538},"_save_ddos_configs (whats-going-on-backend-controller.php:195)",{"nodes":614,"edges":629},[615,618,619,621,622,625,626,628],{"id":474,"type":475,"label":616,"file":144,"line":617},"$_REQUEST['notify_requests_more_than_sd']",197,{"id":478,"type":479,"label":577,"file":144,"line":617,"wp_function":578},{"id":519,"type":475,"label":620,"file":144,"line":422},"$_REQUEST['notify_requests_more_than_2sd']",{"id":521,"type":479,"label":577,"file":144,"line":422,"wp_function":578},{"id":525,"type":475,"label":623,"file":144,"line":624},"$_REQUEST['notify_requests_more_than_3sd']",199,{"id":527,"type":479,"label":577,"file":144,"line":624,"wp_function":578},{"id":529,"type":475,"label":627,"file":144,"line":459},"$_REQUEST['notify_requests_less_than_x_percent']",{"id":532,"type":479,"label":577,"file":144,"line":459,"wp_function":578},[630,631,632,633],{"from":474,"to":478,"sanitized":192},{"from":519,"to":521,"sanitized":192},{"from":525,"to":527,"sanitized":192},{"from":529,"to":532,"sanitized":192},{"entryPoint":635,"graph":636,"unsanitizedCount":127,"severity":538},"_save_regexes_configs (whats-going-on-backend-controller.php:277)",{"nodes":637,"edges":650},[638,641,642,645,646,649],{"id":474,"type":475,"label":639,"file":144,"line":640},"$_REQUEST['save_payloads']",279,{"id":478,"type":479,"label":577,"file":144,"line":640,"wp_function":578},{"id":519,"type":475,"label":643,"file":144,"line":644},"$_REQUEST['save_payloads_matching_uri_regex']",280,{"id":521,"type":479,"label":577,"file":144,"line":644,"wp_function":578},{"id":525,"type":475,"label":647,"file":144,"line":648},"$_REQUEST['save_payloads_matching_payload_regex']",281,{"id":527,"type":479,"label":577,"file":144,"line":648,"wp_function":578},[651,652,653],{"from":474,"to":478,"sanitized":192},{"from":519,"to":521,"sanitized":192},{"from":525,"to":527,"sanitized":192},{"entryPoint":655,"graph":656,"unsanitizedCount":11,"severity":538},"\u003Cwhats-going-on-backend-controller> (whats-going-on-backend-controller.php:0)",{"nodes":657,"edges":712},[658,659,660,661,662,663,664,665,666,668,670,672,674,676,678,680,682,684,686,688,690,693,696,698,700,702,704,706,708,710],{"id":474,"type":475,"label":574,"file":144,"line":575},{"id":478,"type":479,"label":577,"file":144,"line":575,"wp_function":578},{"id":519,"type":475,"label":580,"file":144,"line":581},{"id":521,"type":479,"label":577,"file":144,"line":581,"wp_function":578},{"id":525,"type":475,"label":584,"file":144,"line":585},{"id":527,"type":479,"label":577,"file":144,"line":585,"wp_function":578},{"id":529,"type":475,"label":588,"file":144,"line":589},{"id":532,"type":479,"label":577,"file":144,"line":589,"wp_function":578},{"id":667,"type":475,"label":602,"file":144,"line":257},"n8",{"id":669,"type":479,"label":577,"file":144,"line":257,"wp_function":578},"n9",{"id":671,"type":475,"label":605,"file":144,"line":606},"n10",{"id":673,"type":479,"label":577,"file":144,"line":606,"wp_function":578},"n11",{"id":675,"type":475,"label":616,"file":144,"line":617},"n12",{"id":677,"type":479,"label":577,"file":144,"line":617,"wp_function":578},"n13",{"id":679,"type":475,"label":620,"file":144,"line":422},"n14",{"id":681,"type":479,"label":577,"file":144,"line":422,"wp_function":578},"n15",{"id":683,"type":475,"label":623,"file":144,"line":624},"n16",{"id":685,"type":479,"label":577,"file":144,"line":624,"wp_function":578},"n17",{"id":687,"type":475,"label":627,"file":144,"line":459},"n18",{"id":689,"type":479,"label":577,"file":144,"line":459,"wp_function":578},"n19",{"id":691,"type":475,"label":692,"file":144,"line":463},"n20","$_REQUEST (x2)",{"id":694,"type":479,"label":522,"file":144,"line":695,"wp_function":523},"n21",227,{"id":697,"type":475,"label":639,"file":144,"line":640},"n22",{"id":699,"type":479,"label":577,"file":144,"line":640,"wp_function":578},"n23",{"id":701,"type":475,"label":643,"file":144,"line":644},"n24",{"id":703,"type":479,"label":577,"file":144,"line":644,"wp_function":578},"n25",{"id":705,"type":475,"label":647,"file":144,"line":648},"n26",{"id":707,"type":479,"label":577,"file":144,"line":648,"wp_function":578},"n27",{"id":709,"type":475,"label":692,"file":144,"line":501},"n28",{"id":711,"type":479,"label":503,"file":144,"line":504,"wp_function":505},"n29",[713,714,715,716,717,718,719,720,721,722,723,724,725,726,727],{"from":474,"to":478,"sanitized":193},{"from":519,"to":521,"sanitized":193},{"from":525,"to":527,"sanitized":193},{"from":529,"to":532,"sanitized":193},{"from":667,"to":669,"sanitized":193},{"from":671,"to":673,"sanitized":193},{"from":675,"to":677,"sanitized":193},{"from":679,"to":681,"sanitized":193},{"from":683,"to":685,"sanitized":193},{"from":687,"to":689,"sanitized":193},{"from":691,"to":694,"sanitized":193},{"from":697,"to":699,"sanitized":193},{"from":701,"to":703,"sanitized":193},{"from":705,"to":707,"sanitized":193},{"from":709,"to":711,"sanitized":193},{"entryPoint":729,"graph":730,"unsanitizedCount":28,"severity":736},"_remove_this_ip_data (whats-going-on-backend-controller.php:221)",{"nodes":731,"edges":734},[732,733],{"id":474,"type":475,"label":692,"file":144,"line":463},{"id":478,"type":479,"label":522,"file":144,"line":695,"wp_function":523},[735],{"from":474,"to":478,"sanitized":192},"high",{"entryPoint":738,"graph":739,"unsanitizedCount":75,"severity":736},"save_404s (whats-going-on.php:158)",{"nodes":740,"edges":744},[741,742],{"id":474,"type":475,"label":490,"file":183,"line":354},{"id":478,"type":479,"label":522,"file":183,"line":743,"wp_function":523},177,[745],{"from":474,"to":478,"sanitized":192},{"entryPoint":747,"graph":748,"unsanitizedCount":75,"severity":736},"\u003Cwhats-going-on> (whats-going-on.php:0)",{"nodes":749,"edges":752},[750,751],{"id":474,"type":475,"label":490,"file":183,"line":354},{"id":478,"type":479,"label":522,"file":183,"line":743,"wp_function":523},[753],{"from":474,"to":478,"sanitized":192},{"summary":755,"deductions":756},"The \"whats-going-on\" plugin version 1.3 exhibits a mixed security posture.  While it has a clean vulnerability history with no recorded CVEs, indicating a potentially mature and well-maintained codebase, the static analysis reveals several areas for concern.  A significant portion of its attack surface, specifically one out of seven AJAX handlers, lacks proper authentication checks, presenting a direct pathway for unauthorized access and potential manipulation.\n\nFurthermore, the taint analysis highlights 3 high-severity flows with unsanitized paths, suggesting a risk of injection vulnerabilities if user-controlled data is not handled meticulously.  The relatively low percentage of properly escaped output (31%) is another red flag, increasing the likelihood of cross-site scripting (XSS) vulnerabilities.  Despite the majority of SQL queries utilizing prepared statements, the presence of file operations and an unprotected AJAX endpoint are potential vectors for exploitation.\n\nIn conclusion, while the plugin's lack of known vulnerabilities is a positive indicator, the identified weaknesses in its attack surface, taint analysis, and output escaping warrant careful attention.  These issues, particularly the unprotected AJAX handler and high-severity taint flows, represent concrete risks that could be exploited by malicious actors.  It is crucial to address these specific findings to improve the overall security of the plugin.",[757,760,763],{"reason":758,"points":759},"AJAX handler without authentication check",10,{"reason":761,"points":762},"High severity taint flows with unsanitized paths",12,{"reason":764,"points":765},"Low percentage of properly escaped output",8,"2026-03-17T05:43:34.086Z",{"wat":768,"direct":785},{"assetPaths":769,"generatorPatterns":776,"scriptPaths":777,"versionParams":778},[770,771,772,773,774,775],"\u002Fwp-content\u002Fplugins\u002Fwhats-going-on\u002Flib\u002Fdatatables.min.css","\u002Fwp-content\u002Fplugins\u002Fwhats-going-on\u002Flib\u002FsvgMap.min.css","\u002Fwp-content\u002Fplugins\u002Fwhats-going-on\u002Flib\u002Fwgo.min.css","\u002Fwp-content\u002Fplugins\u002Fwhats-going-on\u002Flib\u002Fpdfmake.min.js","\u002Fwp-content\u002Fplugins\u002Fwhats-going-on\u002Flib\u002Fvfs_fonts.js","\u002Fwp-content\u002Fplugins\u002Fwhats-going-on\u002Flib\u002Fdatatables.min.js",[],[773,774,775],[779,780,781,782,783,784],"whats-going-on\u002Flib\u002Fdatatables.min.css?ver=","whats-going-on\u002Flib\u002FsvgMap.min.css?ver=","whats-going-on\u002Flib\u002Fwgo.min.css?ver=","whats-going-on\u002Flib\u002Fpdfmake.min.js?ver=","whats-going-on\u002Flib\u002Fvfs_fonts.js?ver=","whats-going-on\u002Flib\u002Fdatatables.min.js?ver=",{"cssClasses":786,"htmlComments":788,"htmlAttributes":789,"restEndpoints":791,"jsGlobals":792,"shortcodeOutput":794},[787],"wgo-container",[],[790],"data-wgo-page",[],[793],"wgo_autoreload_datatables",[],{"slug":4,"current_version":6,"total_versions":127,"versions":796},[797,802,809],{"version":6,"download_url":22,"svn_tag_url":798,"released_at":24,"has_diff":192,"diff_files_changed":799,"diff_lines":24,"trac_diff_url":800,"vulnerabilities":801,"is_current":193},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwhats-going-on\u002Ftags\u002F1.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwhats-going-on%2Ftags%2F1.2&new_path=%2Fwhats-going-on%2Ftags%2F1.3",[],{"version":803,"download_url":804,"svn_tag_url":805,"released_at":24,"has_diff":192,"diff_files_changed":806,"diff_lines":24,"trac_diff_url":807,"vulnerabilities":808,"is_current":192},"1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwhats-going-on.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwhats-going-on\u002Ftags\u002F1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwhats-going-on%2Ftags%2F1.1&new_path=%2Fwhats-going-on%2Ftags%2F1.2",[],{"version":810,"download_url":811,"svn_tag_url":812,"released_at":24,"has_diff":192,"diff_files_changed":813,"diff_lines":24,"trac_diff_url":24,"vulnerabilities":814,"is_current":192},"1.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwhats-going-on.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwhats-going-on\u002Ftags\u002F1.1\u002F",[],[]]