[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f-9YYDC94g_iairRM1YAMmBid8YM1n2xpd5TUENJFu_U":3,"$fzs2-weTKMleQjdHT5oWkrs5e3ficfoskWzdKuBlnGjQ":398,"$fNf3fR85RwsMD5ErrsCYEJrsooxNVAPuFpQh2DjVFqrI":403},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":29,"last_vuln_date":30,"fetched_at":31,"discovery_status":32,"vulnerabilities":33,"developer":106,"crawl_stats":39,"alternatives":114,"analysis":205,"fingerprints":373},"wp-404-auto-redirect-to-similar-post","WP 404 Auto Redirect to Similar Post","1.0.6","Konrad Chmielewski","https:\u002F\u002Fprofiles.wordpress.org\u002Fhwk-fr\u002F","\u003Cp>Welcome to WP 404 Auto Redirect to Similar Post!\u003C\u002Fp>\n\u003Cp>This plugin automatically redirect 404 pages to similar posts based on Title, Post Types & Taxonomies. If nothing similar is found, visitors will be redirected to the homepage or a custom URL.\u003C\u002Fp>\n\u003Ch4>Features:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Automatically detect any 404.\u003C\u002Fli>\n\u003Cli>Automatically search a similar post based on multiple factors:\n\u003Cul>\n\u003Cli>Title\u003C\u002Fli>\n\u003Cli>Potential Post Type\u003C\u002Fli>\n\u003Cli>Potential Taxonomy\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>If nothing similar is found, set your Fallback Behavior:\n\u003Cul>\n\u003Cli>Redirect to homepage\u003C\u002Fli>\n\u003Cli>Redirect to a custom URL\u003C\u002Fli>\n\u003Cli>Display the default 404 page\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Choose the redirection HTTP header status:\n\u003Cul>\n\u003Cli>301 headers\u003C\u002Fli>\n\u003Cli>302 headers\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Exclude Post Types from possible redirections.\u003C\u002Fli>\n\u003Cli>Exclude Taxonomies from possible redirections.\u003C\u002Fli>\n\u003Cli>Exclude Posts based on a custom post meta.\u003C\u002Fli>\n\u003Cli>Exclude Terms based on a custom term meta.\u003C\u002Fli>\n\u003Cli>Display the Debug Console instead of being redirected (Admin).\u003C\u002Fli>\n\u003Cli>Preview possible redirection from the administration panel.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>*New* Features:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Expose ‘WP-404-Auto-Redirect’ headers on 404 pages. (Admin).\u003C\u002Fli>\n\u003Cli>Log redirections in the \u002Fwp-content\u002Fdebug.log file.\u003C\u002Fli>\n\u003Cli>Create your own search engines logic.\u003C\u002Fli>\n\u003Cli>Create your own search engines groups & fire sequence.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>*New* Engines & Groups:\u003C\u002Fh4>\n\u003Cp>WP 404 Auto Redirect to Similar Post 1.0 introduces the concept of engines and groups which let you customize your own searching & matching logic. The plugin comes with 5 engines and 1 default group out of the box!\u003C\u002Fp>\n\u003Cp>Default Group Engines:\u003C\u002Fp>\n\u003Col>\n\u003Cli>\n\u003Cp>Fix URL\u003Cbr \u002F>\nFind and fix common URL mistakes.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Direct Match\u003Cbr \u002F>\nSearch for a Post that perfectly match keywords.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Search Post\u003Cbr \u002F>\nSearch for a similar Post.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Search Term\u003Cbr \u002F>\nSearch for a similar Term.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Search Post: Fallback\u003Cbr \u002F>\nIf a Post Type is set in the WP Query, redirect to the Post Type Archive.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>But Also:\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Easy to Install \u002F Uninstall.\u003C\u002Fli>\n\u003Cli>No useless data saved in Database.\u003C\u002Fli>\n\u003Cli>Blazing Fast Performance.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Compatibility:\u003C\u002Fh4>\n\u003Cp>WP 404 Auto Redirect to Similar Post is 100% compatible with all popular manual redirection plugins:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fredirection\u002F\" rel=\"ugc\">Redirection\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fsimple-301-redirects\u002F\" rel=\"ugc\">Simple 301 Redirects\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fseo-by-rank-math\u002F\" rel=\"ugc\">RankMath Redirections\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fyoast.com\u002Fwordpress\u002Fplugins\u002Fseo\u002Fredirects-manager\u002F\" rel=\"nofollow ugc\">Yoast Redirections\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>etc…\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>If you use one of them, but missed a manual redirection and a 404 is about to be displayed, WP 404 Auto Redirect to Similar Post will cover you.\u003C\u002Fp>\n\u003Ch3>Reviews\u003C\u002Fh3>\n\u003Cp>They talk about us! 🙂\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fsebastienpierrepack.com\u002Fplugins-corriger-404-wordpress\u002F\" rel=\"nofollow ugc\">Quels plugins utiliser pour corriger les erreurs 404 sous WordPress ?\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.formget.com\u002F404-redirect-wordpress-plugins\u002F\" rel=\"nofollow ugc\">6+ 404 Redirect WordPress Plugins 2018 (Free and Paid)\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fuproer.com\u002Farticles\u002Fbest-seo-plugins-wordpress\u002F\" rel=\"nofollow ugc\">12 Best Free SEO Plugins for WordPress\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpstuff.org\u002Fplugins\u002Frecommended-plugins-for-wordpress\u002F\" rel=\"nofollow ugc\">Recommended Plugins for WordPress\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"http:\u002F\u002Fblogingenuity.com\u002Ftop-wordpress-plugins-i-cant-do-without\u002F\" rel=\"nofollow ugc\">Top WordPress Plugins I Can’t Do Without\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"http:\u002F\u002Fbhaaratham.com\u002Fpermalink-finder-plugin-sanitize_url-is-deprecated\u002F\" rel=\"nofollow ugc\">Permalink Finder Plugin is deprecated\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.seosatu.com\u002Foptimalkan-seo-dengan-halaman-404\u002F\" rel=\"nofollow ugc\">Membuat halaman Error 404 menjadi SEO friendly\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.littlemissgemtravels.com\u002Fultimate-guide-to-starting-a-travel-blog\u002F\" rel=\"nofollow ugc\">The Ultimate Guide to Starting a Travel Blog\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fsayoho.com\u002F80-best-wordpress-plugins-for-2018\u002F\" rel=\"nofollow ugc\">80  Best WordPress Plugins for 2018\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","Automatically Redirect any 404 page to a Similar Post based on the Title Post Type & Taxonomy using 301 or 302 Redirects!",30000,397445,98,113,"2025-11-21T04:51:00.000Z","6.8.5","4.0","5.6",[20,21,22,23,24],"301","404","redirect","seo","similar","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.1.0.6.zip",95,4,0,"2026-02-17 16:29:12","2026-04-16T10:56:18.058Z","no_bundle",[34,65,80,93],{"id":35,"url_slug":36,"title":37,"description":38,"plugin_slug":4,"theme_slug":39,"affected_versions":40,"patched_in_version":6,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":30,"updated_date":45,"references":46,"days_to_patch":48,"patch_diff_files":49,"patch_trac_url":39,"research_status":54,"research_verified":55,"research_rounds_completed":56,"research_plan":57,"research_summary":58,"research_vulnerable_code":59,"research_fix_diff":60,"research_exploit_outline":61,"research_model_used":62,"research_started_at":63,"research_completed_at":64,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":55,"poc_model_used":39,"poc_verification_depth":39},"CVE-2025-12037","wp-404-auto-redirect-authenticated-admin-stored-cross-site-scripting","WP 404 Auto Redirect \u003C= 1.0.5 - Authenticated (Admin+) Stored Cross-Site Scripting","The WP 404 Auto Redirect to Similar Post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",null,"\u003C=1.0.5","medium",4.4,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:H\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2026-02-18 04:35:45",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc20059de-9d81-4318-a015-8e402945828c?source=api-prod",1,[50,51,52,53],"class\u002Fclass-settings.php","includes\u002Fadmin.php","readme.txt","wp-404-auto-redirect-similar-post.php","researched",false,3,"# Exploitation Research Plan - CVE-2025-12037\n\n## 1. Vulnerability Summary\nThe **WP 404 Auto Redirect to Similar Post** plugin (\u003C= 1.0.5) is vulnerable to **Stored Cross-Site Scripting (XSS)** via its administrative settings. The vulnerability exists because the plugin registers a settings group but fails to adequately sanitize the input in its `sanitize_callback` and fails to escape the stored values when rendering them on the admin settings page. Specifically, the `sanitize_setting` function in `includes\u002Fadmin.php` only validates the `fallback['url']` field, leaving all other settings fields (such as exclusion rules) vulnerable to injection. This allows an authenticated administrator to inject arbitrary scripts that execute when any administrator views the plugin's settings page, especially in environments where `unfiltered_html` is disabled (like WordPress Multi-site).\n\n## 2. Attack Vector Analysis\n- **Endpoint**: `\u002Fwp-admin\u002Foptions.php` (The standard WordPress Settings API handler).\n- **Vulnerable Parameter**: `wp404arsp_settings[rules][exclude][post_meta]` (or other keys within the `wp404arsp_settings` array).\n- **Authentication Level**: Administrator (High privilege).\n- **Precondition**: The site must have `unfiltered_html` disabled (standard on Multi-site or via `DISALLOW_UNFILTERED_HTML` in `wp-config.php`) for this to be considered a vulnerability rather than a feature.\n- **Payload**: `\">\u003Cscript>alert(window.origin)\u003C\u002Fscript>`\n\n## 3. Code Flow\n1. **Registration**: In `includes\u002Fadmin.php`, the function `admin_settings()` (hooked to `admin_init`) calls `register_setting('wp404arsp_settings', 'wp404arsp_settings', ...)` with `sanitize_callback` set to `sanitize_setting`.\n2. **Weak Sanitization**: The `sanitize_setting($settings)` function in `includes\u002Fadmin.php` only performs:\n   ```php\n   $settings['fallback']['url'] = sanitize_url($settings['fallback']['url']);\n   return $settings;\n   ```\n   All other nested keys in the `$settings` array (like `rules`, `exclude`, `post_meta`) are returned to the database without any filtering.\n3. **Retrieval**: When an admin visits the settings page, `admin_page()` calls `wp404arsp_settings_get()` (defined in `class\u002Fclass-settings.php`).\n4. **Unescaped Output**: The `WP_404_Auto_Redirect_Settings::get()` function retrieves the option and only escapes the fallback URL using `esc_url`. Other fields remain raw.\n5. **Sink**: While the truncation in `admin.php` obscures the exact HTML for the `post_meta` field, it follows the pattern of the `debug` checkbox. The values are echoed into HTML attributes of inputs (likely text inputs for \"Exclude Meta\") without using `esc_attr()`.\n\n## 4. Nonce Acquisition Strategy\nThe vulnerability is in the WordPress Settings API. To exploit it, a valid `_wpnonce` for the `wp404arsp_settings-options` action is required.\n\n1. **Navigate**: Use `browser_navigate` to reach the plugin settings page: `\u002Fwp-admin\u002Foptions-general.php?page=wp-404-auto-redirect`.\n2. **Extract**: Since the page uses `settings_fields('wp404arsp_settings')`, a hidden field named `_wpnonce` is generated within the settings form.\n3. **Command**:\n   ```javascript\n   browser_eval(\"document.querySelector('input[name=\\\"_wpnonce\\\"]').value\")\n   ```\n   This retrieves the nonce directly from the DOM in the correct session context.\n\n## 5. Exploitation Strategy\n### Step 1: Authentication and Setup\n- Log in to the WordPress instance as an administrator.\n- (Optional but recommended for PoC) Ensure `define('DISALLOW_UNFILTERED_HTML', true);` is set in `wp-config.php`.\n\n### Step 2: Nonce Retrieval\n- Navigate to the settings page: `\u002Fwp-admin\u002Foptions-general.php?page=wp-404-auto-redirect`.\n- Use `browser_eval` to extract the `_wpnonce` value.\n\n### Step 3: Injection Request\n- Send a POST request to `\u002Fwp-admin\u002Foptions.php` using the `http_request` tool.\n- **Headers**: `Content-Type: application\u002Fx-www-form-urlencoded`\n- **Body**:\n  ```text\n  option_page=wp404arsp_settings\n  &action=update\n  &_wpnonce=[EXTRACTED_NONCE]\n  &wp404arsp_settings[rules][exclude][post_meta]=%22%3E%3Cscript%3Ealert%28window.origin%29%3C%2Fscript%3E\n  &wp404arsp_settings[priority]=999\n  &wp404arsp_settings[method]=301\n  ```\n  *(Note: Include other default settings to ensure the array structure remains valid).*\n\n### Step 4: Trigger XSS\n- Navigate back to `\u002Fwp-admin\u002Foptions-general.php?page=wp-404-auto-redirect`.\n- Observe the script execution (the `alert` will trigger).\n\n## 6. Test Data Setup\n1. **Plugin Installation**: Install and activate `wp-404-auto-redirect-to-similar-post` version 1.0.5.\n2. **User**: Create or use an existing Administrator account.\n3. **Environment**: If testing on a standard single-site install, add `define( 'DISALLOW_UNFILTERED_HTML', true );` to `wp-config.php` to simulate the restricted environment where the vulnerability is most relevant.\n\n## 7. Expected Results\n- The POST request to `options.php` should return a `302 Found` redirect back to the settings page with a `settings-updated=true` parameter.\n- The `wp404arsp_settings` option in the `wp_options` table will now contain the raw HTML payload in the `[rules][exclude][post_meta]` key.\n- Upon loading the settings page, the browser will execute the injected `\u003Cscript>` because the value is echoed inside an input attribute like `value=\"...\"` without `esc_attr()`, allowing the payload to break out of the attribute.\n\n## 8. Verification Steps\n- **WP-CLI Verification**:\n  ```bash\n  wp option get wp404arsp_settings --format=json\n  ```\n  Verify that the `rules -> exclude -> post_meta` value contains the raw `\u003Cscript>` tag.\n- **DOM Verification**: Inspect the HTML source of the settings page and look for the injected string:\n  ```html\n  \u003Cinput ... value=\"\">\u003Cscript>alert(window.origin)\u003C\u002Fscript>\" ...>\n  ```\n\n## 9. Alternative Approaches\n- **Payload Variance**: If `post_meta` is not easily accessible in the UI, try injecting into `wp404arsp_settings[rules][exclude][term_meta]` or `wp404arsp_settings[priority]`. Even if `priority` is cast to an integer during its use in `template_redirect`, it may be rendered as a string in the admin form.\n- **Tab Selection**: The plugin uses a tabbed interface. The payload might be hidden in the \"Post Types\" or \"Taxonomies\" tab. Use `browser_eval(\"jQuery('a[href=\\\"#settings\\\"]').click()\")` or similar to ensure the correct tab is visible if the browser doesn't execute the script immediately.","The WP 404 Auto Redirect to Similar Post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its administrative settings in versions up to 1.0.5. This occurs because the plugin fails to sanitize all keys in the settings array upon saving and fails to escape them when rendering the settings page, allowing administrators to inject malicious scripts.","\u002F* File: includes\u002Fadmin.php (~line 64) *\u002F\n    function sanitize_setting($settings){\n        \n        $settings['fallback']['url'] = sanitize_url($settings['fallback']['url']);\n        \n        return $settings;\n        \n    }\n\n---\n\n\u002F* File: class\u002Fclass-settings.php (~line 79) *\u002F\n        \u002F\u002F Esc Fallback\n        $settings['fallback']['url'] = esc_url($settings['fallback']['url']);\n        \n        \u002F\u002F Headers\n        if(((int)$settings['method'] != 301) && ((int)$settings['method'] != 302)){\n            $settings['method'] = 301;\n        }\n        \n        \u002F\u002F Return\n        return $settings;","diff -ru \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwp-404-auto-redirect-to-similar-post\u002F1.0.5\u002Fclass\u002Fclass-settings.php \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwp-404-auto-redirect-to-similar-post\u002F1.0.6\u002Fclass\u002Fclass-settings.php\n--- \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwp-404-auto-redirect-to-similar-post\u002F1.0.5\u002Fclass\u002Fclass-settings.php\t2024-02-04 12:33:34.000000000 +0000\n+++ \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwp-404-auto-redirect-to-similar-post\u002F1.0.6\u002Fclass\u002Fclass-settings.php\t2025-11-21 04:49:58.000000000 +0000\n@@ -79,6 +79,9 @@\n         \u002F\u002F Esc Fallback\n         $settings['fallback']['url'] = esc_url($settings['fallback']['url']);\n         \n+        \u002F\u002F Esc Priority\n+        $settings['priority'] = (int) $settings['priority'];\n+        \n         \u002F\u002F Headers\n         if(((int)$settings['method'] != 301) && ((int)$settings['method'] != 302)){\n             $settings['method'] = 301;\ndiff -ru \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwp-404-auto-redirect-to-similar-post\u002F1.0.5\u002Fincludes\u002Fadmin.php \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwp-404-auto-redirect-to-similar-post\u002F1.0.6\u002Fincludes\u002Fadmin.php\n--- \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwp-404-auto-redirect-to-similar-post\u002F1.0.5\u002Fincludes\u002Fadmin.php\t2024-02-04 12:33:34.000000000 +0000\n+++ \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwp-404-auto-redirect-to-similar-post\u002F1.0.6\u002Fincludes\u002Fadmin.php\t2025-11-21 04:49:58.000000000 +0000\n@@ -64,6 +64,7 @@\n     function sanitize_setting($settings){\n         \n         $settings['fallback']['url'] = sanitize_url($settings['fallback']['url']);\n+        $settings['priority'] = (int) $settings['priority'];\n         \n         return $settings;","The exploit targets the WordPress Settings API by submitting a malicious payload into the plugin's configuration. An authenticated administrator first retrieves a valid CSRF nonce from the plugin's settings page at \u002Fwp-admin\u002Foptions-general.php?page=wp-404-auto-redirect. They then send a POST request to \u002Fwp-admin\u002Foptions.php including the nonce and the payload inside the wp404arsp_settings[rules][exclude][post_meta] or wp404arsp_settings[priority] parameters. The payload, such as a script tag designed to break out of an HTML attribute, is stored in the database. The XSS triggers whenever an administrator subsequently visits the plugin settings page, as the stored value is rendered without proper attribute escaping.","gemini-3-flash-preview","2026-04-19 06:44:16","2026-04-19 06:45:00",{"id":66,"url_slug":67,"title":68,"description":69,"plugin_slug":4,"theme_slug":39,"affected_versions":70,"patched_in_version":71,"severity":41,"cvss_score":72,"cvss_vector":73,"vuln_type":44,"published_date":74,"updated_date":75,"references":76,"days_to_patch":78,"patch_diff_files":79,"patch_trac_url":39,"research_status":39,"research_verified":55,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":55,"poc_model_used":39,"poc_verification_depth":39},"CVE-2024-32559","wp-404-auto-redirect-to-similar-post-reflected-cross-site-scripting-via-debug-mode-uri","WP 404 Auto Redirect to Similar Post \u003C= 1.0.4 - Reflected Cross-Site Scripting via Debug Mode URI","The WP 404 Auto Redirect to Similar Post plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URI in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Successful exploitation requires \"Debug Mode\" to be enabled in the plugin's settings.","\u003C=1.0.4","1.0.5",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","2024-04-16 00:00:00","2024-07-29 21:36:04",[77],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F297b9605-602f-458f-8b36-a184cdbd20df?source=api-prod",105,[],{"id":81,"url_slug":82,"title":83,"description":84,"plugin_slug":4,"theme_slug":39,"affected_versions":85,"patched_in_version":86,"severity":41,"cvss_score":72,"cvss_vector":73,"vuln_type":44,"published_date":87,"updated_date":88,"references":89,"days_to_patch":91,"patch_diff_files":92,"patch_trac_url":39,"research_status":39,"research_verified":55,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":55,"poc_model_used":39,"poc_verification_depth":39},"CVE-2024-0509","wp-404-auto-redirect-to-similar-post-reflected-cross-site-scripting-via-request","WP 404 Auto Redirect to Similar Post \u003C= 1.0.3 - Reflected Cross-Site Scripting via request","The WP 404 Auto Redirect to Similar Post plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘request’ parameter in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.","\u003C=1.0.3","1.0.4","2024-02-05 00:00:00","2024-07-29 21:36:33",[90],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F6eef5549-3f89-4d6f-8c4e-6e4ee6082042?source=api-prod",176,[],{"id":94,"url_slug":95,"title":96,"description":97,"plugin_slug":4,"theme_slug":39,"affected_versions":85,"patched_in_version":86,"severity":41,"cvss_score":98,"cvss_vector":99,"vuln_type":44,"published_date":100,"updated_date":101,"references":102,"days_to_patch":104,"patch_diff_files":105,"patch_trac_url":39,"research_status":39,"research_verified":55,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":55,"poc_model_used":39,"poc_verification_depth":39},"CVE-2023-40206","wp-404-auto-redirect-to-similar-post-authenticated-administrator-stored-cross-site-scripting","WP 404 Auto Redirect to Similar Post \u003C= 1.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting","The WP 404 Auto Redirect to Similar Post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only impacts multi-site installations and installations where unfiltered_html has been disabled.",5.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","2023-08-11 00:00:00","2026-03-27 11:06:58",[103],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F33166510-41b2-4e9a-8bd7-501235729346?source=api-prod",959,[],{"slug":107,"display_name":7,"profile_url":8,"plugin_count":108,"total_installs":109,"avg_security_score":110,"avg_patch_time_days":111,"trust_score":112,"computed_at":113},"hwk-fr",5,130090,87,236,70,"2026-05-19T17:28:57.754Z",[115,137,155,171,187],{"slug":116,"name":117,"version":118,"author":119,"author_profile":120,"description":121,"short_description":122,"active_installs":123,"downloaded":124,"rating":125,"num_ratings":126,"last_updated":127,"tested_up_to":128,"requires_at_least":129,"requires_php":25,"tags":130,"homepage":132,"download_link":133,"security_score":134,"vuln_count":135,"unpatched_count":29,"last_vuln_date":136,"fetched_at":31},"seo-redirection","SEO Redirection Plugin – 301 Redirect Manager","9.17","wp-buy","https:\u002F\u002Fprofiles.wordpress.org\u002Fwp-buy\u002F","\u003Cp>SEO Redirection is a powerful redirect manager to manage 301 redirects, you can build and manage redirects easily for your site,\u003Cbr \u002F>\nThis plugin is useful if you want to migrating pages from an old website, or are changing the directory of your WordPress website.\u003C\u002Fp>\n\u003Cp>Effortlessly optimize your site’s redirections.\u003Cbr \u002F>\nBoost SEO with seamless redirect management.\u003Cbr \u002F>\nSimplify 301 redirects for enhanced SEO.\u003Cbr \u002F>\nStreamline website migration with precision redirects.\u003Cbr \u002F>\nMaximize WordPress SEO with effortless redirections.\u003Cbr \u002F>\nEasily manage directory changes for WordPress.\u003Cbr \u002F>\nEnhance SEO by controlling redirections effectively.\u003Cbr \u002F>\nUnlock the power of effortless redirects.\u003Cbr \u002F>\nAchieve flawless SEO redirects with ease.\u003Cbr \u002F>\nTake control of your site’s redirects.\u003C\u002Fp>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.wp-buy.com\u002Fproduct\u002Fseo-redirection-premium-wordpress-plugin\u002F?src=wp1\" rel=\"nofollow ugc\">\u003Cstrong>PRO Version Features\u003C\u002Fstrong>\u003C\u002Fa>\u003C\u002Fli>\n\u003Cp>New features include:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Manually add 301, 302, and 307 redirections for a WordPress post\u003C\u002Fli>\n\u003Cli>Supports wild card redirection.\u003C\u002Fli>\n\u003Cli>Fix Crawl Errors (404 & soft 404) in Google Search Console(New)\u003C\u002Fli>\n\u003Cli>WPML Support (WordPress Multi-language integration) (New)\u003C\u002Fli>\n\u003Cli>Import\u002FExport feature (New)\u003C\u002Fli>\n\u003Cli>Adding the last access time & total hits to the redirects list (New)\u003C\u002Fli>\n\u003Cli>Automatically add a 301 redirection when a post’s URL changes\u003C\u002Fli>\n\u003Cli>Redirect posts and pages that published, draft or deleted from it\\’s edit page directly.\u003C\u002Fli>\n\u003Cli>Advanced control panel to control all functions of the plugin.\u003C\u002Fli>\n\u003Cli>You can redirect folders and all it’s content.\u003C\u002Fli>\n\u003Cli>Full logs for all redirected URLs\u003C\u002Fli>\n\u003Cli>You can use regular expressions in redirections.\u003C\u002Fli>\n\u003Cli>Reflect changes to all links when you move your site or change the domain name.\u003C\u002Fli>\n\u003Cli>All URLs can be redirected, not just ones that  don’t exist\u003C\u002Fli>\n\u003Cli>Redirection methods – redirect based upon login status, redirect to random pages, redirect based upon the referrer!\u003C\u002Fli>\n\u003Cli>Friendly GUI and easy to use.\u003C\u002Fli>\n\u003Cli>Apache .htaccess is not required, works entirely inside WordPress\u003C\u002Fli>\n\u003Cli>Redirect index.php, index.html, and index.htm access\u003C\u002Fli>\n\u003Cli>Redirection statistics telling you how many times a redirection has occurred, when it last happened, who tried to do it, and where they found your URL\u003C\u002Fli>\n\u003Cli>(GDPR compliance) You can customise the level of IP information that is collected by our plugin\u003C\u002Fli>\n\u003Cli>You can also import from the “Redirection” Plugin (NEW)\u003C\u002Fli>\n\u003C\u002Ful>\n","SEO Redirection is a powerful redirect manager to manage 301 redirects without requiring knowledge of Apache .htaccess files.",10000,1154171,86,74,"2026-04-14T14:45:00.000Z","6.9.4","4.1",[20,21,131,22,116],"post-redirect","https:\u002F\u002Fwww.wp-buy.com\u002Fproduct\u002Fseo-redirection-premium-wordpress-plugin\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fseo-redirection.9.17.zip",96,9,"2022-10-25 13:45:00",{"slug":138,"name":139,"version":86,"author":140,"author_profile":141,"description":142,"short_description":143,"active_installs":144,"downloaded":145,"rating":146,"num_ratings":56,"last_updated":147,"tested_up_to":148,"requires_at_least":149,"requires_php":25,"tags":150,"homepage":152,"download_link":153,"security_score":154,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"404-redirector","404 ReDirector","markenzeichen","https:\u002F\u002Fprofiles.wordpress.org\u002Fbrainfruit\u002F","\u003Cp>This simple plugin – which is also WordPress network compatible – automatically redirects 404 errors to the best matching and existing content in your WordPress blog.\u003Cbr \u002F>\nThe matching is based on the slug of the content not found and searches also on taxonomy pages (tags & categories). This is perfect when you have changed the permalink settings of your taxonomies.\u003Cbr \u002F>\nAll redirects are permanent (301) which is a SEO best practice.\u003Cbr \u002F>\nSince this plugin doesn&rsquo;t need any configuration it works perfect in WordPress Network \u002F multisite setup.\u003C\u002Fp>\n","Simple, SEO friendly, permanent (301) and automatic redirect of 404 errors.",80,5398,100,"2024-10-29T13:54:00.000Z","6.6.5","3.9",[20,21,151,22,23],"permanent","https:\u002F\u002Fmarkenzeichen.de\u002Fdigitalagentur-digital-marketing-experience","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002F404-redirector.1.0.4.zip",92,{"slug":156,"name":157,"version":158,"author":159,"author_profile":160,"description":161,"short_description":162,"active_installs":144,"downloaded":163,"rating":29,"num_ratings":29,"last_updated":164,"tested_up_to":16,"requires_at_least":165,"requires_php":166,"tags":167,"homepage":169,"download_link":170,"security_score":146,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"ceewp-redirect-404-to-home","CeeWP Redirect 404 to Home","1.0.1","CeeWP","https:\u002F\u002Fprofiles.wordpress.org\u002Fceewp\u002F","\u003Cp>CeeWP Redirect 404 to Homepage is a lightweight WordPress plugin that automatically redirects visitors from non-existent pages (404 errors) to your homepage. This helps improve user experience and can potentially help with SEO by properly handling 404 errors.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Automatically redirects 404 pages to homepage\u003C\u002Fli>\n\u003Cli>Uses 301 permanent redirect for better SEO\u003C\u002Fli>\n\u003Cli>Lightweight and fast\u003C\u002Fli>\n\u003Cli>No configuration needed\u003C\u002Fli>\n\u003Cli>Compatible with all WordPress themes\u003C\u002Fli>\n\u003Cli>Follows WordPress coding standards\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Why Use This Plugin?\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Improve User Experience\u003C\u002Fstrong>: Instead of showing a 404 error page, visitors are automatically redirected to your homepage\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SEO Friendly\u003C\u002Fstrong>: Uses 301 permanent redirects which is the recommended way to handle redirects\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Lightweight\u003C\u002Fstrong>: No database queries or heavy processing\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Zero Configuration\u003C\u002Fstrong>: Works out of the box\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Compatible\u003C\u002Fstrong>: Works with all WordPress themes and plugins\u003C\u002Fli>\n\u003C\u002Ful>\n","Automatically redirects 404 (not found) pages to your homepage with a 301 permanent redirect.",710,"2025-07-03T15:34:00.000Z","5.0","7.2",[20,21,168,22,23],"homepage","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fceewp-redirect-404-to-home\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fceewp-redirect-404-to-home.1.0.1.zip",{"slug":172,"name":173,"version":174,"author":175,"author_profile":176,"description":177,"short_description":178,"active_installs":112,"downloaded":179,"rating":29,"num_ratings":29,"last_updated":180,"tested_up_to":181,"requires_at_least":182,"requires_php":25,"tags":183,"homepage":184,"download_link":185,"security_score":186,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"seo404","SEO404","0.4","larsstorm","https:\u002F\u002Fprofiles.wordpress.org\u002Flarsstorm\u002F","\u003Cp>Got an old domain? 404 errors all over? using WordPress?\u003Cbr \u002F>\nTime to remove those 404 errors and recover your lost inbound links…\u003C\u002Fp>\n\u003Cp>Using SEO404, a very lightweight plugin for WordPress, you can easily change all those 404 errors to 301 redirects for your blog frontpage.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Since 0.3 define the 301 redirect destination url.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>We’ve used this technique to force redirects to the frontpage before. Though usually just included it in a wordpress theme. But why not have this as a plugin? So here is SEO404 WordPress plugin, ready for use.\u003C\u002Fp>\n","SEO404 redirects to the Blog front page with a 301. No more 404 errors on Google\u002FBing\u002Fetc.",3930,"2012-05-02T11:34:00.000Z","3.3.2","3.2",[20,21,22,23],"http:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fseo404\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fseo404.zip",85,{"slug":188,"name":189,"version":190,"author":191,"author_profile":192,"description":193,"short_description":194,"active_installs":195,"downloaded":196,"rating":146,"num_ratings":48,"last_updated":197,"tested_up_to":128,"requires_at_least":198,"requires_php":199,"tags":200,"homepage":203,"download_link":204,"security_score":146,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"advance-wp-redirect","Post Redirection – 301, 404 Redirects","1.0.2","Xfinitysoft","https:\u002F\u002Fprofiles.wordpress.org\u002Fxfinitysoft\u002F","\u003Cp>Post Redirection – 301, 404 Redirects is a powerful plugin which provides the functionality redirect pages, posts, custom post types and custom source URL to another location quickly (for internal or external URLs). Includes individual post\u002Fpage options, redirects for custom post types, non-existent 301 Redirects, New window functionality, and rel=nofollow functionality. All 404 error pages redirect to the homepage.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fadvanced-wp-redirect\u002F24178351\" title=\"Demo\" rel=\"nofollow ugc\">Try the Demo\u003C\u002Fa> | \u003Ca href=\"http:\u002F\u002Fdocs.xfinitysoft.com\u002Fplugins\u002Fadvanced-wp-redirect\u002F\" title=\"Documents\" rel=\"nofollow ugc\">Documents\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fuser\u002Fxfinitysoftdotcom\u002Fportfolio\" title=\"Pro Version\" rel=\"nofollow ugc\">Pro Version\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fxfinitysoft\" rel=\"nofollow ugc\">Facebook Page\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch3>FREE FEATURES\u003C\u002Fh3>\n\u003Cp>Master Override Options\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>Turn OFF All Redirects\u003C\u002Fstrong>: is turn off all redirections.\u003Cbr \u002F>\n► \u003Cstrong>All 404 Error Redirects\u003C\u002Fstrong>: To Homepage this option redirect all 404 error to the homepage.\u003Cbr \u002F>\n► \u003Cstrong>Make All Redirects Have (rel=’nofollow’)\u003C\u002Fstrong>: this option all source URL make nofollow.\u003Cbr \u002F>\n► \u003Cstrong>Make All Redirects Have New Window\u003C\u002Fstrong>: this option all redirect source URL open in new tab.\u003Cbr \u002F>\n► \u003Cstrong>Default Query Matching\u003C\u002Fstrong>: this option set default option in add new redirect.\u003C\u002Fp>\n\u003Cp>URL Nofollow and New tab\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>Make this url No Follow\u003C\u002Fstrong>:this option make source URL have a nofollow link.\u003Cbr \u002F>\n► \u003Cstrong>Open this URL in new Tab\u003C\u002Fstrong>:this option open URL in new tab.\u003C\u002Fp>\n\u003Cp>Redirect Match Options\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>Redirect to URL\u003C\u002Fstrong>: Redirect to URL with following http codes (301,302,303,304,307,308).301 code move permanently your source URL so 301 code use carefully.\u003Cbr \u002F>\n► \u003Cstrong>Edit and Delete Redirect\u003C\u002Fstrong>:If you want edit and delete the redirect. Click on Highlight edit and delete icons.\u003C\u002Fp>\n\u003Ch3>PRO VERSION\u003C\u002Fh3>\n\u003Cp>Basic Options\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>Basic options\u003C\u002Fstrong>:In basic options, you include redirecting Meta box in custom post type through switch button Custom Post Types. If you show redirect column in post list table you can switch ON of Show Redirect Column button. If you want to hidden redirect Meta box form page, post and custom posts type mark to check and click save changes.\u003C\u002Fp>\n\u003Cp>Master Override Options\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>Make All Redirects GOTO This URL\u003C\u002Fstrong>:this option set one target URL of redirections.\u003C\u002Fp>\n\u003Cp>Groups\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>Groups\u003C\u002Fstrong>:In this feature, you divide redirects into different groups. You can add, update and delete groups. You can view all the redirects of specific groups\u003C\u002Fp>\n\u003Cp>Query Parameters Matching\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>Exact Match\u003C\u002Fstrong>:matches the URL query parameters in any order.\u003Cbr \u002F>\n► \u003Cstrong>Ignore Query Parameters\u003C\u002Fstrong>: this option ignores query parameter in the URL.\u003Cbr \u002F>\n► \u003Cstrong>Ignore and Pass Query Parameter to target URL\u003C\u002Fstrong>:this option ignores the query parameter and attach to the target URL.\u003C\u002Fp>\n\u003Cp>URL Match Options:\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>URL Only\u003C\u002Fstrong>:If you select URL Only option target URL Input appear only.\u003Cbr \u002F>\n► \u003Cstrong>URL and Login status\u003C\u002Fstrong>:If you select URL and Login status option two input box appear. One for if user login then redirect to this URL and second input if user logout then redirect to this URL.\u003Cbr \u002F>\n► \u003Cstrong>URL and Role\u003C\u002Fstrong>:If you select URL and Role option three input box appear. One for select user role. Second input if user role match then redirect to this URL and Third input if user unmatched then redirect to this URL.\u003Cbr \u002F>\n► \u003Cstrong>URL and IP\u003C\u002Fstrong>:If you select URL and IP option three input box appear. One for input IP Address. Second input if IP match then redirect to this URL and third input if IP unmatched then redirect to this URL.\u003C\u002Fp>\n\u003Cp>Redirect Match Options\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>Redirect to Random Post\u003C\u002Fstrong>:This option redirect to random post in your WordPress blog post with following http codes (301,302,303,304,307,308).301 code move permanently your source URL so 301 code use carefully.\u003Cbr \u002F>\n► \u003Cstrong>Pass Through\u003C\u002Fstrong>:Pass through ignore the http code direct to redirect your target URL.\u003Cbr \u002F>\n► \u003Cstrong>Error 404\u003C\u002Fstrong>: This option redirect to Error 404 with http code errors with following http codes (400,401,403,404,410).\u003Cbr \u002F>\n► \u003Cstrong>Do nothing\u003C\u002Fstrong>:This option do nothing if source URL match current URL.\u003C\u002Fp>\n\u003Cp>Clean Up Options\u003C\u002Fp>\n\u003Cp>► \u003Cstrong>WP Post Redirect\u003C\u002Fstrong>:provide feature if you delete all redirects and all setting of redirects.\u003C\u002Fp>\n\u003Ch3>MAY BE YOU NEED\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-post-hide\u002F\" rel=\"ugc\">WP Post Hide\u003C\u002Fa>: Control the visibility of post type items like pages, posts and custom post type. Hidden in a specific part. But another part still visible.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwc-live-sale-notifications\u002F\" rel=\"ugc\">WooCommerce Sales Notifications\u003C\u002Fa>:Live Sale Notification For Woocommerce is the best WooCommerce plugin to boost your sales. This plugin allows you to display recent orders on a popup with customer and product information.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Freview-for-discount\u002F\" rel=\"ugc\">WooCommerce Review for Discount\u003C\u002Fa>:WooCommerce Reviews for Discount plugin allows you to offer discounts to your customers for their reviews and recommendations. A positive review is a most powerful tool to drive repeat purchases, up-sells, and new sales.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwc-spin-to-win-wheel\u002F\" rel=\"ugc\">WooCommerce Spin Popup\u003C\u002Fa>:WooCommerce Spin Popup helps shop owners to increase Sales and Leads. Spin Wheel for WooCommerce helps you to collect email of users by giving them discount which is completely controlled by you.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwc-multi-currency-switcher\u002F\" rel=\"ugc\">Woocommerce Currency Converter\u003C\u002Fa>:Woocommerce Currency Converter is the WooCommerce Multi Currency plugin that allows your site visitors to switch products prices currencies according to set currencies rates in real-time.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwc-upsell-and-order-bump\u002F\" rel=\"ugc\">Woocommerce Checkout Upsell Order Bump\u003C\u002Fa>:Woocommerce Checkout Upsell Order Bump is a WooCommerce plugin that offers product suggestions and order bumps with tempting discounts to the customers on the checkout page.\u003C\u002Fp>\n\u003Ch3>Premium Plugins link\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Feasymail-woocommerce-email-template-customizer\u002F36924704\" rel=\"nofollow ugc\">EasyMail- WooCommerce Email Template Customizer\u003C\u002Fa>:Your transactional emails don’t have to be so bland anymore. EasyMail Email Template Customizer for WooCommerce allows you to customize your transactional email templates and create beautiful, professional looking emails that keep customers impressed – even post-purchase.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwoocommerce-category-merger\u002F35504276\" rel=\"nofollow ugc\">WooCommerce Category Merger\u003C\u002Fa>:WooCommerce Category Merger is a WooCommerce plugin that merge multiple terms (woocommerce categories,woocommerce tags,) into one term (woocommerce category,woocommerce tag).\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwoocommerce-hide-product\u002F35504238\" rel=\"nofollow ugc\">WooCommerce Hide Product\u003C\u002Fa>:WooCommerce Hide Product allows you to hide a specific product from your website homepage, category, or search result page while still allowing others to view it if they have the direct link.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwebpio-wordpress-webp-converter\u002F33816880\" rel=\"nofollow ugc\">WebPio – WordPress WebP Converter\u003C\u002Fa>:WebPio – WordPress WebP Converter plugin allows you to convert JPEG and PNG images to WebP Format without losing image quality.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwoocommerce-reviews-for-discount\u002F33142777\" rel=\"nofollow ugc\">Revio – WooCommerce Reviews for Discount\u003C\u002Fa>:WooCommerce Reviews for Discount plugin allows you to offer discounts to your customers for their reviews and recommendations. A positive review is a most powerful tool to drive repeat purchases, up-sells, and new sales.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fnotifications-for-woocommerce\u002F32439454\" rel=\"nofollow ugc\">Live Sales Notification\u003C\u002Fa>:WooCommerce Recent Sales Popup is a Live Sales Popup plugin that increases sales and show social proof to customers that your site is busy and trustworthy.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwoocommerce-catalog-mode\u002F31687319\" rel=\"nofollow ugc\">WooCommerce Catalog Mode\u003C\u002Fa>:WooCommerce Catalog Mode allows you to turn your Shop into a Catalog Mode, by hiding price or Add to cart button on product pages and replace it with inquiry form.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fcontact-form-7-verification\u002F31513693\" rel=\"nofollow ugc\">Contact Form 7 Verification\u003C\u002Fa>:is the best wordpress plugin for providing email and mobile number verification for all CF7 forms.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Ffree-shipping-bar-for-woocommerce\u002F31489731\" rel=\"nofollow ugc\">Free shipping bar for WooCommerce\u003C\u002Fa>:is the best WooCommerce plugin that increases order revenue using free shipping as a marketing tool.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwordpress-voucher-creator\u002F25930233\" rel=\"nofollow ugc\">WordPress Coupon and Voucher Creator\u003C\u002Fa>:is the best plugin for providing coupons and gift vouchers to your site visitors. People are always seeking ways to spend wisely. Most customers look for a coupon before visiting a retailer because everyone wants to save money. This plugin provides the opportunity of saving a few bucks that leads to more sales for your online business.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwordpress-hide-post\u002F24141817\" rel=\"nofollow ugc\">WordPress Post Hide\u003C\u002Fa>:Control the visibility of post type items like pages, posts and custom post type. Hidden in specific part. But other part still visible.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fmerge-multiple-categories-or-tags-in-wordpress-and-woocommerce-term-management-tool\u002F23647126\" rel=\"nofollow ugc\">WordPress Category Merger\u003C\u002Fa>:is a WordPress plugin that merge multiple terms (categories, tags, custom categories, custom tags) into one term (category, tag, custom category, custom tag).\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fspinio-fortune-wheel-for-woocommcer-lead-booster\u002F22175475\" rel=\"nofollow ugc\">WooCommerce Lucky Wheel\u003C\u002Fa>: helps shop owners to increase Sales and Leads. Spin Wheel for WooCommerce helps you to collect email of users by giving them discount which is completely controlled by you.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwoocommerce-advanced-product-duplicator\u002F22147932\" rel=\"nofollow ugc\">WooCommerce Product Duplicator\u003C\u002Fa>:Most of the time Store manager or WooCommerce Admin needs to create a Product which is slightly different than existing Product.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fsmart-page-duplicator-duplicate-contents-through-find-and-replace\u002F22075205\" rel=\"nofollow ugc\">WordPress Page Duplicator\u003C\u002Fa>:duplicate selected page\u002Fpost with find and replace functionality.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwoocommerce-wishlist-add-to-favourites\u002F21663394\" rel=\"nofollow ugc\">WooCommerce Wishlist\u003C\u002Fa>:is a SIMPLE and MUST have plugin to let your customers list down their Favourite Products. It will boost up your sales and Conversions as well as site traffic because of Social Sharing Module.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwoocommerce-sequential-and-friendly-order-number\u002F21137939\" rel=\"nofollow ugc\">WooCommerce Custom Order Number\u003C\u002Fa>:A Common problem of all WooCommerce store is the random order numbers. Random order numbers are NOT easy to remember if you are in hurry and searching for one order out of thousand. Also this does not seem to be an order number of my store.\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fitem\u002Fwp-seo-image-optimizer\u002F21004246\" rel=\"nofollow ugc\">Seo Image Optimizer for WordPress and WooCommerce\u003C\u002Fa>:is a SIMPLE and MUST have plugin to Gain more traffic and sales From Search Engine Like GOOGLE , YAHOO , BING Image Search!. It Dramatically increase Traffic of your WordPress Website , Blog and Woocommerce Store\u003C\u002Fp>\n\u003Ch3>Documentation\u003C\u002Fh3>\n\u003Cp>► \u003Ca href=\"http:\u002F\u002Fdocs.xfinitysoft.com\u002Fplugins\u002Fadvanced-wp-redirect\u002F\" rel=\"nofollow ugc\">Getting Started\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Plugin Links\u003C\u002Fh3>\n\u003Cp>► \u003Ca href=\"https:\u002F\u002Fxfinitysoft.com\u002F\" rel=\"nofollow ugc\">Project Page\u003C\u002Fa>\u003Cbr \u002F>\n► \u003Ca href=\"http:\u002F\u002Fdocs.xfinitysoft.com\u002Fplugins\u002Fadvanced-wp-redirect\u002F\" rel=\"nofollow ugc\">Documentation\u003C\u002Fa>\u003Cbr \u002F>\n► \u003Ca href=\"https:\u002F\u002Fcodecanyon.net\u002Fuser\u002Fxfinitysoftdotcom\u002Fportfolio\" rel=\"nofollow ugc\">Pro Plugins link\u003C\u002Fa>\u003Cbr \u002F>\n► \u003Ca href=\"https:\u002F\u002Fxfinitysoft.com\u002Fcontact-us\u002F\" rel=\"nofollow ugc\">Report Bugs\u002FIssues\u003C\u002Fa>\u003C\u002Fp>\n","Post Redirection – 301, 404 Redirects lets you quickly redirect pages, posts, custom types, and URLs to new locations for seamless navigation.",40,2691,"2026-04-06T09:25:00.000Z","4.4.0","7.0",[20,201,21,202,23],"302","redirection","https:\u002F\u002Fxfinitysoft.com\u002Fxfinity\u002Fadvance-wp-redirect\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fadvance-wp-redirect.1.0.2.zip",{"attackSurface":206,"codeSignals":269,"taintFlows":339,"riskAssessment":357,"analyzedAt":372},{"hooks":207,"ajaxHandlers":261,"restRoutes":266,"shortcodes":267,"cronEvents":268,"entryPointCount":48,"unprotectedCount":48},[208,214,219,223,227,231,235,238,242,246,250,254,258],{"type":209,"name":210,"callback":211,"priority":48,"file":212,"line":213},"action","wp404arsp\u002Fsearch\u002Finit","register_engines","class\\class-engines.php",19,{"type":215,"name":216,"callback":217,"priority":48,"file":212,"line":218},"filter","wp404arsp\u002Fsearch\u002Fengine\u002Fdefault_fix_url","engine_default_fix_url",22,{"type":215,"name":220,"callback":221,"priority":48,"file":212,"line":222},"wp404arsp\u002Fsearch\u002Fengine\u002Fdefault_direct","engine_default_direct",23,{"type":215,"name":224,"callback":225,"priority":48,"file":212,"line":226},"wp404arsp\u002Fsearch\u002Fengine\u002Fdefault_post","engine_default_post",24,{"type":215,"name":228,"callback":229,"priority":48,"file":212,"line":230},"wp404arsp\u002Fsearch\u002Fengine\u002Fdefault_term","engine_default_term",25,{"type":215,"name":232,"callback":233,"priority":48,"file":212,"line":234},"wp404arsp\u002Fsearch\u002Fengine\u002Fdefault_post_fallback","engine_default_post_fallback",26,{"type":209,"name":210,"callback":236,"priority":48,"file":237,"line":213},"register_groups","class\\class-groups.php",{"type":209,"name":239,"callback":239,"priority":240,"file":53,"line":241},"admin_menu",10,88,{"type":215,"name":243,"callback":244,"priority":240,"file":53,"line":245},"plugin_action_links","admin_link",89,{"type":209,"name":247,"callback":248,"priority":240,"file":53,"line":249},"admin_init","admin_settings",90,{"type":209,"name":251,"callback":252,"priority":240,"file":53,"line":253},"admin_enqueue_scripts","admin_scripts",91,{"type":209,"name":255,"callback":256,"file":53,"line":257},"template_redirect","run",94,{"type":209,"name":259,"callback":260,"priority":48,"file":53,"line":146},"wp404arsp\u002Fafter_redirect","log",[262],{"action":263,"nopriv":55,"callback":264,"hasNonce":55,"hasCapCheck":55,"file":53,"line":265},"wp404arsp_ajax_preview","preview",97,[],[],[],{"dangerousFunctions":270,"sqlUsage":271,"outputEscaping":273,"fileOperations":29,"externalRequests":29,"nonceChecks":48,"capabilityChecks":56,"bundledLibraries":338},[],{"prepared":48,"raw":29,"locations":272},[],{"escaped":28,"rawEcho":274,"locations":275},35,[276,280,282,283,284,286,288,290,291,292,294,295,297,298,299,301,302,304,306,308,310,312,314,316,318,320,322,325,327,329,330,331,332,334,336],{"file":277,"line":278,"context":279},"includes\\admin.php",234,"raw output",{"file":277,"line":281,"context":279},235,{"file":277,"line":281,"context":279},{"file":277,"line":281,"context":279},{"file":277,"line":285,"context":279},290,{"file":277,"line":287,"context":279},296,{"file":277,"line":289,"context":279},356,{"file":277,"line":289,"context":279},{"file":277,"line":289,"context":279},{"file":277,"line":293,"context":279},357,{"file":277,"line":293,"context":279},{"file":277,"line":296,"context":279},435,{"file":277,"line":296,"context":279},{"file":277,"line":296,"context":279},{"file":277,"line":300,"context":279},436,{"file":277,"line":300,"context":279},{"file":277,"line":303,"context":279},473,{"file":277,"line":305,"context":279},490,{"file":277,"line":307,"context":279},491,{"file":277,"line":309,"context":279},498,{"file":277,"line":311,"context":279},526,{"file":277,"line":313,"context":279},548,{"file":277,"line":315,"context":279},549,{"file":277,"line":317,"context":279},551,{"file":277,"line":319,"context":279},609,{"file":277,"line":321,"context":279},621,{"file":323,"line":324,"context":279},"includes\\debug.php",44,{"file":323,"line":326,"context":279},47,{"file":323,"line":328,"context":279},53,{"file":323,"line":328,"context":279},{"file":323,"line":328,"context":279},{"file":323,"line":328,"context":279},{"file":323,"line":333,"context":279},54,{"file":323,"line":335,"context":279},55,{"file":323,"line":337,"context":279},56,[],[340],{"entryPoint":341,"graph":342,"unsanitizedCount":48,"severity":41},"\u003Cindex> (index.php:0)",{"nodes":343,"edges":355},[344,349],{"id":345,"type":346,"label":347,"file":348,"line":135},"n0","source","$_SERVER","index.php",{"id":350,"type":351,"label":352,"file":348,"line":353,"wp_function":354},"n1","sink","header() [Header Injection]",14,"header",[356],{"from":345,"to":350,"sanitized":55},{"summary":358,"deductions":359},"The plugin exhibits a mixed security posture. While it demonstrates good practices in its use of prepared statements for SQL queries and includes nonce and capability checks, there are significant concerns regarding its attack surface and output escaping. The presence of an unprotected AJAX handler is a critical vulnerability, providing an easily exploitable entry point for attackers.  Furthermore, the low percentage of properly escaped output suggests a high likelihood of cross-site scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the site. The plugin's vulnerability history, with four known CVEs including a high-severity XSS vulnerability, reinforces these concerns.  The pattern of past vulnerabilities, predominantly XSS, indicates a recurring weakness in how user input is handled. Despite the secure SQL handling, the unprotected AJAX handler and widespread output escaping issues, coupled with past vulnerabilities, indicate a significant risk.",[360,362,365,367,370],{"reason":361,"points":240},"Unprotected AJAX handler",{"reason":363,"points":364},"Low output escaping percentage",8,{"reason":366,"points":240},"Unsanitized path in taint flow",{"reason":368,"points":369},"One high severity vulnerability history",15,{"reason":371,"points":135},"Three medium severity vulnerabilities history","2026-03-16T17:23:02.294Z",{"wat":374,"direct":385},{"assetPaths":375,"generatorPatterns":379,"scriptPaths":380,"versionParams":381},[376,377,378],"\u002Fwp-content\u002Fplugins\u002Fwp-404-auto-redirect-to-similar-post\u002Fcss\u002Fadmin.css","\u002Fwp-content\u002Fplugins\u002Fwp-404-auto-redirect-to-similar-post\u002Fcss\u002Fstyle.css","\u002Fwp-content\u002Fplugins\u002Fwp-404-auto-redirect-to-similar-post\u002Fjs\u002Fadmin.js",[],[],[382,383,384],"wp-404-auto-redirect-to-similar-post\u002Fcss\u002Fadmin.css?ver=","wp-404-auto-redirect-to-similar-post\u002Fcss\u002Fstyle.css?ver=","wp-404-auto-redirect-to-similar-post\u002Fjs\u002Fadmin.js?ver=",{"cssClasses":386,"htmlComments":390,"htmlAttributes":392,"restEndpoints":394,"jsGlobals":395,"shortcodeOutput":397},[387,388,389],"wp404arsp-admin-wrapper","wp404arsp-debug-wrapper","wp404arsp-settings-wrapper",[391],"\u003C!-- WP 404 Auto Redirect to Similar Post by hwk-fr -->",[393],"data-wp404arsp-ajax-nonce",[],[396],"wp404arsp_settings",[],{"error":399,"url":400,"statusCode":401,"statusMessage":402,"message":402},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fwp-404-auto-redirect-to-similar-post\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":213,"versions":404},[405,410,417,425,436,446,456,467,478,489,500,511,522,533,544,555,566,576,587],{"version":6,"download_url":26,"svn_tag_url":406,"released_at":39,"has_diff":55,"diff_files_changed":407,"diff_lines":39,"trac_diff_url":408,"vulnerabilities":409,"is_current":399},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F1.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.5&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.6",[],{"version":71,"download_url":411,"svn_tag_url":412,"released_at":39,"has_diff":55,"diff_files_changed":413,"diff_lines":39,"trac_diff_url":414,"vulnerabilities":415,"is_current":55},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.1.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F1.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.4&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.5",[416],{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":86,"download_url":418,"svn_tag_url":419,"released_at":39,"has_diff":55,"diff_files_changed":420,"diff_lines":39,"trac_diff_url":421,"vulnerabilities":422,"is_current":55},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.1.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F1.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.3&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.4",[423,424],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":426,"download_url":427,"svn_tag_url":428,"released_at":39,"has_diff":55,"diff_files_changed":429,"diff_lines":39,"trac_diff_url":430,"vulnerabilities":431,"is_current":55},"1.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.1.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F1.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.2&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.3",[432,433,434,435],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":190,"download_url":437,"svn_tag_url":438,"released_at":39,"has_diff":55,"diff_files_changed":439,"diff_lines":39,"trac_diff_url":440,"vulnerabilities":441,"is_current":55},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.1.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F1.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.1&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.2",[442,443,444,445],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":158,"download_url":447,"svn_tag_url":448,"released_at":39,"has_diff":55,"diff_files_changed":449,"diff_lines":39,"trac_diff_url":450,"vulnerabilities":451,"is_current":55},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.1.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F1.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0.1",[452,453,454,455],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":457,"download_url":458,"svn_tag_url":459,"released_at":39,"has_diff":55,"diff_files_changed":460,"diff_lines":39,"trac_diff_url":461,"vulnerabilities":462,"is_current":55},"1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F1.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.9.0.2&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F1.0",[463,464,465,466],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":468,"download_url":469,"svn_tag_url":470,"released_at":39,"has_diff":55,"diff_files_changed":471,"diff_lines":39,"trac_diff_url":472,"vulnerabilities":473,"is_current":55},"0.9.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.9.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.9.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.9.0.1&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.9.0.2",[474,475,476,477],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":479,"download_url":480,"svn_tag_url":481,"released_at":39,"has_diff":55,"diff_files_changed":482,"diff_lines":39,"trac_diff_url":483,"vulnerabilities":484,"is_current":55},"0.9.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.9.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.9.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.9&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.9.0.1",[485,486,487,488],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":490,"download_url":491,"svn_tag_url":492,"released_at":39,"has_diff":55,"diff_files_changed":493,"diff_lines":39,"trac_diff_url":494,"vulnerabilities":495,"is_current":55},"0.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7.7&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.9",[496,497,498,499],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":501,"download_url":502,"svn_tag_url":503,"released_at":39,"has_diff":55,"diff_files_changed":504,"diff_lines":39,"trac_diff_url":505,"vulnerabilities":506,"is_current":55},"0.7.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.7.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.7.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7.6&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7.7",[507,508,509,510],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":512,"download_url":513,"svn_tag_url":514,"released_at":39,"has_diff":55,"diff_files_changed":515,"diff_lines":39,"trac_diff_url":516,"vulnerabilities":517,"is_current":55},"0.7.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.7.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.7.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7.2&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7.6",[518,519,520,521],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":523,"download_url":524,"svn_tag_url":525,"released_at":39,"has_diff":55,"diff_files_changed":526,"diff_lines":39,"trac_diff_url":527,"vulnerabilities":528,"is_current":55},"0.7.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.7.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.7.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7.1&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7.2",[529,530,531,532],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":534,"download_url":535,"svn_tag_url":536,"released_at":39,"has_diff":55,"diff_files_changed":537,"diff_lines":39,"trac_diff_url":538,"vulnerabilities":539,"is_current":55},"0.7.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.7.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.7.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7.1",[540,541,542,543],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":545,"download_url":546,"svn_tag_url":547,"released_at":39,"has_diff":55,"diff_files_changed":548,"diff_lines":39,"trac_diff_url":549,"vulnerabilities":550,"is_current":55},"0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.4.0.2&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.7",[551,552,553,554],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":556,"download_url":557,"svn_tag_url":558,"released_at":39,"has_diff":55,"diff_files_changed":559,"diff_lines":39,"trac_diff_url":560,"vulnerabilities":561,"is_current":55},"0.4.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.4.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.4.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.4&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.4.0.2",[562,563,564,565],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":174,"download_url":567,"svn_tag_url":568,"released_at":39,"has_diff":55,"diff_files_changed":569,"diff_lines":39,"trac_diff_url":570,"vulnerabilities":571,"is_current":55},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.3.2&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.4",[572,573,574,575],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":577,"download_url":578,"svn_tag_url":579,"released_at":39,"has_diff":55,"diff_files_changed":580,"diff_lines":39,"trac_diff_url":581,"vulnerabilities":582,"is_current":55},"0.3.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.3.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.3.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.3&new_path=%2Fwp-404-auto-redirect-to-similar-post%2Ftags%2F0.3.2",[583,584,585,586],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"version":588,"download_url":589,"svn_tag_url":590,"released_at":39,"has_diff":55,"diff_files_changed":591,"diff_lines":39,"trac_diff_url":39,"vulnerabilities":592,"is_current":55},"0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-404-auto-redirect-to-similar-post.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-404-auto-redirect-to-similar-post\u002Ftags\u002F0.3\u002F",[],[593,594,595,596],{"id":66,"url_slug":67,"title":68,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":71},{"id":94,"url_slug":95,"title":96,"severity":41,"cvss_score":98,"vuln_type":44,"patched_in_version":86},{"id":81,"url_slug":82,"title":83,"severity":41,"cvss_score":72,"vuln_type":44,"patched_in_version":86},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6}]