[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fsqKZx39odgNafTaUGh1bUHuqUE--W4F6WT8mf_gFE90":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":11,"num_ratings":11,"last_updated":13,"tested_up_to":14,"requires_at_least":15,"requires_php":16,"tags":17,"homepage":18,"download_link":19,"security_score":20,"vuln_count":11,"unpatched_count":11,"last_vuln_date":21,"fetched_at":22,"vulnerabilities":23,"developer":24,"crawl_stats":21,"alternatives":31,"analysis":32,"fingerprints":106},"wp-confirm","WP Confirm","1.0.0","Abuzer","https:\u002F\u002Fprofiles.wordpress.org\u002Ffirdousi\u002F","\u003Cp>Adds a confirm dialog on saving post, menu and permalinks.\u003C\u002Fp>\n","Adds a confirm dialog on saving post, menu and permalinks.",0,1521,"2020-10-14T12:00:00.000Z","5.5.18","5.0.1","",[],"http:\u002F\u002Fwww.greelogix.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-confirm.1.0.1.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":25,"display_name":7,"profile_url":8,"plugin_count":26,"total_installs":27,"avg_security_score":20,"avg_patch_time_days":28,"trust_score":29,"computed_at":30},"firdousi",3,240,30,84,"2026-04-05T06:40:24.373Z",[],{"attackSurface":33,"codeSignals":78,"taintFlows":93,"riskAssessment":94,"analyzedAt":105},{"hooks":34,"ajaxHandlers":74,"restRoutes":75,"shortcodes":76,"cronEvents":77,"entryPointCount":11,"unprotectedCount":11},[35,41,45,49,54,57,59,62,64,66,67,68,70,71,72,73],{"type":36,"name":37,"callback":38,"file":39,"line":40},"action","admin_menu","wp_confirm_add_plugin_page","admin\\class-wp-confirm-admin.php",115,{"type":36,"name":42,"callback":43,"file":39,"line":44},"admin_init","wp_confirm_page_init",116,{"type":36,"name":46,"callback":47,"file":39,"line":48},"admin_footer","wpconfirm_confirm_message_publish",285,{"type":36,"name":50,"callback":51,"file":52,"line":53},"plugins_loaded","anonymous","includes\\class-wp-confirm.php",142,{"type":36,"name":55,"callback":51,"file":52,"line":56},"admin_enqueue_scripts",157,{"type":36,"name":55,"callback":51,"file":52,"line":58},158,{"type":36,"name":60,"callback":51,"file":52,"line":61},"wp_enqueue_scripts",173,{"type":36,"name":60,"callback":51,"file":52,"line":63},174,{"type":36,"name":37,"callback":38,"file":65,"line":40},"trunk\\admin\\class-wp-confirm-admin.php",{"type":36,"name":42,"callback":43,"file":65,"line":44},{"type":36,"name":46,"callback":47,"file":65,"line":48},{"type":36,"name":50,"callback":51,"file":69,"line":53},"trunk\\includes\\class-wp-confirm.php",{"type":36,"name":55,"callback":51,"file":69,"line":56},{"type":36,"name":55,"callback":51,"file":69,"line":58},{"type":36,"name":60,"callback":51,"file":69,"line":61},{"type":36,"name":60,"callback":51,"file":69,"line":63},[],[],[],[],{"dangerousFunctions":79,"sqlUsage":80,"outputEscaping":82,"fileOperations":11,"externalRequests":11,"nonceChecks":11,"capabilityChecks":11,"bundledLibraries":92},[],{"prepared":11,"raw":11,"locations":81},[],{"escaped":11,"rawEcho":83,"locations":84},4,[85,88,90,91],{"file":39,"line":86,"context":87},257,"raw output",{"file":39,"line":89,"context":87},271,{"file":65,"line":86,"context":87},{"file":65,"line":89,"context":87},[],[],{"summary":95,"deductions":96},"The \"wp-confirm\" v1.0.0 plugin exhibits a seemingly secure posture based on the provided static analysis.  There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. The code also shows no instances of dangerous functions, file operations, or external HTTP requests.  Furthermore, all SQL queries are noted to use prepared statements, and there are no recorded vulnerabilities (CVEs) or taint flows. This suggests a development effort focused on minimizing potential entry points and adhering to secure coding practices for database interactions.\n\nHowever, a significant concern arises from the complete lack of output escaping. With 4 identified outputs and 0% properly escaped, this opens the door to potential cross-site scripting (XSS) vulnerabilities. If user-supplied data is ever reflected in the output without proper sanitization, an attacker could inject malicious scripts. The absence of nonce and capability checks also means that even if there were entry points, they would be susceptible to unauthorized access or manipulation, although currently, the attack surface is zero. The lack of vulnerability history is positive, but it doesn't negate the immediate risks identified in the static analysis, particularly the unescaped output.\n\nIn conclusion, while the plugin has strong points in terms of attack surface reduction and secure SQL handling, the critical flaw of unescaped output presents a tangible risk. The absence of security checks on potential entry points (even if currently none exist) is a weakness. The plugin needs immediate attention to address the output escaping issue to mitigate XSS risks, and a review of its architecture to ensure future developments incorporate proper authorization checks.",[97,100,103],{"reason":98,"points":99},"Output not properly escaped",12,{"reason":101,"points":102},"Missing nonce checks",5,{"reason":104,"points":102},"Missing capability checks","2026-03-17T06:46:34.299Z",{"wat":107,"direct":117},{"assetPaths":108,"generatorPatterns":111,"scriptPaths":112,"versionParams":114},[109,110],"\u002Fwp-content\u002Fplugins\u002Fwp-confirm\u002Fadmin\u002Fcss\u002Fwp-confirm-admin.css","\u002Fwp-content\u002Fplugins\u002Fwp-confirm\u002Fadmin\u002Fjs\u002Fwp-confirm-admin.js",[],[113],"admin\u002Fjs\u002Fwp-confirm-admin.js",[115,116],"wp-confirm-admin.css?ver=","wp-confirm-admin.js?ver=",{"cssClasses":118,"htmlComments":119,"htmlAttributes":122,"restEndpoints":123,"jsGlobals":124,"shortcodeOutput":125},[],[120,121],"\u003C!-- Generated by the WordPress Option Page generator -->","\u003C!-- at http:\u002F\u002Fjeremyhixon.com\u002Fwp-tools\u002Foption-page\u002F -->",[],[],[],[]]