[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fbdkvU8ilBBR9MdKMbJ4Oc7mgEPAgV_I6Vz5pDViSuzM":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":11,"num_ratings":11,"last_updated":13,"tested_up_to":14,"requires_at_least":15,"requires_php":16,"tags":17,"homepage":18,"download_link":19,"security_score":20,"vuln_count":11,"unpatched_count":11,"last_vuln_date":21,"fetched_at":22,"vulnerabilities":23,"developer":24,"crawl_stats":21,"alternatives":31,"analysis":32,"fingerprints":111},"yandex-map","Yandex Map","1.0.2","Hamid Alinia","https:\u002F\u002Fprofiles.wordpress.org\u002Fglboy\u002F","\u003Cp>Yandex map for Woocommerce checkout , choose location in order and checkout of Woocommerce\u003C\u002Fp>\n","Yandex map for Woocommerce checkout , choose location in order and checkout of Woocommerce",0,1000,"2021-08-27T05:37:00.000Z","5.8.13","3.4","",[],"http:\u002F\u002Fidehweb.com\u002Fyandex-map","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fyandex-map.1.0.2.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":25,"display_name":7,"profile_url":8,"plugin_count":26,"total_installs":27,"avg_security_score":20,"avg_patch_time_days":28,"trust_score":29,"computed_at":30},"glboy",4,1010,140,69,"2026-04-04T06:05:56.938Z",[],{"attackSurface":33,"codeSignals":78,"taintFlows":98,"riskAssessment":99,"analyzedAt":110},{"hooks":34,"ajaxHandlers":69,"restRoutes":70,"shortcodes":71,"cronEvents":76,"entryPointCount":77,"unprotectedCount":11},[35,41,44,47,51,55,60,65],{"type":36,"name":37,"callback":38,"file":39,"line":40},"action","init","idehweb_yandexmap_textdomain","yandex-map.php",19,{"type":36,"name":42,"callback":42,"file":39,"line":43},"admin_init",20,{"type":36,"name":45,"callback":45,"file":39,"line":46},"admin_menu",21,{"type":36,"name":48,"callback":49,"file":39,"line":50},"wp_enqueue_scripts","enqueue_scripts",22,{"type":36,"name":52,"callback":53,"file":39,"line":54},"activated_plugin","yandexmap_activation_redirect",23,{"type":56,"name":57,"callback":58,"file":39,"line":59},"filter","woocommerce_checkout_fields","yandexmap_override_checkout_fields",25,{"type":36,"name":61,"callback":62,"priority":63,"file":39,"line":64},"woocommerce_admin_order_data_after_billing_address","yandexmap_override_checkout_fields_admin",10,26,{"type":36,"name":66,"callback":67,"file":39,"line":68},"woocommerce_checkout_update_order_meta","yandexmap_override_checkout_update_meta",27,[],[],[72],{"tag":73,"callback":74,"file":39,"line":75},"idehweb_yandexmap","shortcode",24,[],1,{"dangerousFunctions":79,"sqlUsage":80,"outputEscaping":82,"fileOperations":77,"externalRequests":11,"nonceChecks":11,"capabilityChecks":11,"bundledLibraries":97},[],{"prepared":11,"raw":11,"locations":81},[],{"escaped":83,"rawEcho":84,"locations":85},7,5,[86,89,91,93,95],{"file":39,"line":87,"context":88},222,"raw output",{"file":39,"line":90,"context":88},231,{"file":39,"line":92,"context":88},241,{"file":39,"line":94,"context":88},250,{"file":39,"line":96,"context":88},271,[],[],{"summary":100,"deductions":101},"The \"yandex-map\" v1.0.2 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, cron events, or external HTTP requests significantly limits its attack surface and potential for remote exploitation.  Furthermore, the complete utilization of prepared statements for SQL queries is an excellent practice, preventing common SQL injection vulnerabilities.\n\nHowever, there are areas of concern. The presence of a shortcode without any apparent authentication or capability checks could be a vector for exploitation if that shortcode performs sensitive actions or exposes information. Additionally, the 58% proper output escaping indicates that nearly half of the plugin's output is not being properly sanitized, creating a risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce checks, while less critical without exploitable AJAX or REST endpoints, is still a missed opportunity for enhancing security against certain types of attacks.\n\nThe plugin's vulnerability history is entirely clear, with no recorded CVEs. This is a positive indicator, suggesting a history of secure development or a lack of past targeted attacks.  In conclusion, while the plugin benefits from a very small attack surface and secure SQL handling, the potential for XSS due to unescaped output and the unprotected shortcode warrant attention. The absence of any historical vulnerabilities is reassuring, but the static analysis reveals specific areas where improvements can be made to solidify its security.",[102,105,108],{"reason":103,"points":104},"Unprotected shortcode",15,{"reason":106,"points":107},"Output escaping issues",6,{"reason":109,"points":84},"Missing nonce checks","2026-03-17T06:18:47.937Z",{"wat":112,"direct":119},{"assetPaths":113,"generatorPatterns":116,"scriptPaths":117,"versionParams":118},[114,115],"\u002Fwp-content\u002Fplugins\u002Fyandex-map\u002Fstyles\u002Fyandex-map.css","\u002Fwp-content\u002Fplugins\u002Fyandex-map\u002Fscripts\u002Fyandex-map.js",[],[115],[],{"cssClasses":120,"htmlComments":121,"htmlAttributes":123,"restEndpoints":126,"jsGlobals":127,"shortcodeOutput":128},[73],[122],"\u003C!-- jhgjk -->",[124,125],"data-yandexidfiled","data-yandex_billing_city",[],[73],[]]