[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fN0mG0cYFezsvxFXKOynReSkf37nY5A-mAyW4LBV-Jlw":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":15,"requires_php":15,"tags":16,"homepage":15,"download_link":17,"security_score":18,"vuln_count":13,"unpatched_count":13,"last_vuln_date":19,"fetched_at":20,"vulnerabilities":21,"developer":22,"crawl_stats":19,"alternatives":29,"analysis":30,"fingerprints":82},"youtube-thumbnailer","Oren's Youtube Thumbnailer","1.1.1","Oren Yomtov","https:\u002F\u002Fprofiles.wordpress.org\u002Fornani\u002F","\u003Cp>\u003Cstrong>1.1.1:\u003C\u002Fstrong>\u003Cbr \u002F>\nEnhanced video detection.\u003C\u002Fp>\n\u003Cp>\nThis plugin runs through the posts in your blog and if it finds a YouTube video embedded in a post it sets the thumbnail to be the videos thumbnail.\n\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"http:\u002F\u002Ftwitter.com\u002Forenyomtov\" rel=\"nofollow ugc\">Follow me on twitter\u003C\u002Fa>\u003C\u002Fp>\n","Tags: youtube,thumbnail,auto,custom field,posts,embed,embedded Requires at least: 2.7 Tested up to: 2.9.2 Stable tag: 1.1.",30,14313,0,"2020-02-25T11:25:00.000Z","",[],"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fyoutube-thumbnailer.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":23,"display_name":7,"profile_url":8,"plugin_count":24,"total_installs":25,"avg_security_score":26,"avg_patch_time_days":11,"trust_score":27,"computed_at":28},"ornani",4,190,89,86,"2026-04-05T01:56:10.345Z",[],{"attackSurface":31,"codeSignals":56,"taintFlows":69,"riskAssessment":70,"analyzedAt":81},{"hooks":32,"ajaxHandlers":52,"restRoutes":53,"shortcodes":54,"cronEvents":55,"entryPointCount":13,"unprotectedCount":13},[33,39,43,48],{"type":34,"name":35,"callback":36,"file":37,"line":38},"action","init","ytt_init","youtube_thumbnails_script.php",26,{"type":34,"name":40,"callback":41,"file":37,"line":42},"admin_menu","ytt_config_pages",29,{"type":44,"name":45,"callback":46,"priority":47,"file":37,"line":11},"filter","plugin_action_links","ytt_actions",10,{"type":34,"name":49,"callback":50,"file":37,"line":51},"save_post","ytt_save_post",32,[],[],[],[],{"dangerousFunctions":57,"sqlUsage":58,"outputEscaping":61,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":68},[],{"prepared":59,"raw":13,"locations":60},2,[],{"escaped":13,"rawEcho":59,"locations":62},[63,66],{"file":37,"line":64,"context":65},58,"raw output",{"file":37,"line":67,"context":65},97,[],[],{"summary":71,"deductions":72},"The static analysis of youtube-thumbnailer v1.1.1 reveals a plugin with a seemingly very small attack surface, reporting zero AJAX handlers, REST API routes, shortcodes, or cron events. This lack of direct entry points is a positive indicator for security.  Furthermore, the plugin demonstrates good practices by using prepared statements for its SQL queries, mitigating the risk of SQL injection vulnerabilities.  The absence of dangerous functions, file operations, and external HTTP requests are also encouraging signs.\n\nHowever, a significant concern arises from the code analysis regarding output escaping. With 100% of its outputs not properly escaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities.  Any dynamic content rendered by this plugin could potentially be exploited to inject malicious scripts into the user's browser. The lack of capability checks and nonce checks, while less critical given the limited attack surface, means that if any entry points were to be discovered or inadvertently introduced in future updates, they might not be adequately protected.\n\nThe vulnerability history also paints a neutral picture, with no recorded CVEs. While this suggests the plugin has been relatively clean in the past, it cannot be relied upon as a guarantee of future security, especially given the identified XSS risk.  In conclusion, while the plugin has a minimal attack surface and uses prepared statements for SQL, the critical lack of output escaping creates a substantial security risk that needs immediate attention.",[73,76,79],{"reason":74,"points":75},"Outputs not properly escaped",8,{"reason":77,"points":78},"Missing capability checks",3,{"reason":80,"points":78},"Missing nonce checks","2026-03-16T22:23:15.605Z",{"wat":83,"direct":88},{"assetPaths":84,"generatorPatterns":85,"scriptPaths":86,"versionParams":87},[],[],[],[],{"cssClasses":89,"htmlComments":91,"htmlAttributes":92,"restEndpoints":93,"jsGlobals":94,"shortcodeOutput":95},[90],"ytt",[],[],[],[],[]]