[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fMc0VSLgusYz-3DBXUlV0lld86PTaw7ymQfqqJBvVaX0":3,"$f81NNz2M8cVM4Fw9BesY22SbnUiMtPFsD4mgz6LoyjDA":140,"$fCG4PAfgl8f3AENOphKKf41NgamUXeaSi6IQ9UOXMEWk":145},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":9,"tags":17,"homepage":19,"download_link":20,"security_score":21,"vuln_count":13,"unpatched_count":13,"last_vuln_date":22,"fetched_at":23,"discovery_status":24,"vulnerabilities":25,"developer":26,"crawl_stats":22,"alternatives":31,"analysis":32,"fingerprints":123},"ysd-comment","新浪云商店评论插件","1.5","luofei614","https:\u002F\u002Fprofiles.wordpress.org\u002Fluofei614\u002F","","新浪云商店评论插件，是为新浪云商店中的wordpress专门打造，用户需要登录新浪微博后才能评论，有效了防止了垃圾评论",10,2211,0,"2012-09-13T06:10:00.000Z","3.4.2","3.0",[18],"%e5%9e%83%e5%9c%be%e8%af%84%e8%ae%ba-%e6%96%b0%e6%b5%aa-%e4%ba%91%e5%95%86%e5%ba%97-%e5%be%ae%e5%8d%9a%e7%99%bb%e9%99%86-%e6%96%b0%e6%b5%aa%e5%be%ae%e5%8d%9a","http:\u002F\u002Fwww.yuanshangdian.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fysd-comment.zip",85,null,"2026-04-16T10:56:18.058Z","no_bundle",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":27,"total_installs":11,"avg_security_score":21,"avg_patch_time_days":28,"trust_score":29,"computed_at":30},1,30,84,"2026-05-20T12:14:48.050Z",[],{"attackSurface":33,"codeSignals":57,"taintFlows":71,"riskAssessment":106,"analyzedAt":122},{"hooks":34,"ajaxHandlers":53,"restRoutes":54,"shortcodes":55,"cronEvents":56,"entryPointCount":13,"unprotectedCount":13},[35,41,45,49],{"type":36,"name":37,"callback":38,"file":39,"line":40},"action","comment_form_before_fields","webo_login","ysd-comment.php",29,{"type":36,"name":42,"callback":43,"file":39,"line":44},"comment_form_after","ysd_comment_form_alert",31,{"type":36,"name":46,"callback":47,"file":39,"line":48},"pre_comment_on_post","ysd_comment_on_post",32,{"type":36,"name":50,"callback":51,"file":39,"line":52},"comment_post","ysd_comment_post",33,[],[],[],[],{"dangerousFunctions":58,"sqlUsage":59,"outputEscaping":61,"fileOperations":13,"externalRequests":27,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":70},[],{"prepared":13,"raw":13,"locations":60},[],{"escaped":13,"rawEcho":62,"locations":63},3,[64,67,69],{"file":39,"line":65,"context":66},20,"raw output",{"file":39,"line":68,"context":66},50,{"file":39,"line":21,"context":66},[],[72,90],{"entryPoint":73,"graph":74,"unsanitizedCount":27,"severity":89},"webo_login (ysd-comment.php:36)",{"nodes":75,"edges":86},[76,81],{"id":77,"type":78,"label":79,"file":39,"line":80},"n0","source","$_SERVER",45,{"id":82,"type":83,"label":84,"file":39,"line":68,"wp_function":85},"n1","sink","echo() [XSS]","echo",[87],{"from":77,"to":82,"sanitized":88},false,"medium",{"entryPoint":91,"graph":92,"unsanitizedCount":104,"severity":105},"\u003Cysd-comment> (ysd-comment.php:0)",{"nodes":93,"edges":101},[94,96,97,99],{"id":77,"type":78,"label":95,"file":39,"line":65},"$_GET['screen_name']",{"id":82,"type":83,"label":84,"file":39,"line":65,"wp_function":85},{"id":98,"type":78,"label":79,"file":39,"line":80},"n2",{"id":100,"type":83,"label":84,"file":39,"line":68,"wp_function":85},"n3",[102,103],{"from":77,"to":82,"sanitized":88},{"from":98,"to":100,"sanitized":88},2,"low",{"summary":107,"deductions":108},"The \"ysd-comment\" v1.5 plugin exhibits a mixed security posture. On the positive side, the plugin has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are properly prepared, and there are no known vulnerabilities in its history. This indicates diligent security practices in certain areas.\n\nHowever, significant concerns arise from the static analysis. The most alarming finding is that 100% of output is not properly escaped, with three identified output points. This presents a high risk of cross-site scripting (XSS) vulnerabilities, where attackers could inject malicious scripts into the website through comments. The taint analysis also reveals two flows with unsanitized paths, which, while not classified as critical or high severity in this report, could still lead to unexpected or malicious behavior if exploited in conjunction with other weaknesses. The absence of nonce and capability checks, alongside an external HTTP request, further amplifies these concerns by reducing the plugin's resilience against various attack vectors.\n\nIn conclusion, while the plugin has a clean vulnerability history and employs good practices for SQL queries and attack surface reduction, the complete lack of output escaping and the presence of unsanitized flows are critical flaws that severely compromise its security. These issues, combined with the lack of nonce and capability checks, outweigh the strengths and necessitate immediate attention.",[109,112,115,118,120],{"reason":110,"points":111},"All identified outputs are unescaped",8,{"reason":113,"points":114},"Taint analysis shows unsanitized paths",7,{"reason":116,"points":117},"No nonce checks implemented",5,{"reason":119,"points":117},"No capability checks implemented",{"reason":121,"points":104},"External HTTP request detected","2026-04-16T12:09:26.851Z",{"wat":124,"direct":130},{"assetPaths":125,"generatorPatterns":127,"scriptPaths":128,"versionParams":129},[126],"\u002Fwp-content\u002Fplugins\u002Fysd-comment\u002Fysd-comment.php",[],[],[],{"cssClasses":131,"htmlComments":132,"htmlAttributes":133,"restEndpoints":135,"jsGlobals":136,"shortcodeOutput":138},[],[],[134],"onsubmit=function(){ return true; }",[],[137],"window.top.login_success",[139],"\u003Ciframe scrolling=\"no\" frameborder=\"0\" style=\"height:24px; width:100%;\" allowtransparency=\"true\" src=\"",{"error":141,"url":142,"statusCode":143,"statusMessage":144,"message":144},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fysd-comment\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":146,"versions":147},4,[148,155,162,169],{"version":149,"download_url":150,"svn_tag_url":151,"released_at":22,"has_diff":88,"diff_files_changed":152,"diff_lines":22,"trac_diff_url":153,"vulnerabilities":154,"is_current":88},"1.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fysd-comment.1.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fysd-comment\u002Ftags\u002F1.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fysd-comment%2Ftags%2F1.2&new_path=%2Fysd-comment%2Ftags%2F1.3",[],{"version":156,"download_url":157,"svn_tag_url":158,"released_at":22,"has_diff":88,"diff_files_changed":159,"diff_lines":22,"trac_diff_url":160,"vulnerabilities":161,"is_current":88},"1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fysd-comment.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fysd-comment\u002Ftags\u002F1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fysd-comment%2Ftags%2F1.1&new_path=%2Fysd-comment%2Ftags%2F1.2",[],{"version":163,"download_url":164,"svn_tag_url":165,"released_at":22,"has_diff":88,"diff_files_changed":166,"diff_lines":22,"trac_diff_url":167,"vulnerabilities":168,"is_current":88},"1.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fysd-comment.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fysd-comment\u002Ftags\u002F1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fysd-comment%2Ftags%2F1.0&new_path=%2Fysd-comment%2Ftags%2F1.1",[],{"version":170,"download_url":171,"svn_tag_url":172,"released_at":22,"has_diff":88,"diff_files_changed":173,"diff_lines":22,"trac_diff_url":22,"vulnerabilities":174,"is_current":88},"1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fysd-comment.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fysd-comment\u002Ftags\u002F1.0\u002F",[],[]]