[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fMIPGUO2AKnp2tTBQDLmUMGL5RkWSn_nn0PibGzkn9BU":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":20,"download_link":21,"security_score":22,"vuln_count":23,"unpatched_count":23,"last_vuln_date":24,"fetched_at":25,"vulnerabilities":26,"developer":27,"crawl_stats":24,"alternatives":35,"analysis":36,"fingerprints":205},"zoom-widget","Z","1.2.8","10Web","https:\u002F\u002Fprofiles.wordpress.org\u002F10web\u002F","\u003Cp>This plugin enables site users to resize the predefined areas of the web site.\u003C\u002Fp>\n","This plugin enables site users to resize the predefined areas of the web site.",600,70650,78,12,"2019-12-16T08:42:00.000Z","4.0.38","3.0","",[],"http:\u002F\u002Fweb-dorado.com\u002Fproducts\u002Fzoom-widget-wordpress.html","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fzoom-widget.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":28,"display_name":7,"profile_url":8,"plugin_count":29,"total_installs":30,"avg_security_score":31,"avg_patch_time_days":32,"trust_score":33,"computed_at":34},"10web",9,365160,82,724,66,"2026-04-03T21:27:45.610Z",[],{"attackSurface":37,"codeSignals":76,"taintFlows":194,"riskAssessment":195,"analyzedAt":204},{"hooks":38,"ajaxHandlers":67,"restRoutes":68,"shortcodes":69,"cronEvents":74,"entryPointCount":75,"unprotectedCount":23},[39,45,49,54,58,62],{"type":40,"name":41,"callback":42,"file":43,"line":44},"filter","mce_external_plugins","Spider_Zoom_register","zoom.php",448,{"type":40,"name":46,"callback":47,"priority":23,"file":43,"line":48},"mce_buttons","Spider_Zoom_add_button",449,{"type":50,"name":51,"callback":52,"file":43,"line":53},"action","admin_head","add_button_style_Spider_Zoom",475,{"type":50,"name":55,"callback":56,"file":43,"line":57},"admin_menu","Spider_Zoom_menu",483,{"type":50,"name":59,"callback":60,"file":43,"line":61},"admin_init","registrmy_jquer_scripts",526,{"type":50,"name":63,"callback":64,"file":65,"line":66},"widgets_init","reg_wid_zoom","zoom_widget.php",447,[],[],[70],{"tag":71,"callback":72,"file":43,"line":73},"Web-Dorado_Zoom","Spider_Zoom_shotrcode",15,[],1,{"dangerousFunctions":77,"sqlUsage":78,"outputEscaping":80,"fileOperations":23,"externalRequests":23,"nonceChecks":23,"capabilityChecks":23,"bundledLibraries":189},[],{"prepared":23,"raw":23,"locations":79},[],{"escaped":23,"rawEcho":81,"locations":82},57,[83,87,89,92,93,94,95,97,98,100,102,104,106,108,110,112,114,116,118,121,123,125,127,129,131,133,135,137,139,142,144,147,149,151,153,155,157,159,161,163,165,167,169,171,172,173,174,175,176,178,179,180,181,183,185,187,188],{"file":84,"line":85,"context":86},"elements\\class.php",7,"raw output",{"file":88,"line":85,"context":86},"elements\\id.php",{"file":90,"line":91,"context":86},"elements\\imggroup.php",117,{"file":90,"line":91,"context":86},{"file":90,"line":91,"context":86},{"file":90,"line":91,"context":86},{"file":90,"line":96,"context":86},122,{"file":90,"line":96,"context":86},{"file":90,"line":99,"context":86},127,{"file":90,"line":101,"context":86},128,{"file":90,"line":103,"context":86},129,{"file":90,"line":105,"context":86},132,{"file":90,"line":107,"context":86},206,{"file":90,"line":109,"context":86},207,{"file":90,"line":111,"context":86},208,{"file":90,"line":113,"context":86},277,{"file":90,"line":115,"context":86},278,{"file":90,"line":117,"context":86},279,{"file":119,"line":120,"context":86},"elements\\imgsize.php",37,{"file":119,"line":122,"context":86},38,{"file":119,"line":124,"context":86},39,{"file":119,"line":126,"context":86},43,{"file":119,"line":128,"context":86},48,{"file":119,"line":130,"context":86},49,{"file":119,"line":132,"context":86},50,{"file":119,"line":134,"context":86},54,{"file":119,"line":136,"context":86},55,{"file":119,"line":138,"context":86},56,{"file":140,"line":141,"context":86},"elements\\max.php",6,{"file":143,"line":141,"context":86},"elements\\min.php",{"file":145,"line":146,"context":86},"elements\\plus.php",36,{"file":148,"line":85,"context":86},"elements\\tag.php",{"file":43,"line":150,"context":86},468,{"file":43,"line":152,"context":86},585,{"file":43,"line":154,"context":86},589,{"file":65,"line":156,"context":86},23,{"file":65,"line":158,"context":86},27,{"file":65,"line":160,"context":86},73,{"file":65,"line":162,"context":86},74,{"file":65,"line":164,"context":86},75,{"file":65,"line":166,"context":86},76,{"file":65,"line":168,"context":86},77,{"file":65,"line":170,"context":86},391,{"file":65,"line":170,"context":86},{"file":65,"line":170,"context":86},{"file":65,"line":170,"context":86},{"file":65,"line":170,"context":86},{"file":65,"line":170,"context":86},{"file":65,"line":177,"context":86},399,{"file":65,"line":177,"context":86},{"file":65,"line":177,"context":86},{"file":65,"line":177,"context":86},{"file":65,"line":182,"context":86},405,{"file":65,"line":184,"context":86},423,{"file":65,"line":186,"context":86},424,{"file":65,"line":186,"context":86},{"file":65,"line":186,"context":86},[190],{"name":191,"version":192,"knownCves":193},"jQuery","1.7.1",[],[],{"summary":196,"deductions":197},"The zoom-widget plugin version 1.2.8 exhibits a mixed security posture. On the positive side, the absence of known vulnerabilities in its history, the complete lack of dangerous functions, and the exclusive use of prepared statements for SQL queries are strong indicators of good development practices concerning common web application vulnerabilities.  Furthermore, there are no external HTTP requests, file operations, or cron events, significantly reducing potential attack vectors. The plugin's attack surface is minimal, with only a single shortcode identified as an entry point, and importantly, no unprotected entry points were found in the static analysis, suggesting that authentication and capability checks are likely in place for its limited interaction points.\n\nHowever, a significant concern arises from the complete absence of output escaping. With 57 total outputs and 0% properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed by the shortcode, if not meticulously sanitized by the calling application, could be injected by an attacker, leading to session hijacking, defacement, or other malicious actions. Additionally, the use of an outdated jQuery library (v1.7.1) poses a risk, as older versions are known to contain security vulnerabilities that could be exploited if not adequately protected by other layers of defense.\n\nIn conclusion, while the plugin benefits from a clean vulnerability history and strong practices around SQL and core WordPress security features, the pervasive lack of output escaping creates a critical weakness that needs immediate attention. The outdated bundled library is a secondary concern. The absence of taint analysis results might indicate a limited scope of static analysis or that no complex data flows were identified, but the unescaped output remains a tangible and exploitable threat.",[198,201],{"reason":199,"points":200},"Unescaped output detected",20,{"reason":202,"points":203},"Bundled outdated library (jQuery v1.7.1)",4,"2026-03-16T19:30:58.851Z",{"wat":206,"direct":215},{"assetPaths":207,"generatorPatterns":210,"scriptPaths":211,"versionParams":212},[208,209],"\u002Fwp-content\u002Fplugins\u002Fzoom-widget\u002Fstyle.css","\u002Fwp-content\u002Fplugins\u002Fzoom-widget\u002Fjs\u002Fzoom.js",[],[209],[213,214],"zoom-widget\u002Fstyle.css?ver=","zoom-widget\u002Fjs\u002Fzoom.js?ver=",{"cssClasses":216,"htmlComments":217,"htmlAttributes":218,"restEndpoints":220,"jsGlobals":221,"shortcodeOutput":246},[],[],[219],"my=\"my\"",[],[72,222,223,224,225,226,227,228,229,230,231,232,233,234,235,236,237,238,239,240,241,242,243,244,245],"front_end_Spider_Zoom","zoom_function__once","tag","class_","id_","max_","min_","all_elems","elements_id","al_id","al_class","allow_ids","allow_classes","prefsLoaded_my","defaultFontSize_my","currentFontSize_my","changeFontSize_my","setFontSize_my","revertStyles_my","createCookie_my","readCookie_my","getElementsByClassName","zoomOnload","getTextNodesIn",[247],"[Web-Dorado_Zoom]"]