MainWP Dashboard: Self-hosted WordPress Management for Agencies

Slug: mainwp · mainwp · 20,000+

Actively maintained

Overall Score

Some areas need attention

70
Needs Review

What this score means

Scores are calculated on a 100-point scale by analysing six weighted categories: Security, WP.org Readiness, Performance, Code Quality, Accessibility, and Vulnerabilities.

  • Excellent The plugin follows best practices across every measured category. It is well-maintained, low-risk, and recommended for production use.
  • Good Strong overall quality with minor areas for improvement. Generally safe to use on most sites.
  • Needs Review Some areas of concern detected. Review the full issues report and weigh the risks before installing on production.
  • High Risk Significant quality or security problems found. Exercise caution — check the details carefully before using this plugin.
Score computed: May 10, 2026 8:56 pm (3 days ago). Vulnerability data mode: Cached.
  • Wordfence: No successful sync yet
  • WPScan: No successful sync yet
  • Patchstack: No successful sync yet

No known open vulnerabilities found.

Score Breakdown

Shield
Security
0
High Risk
Why this score?

Top deductions are based on 2 affected rules, reducing this category by 250 total points.

Rule Hits Impact Share
Security issue: Warning 60 -240 96%
Security issue: Error 1 -10 4%
W
WP.org Readiness
98
Excellent
Why this score?

Top deductions are based on 1 affected rules, reducing this category by 2 total points.

Rule Hits Impact Share
Repo issue: Notice 2 -2 100%
Speed
Performance
100
Excellent
Why this score?

Top deductions are based on 0 affected rules, reducing this category by 0 total points.

No deductions were applied for this category in the latest score run.

Code
Code Quality
99
Excellent
Why this score?

Top deductions are based on 1 affected rules, reducing this category by 1 total points.

Rule Hits Impact Share
Code Quality issue: Notice 1 -1 100%
A11y
Accessibility
81
Good
Why this score?

Top deductions are based on 2 affected rules, reducing this category by 19 total points.

Rule Hits Impact Share
Accessibility issue: Warning 9 -18 94.7%
Accessibility issue: Notice 1 -1 5.3%
Bug
Vulnerability Status
100
Excellent
Why this score?

Top deductions are based on 0 affected rules, reducing this category by 0 total points.

No deductions were applied for this category in the latest score run.

Plugin Details

  • Version: 6.0.12
  • Active Installs: 20,000+
  • Last Updated: 2026-05-05 16:08:00
  • Tested up to: 6.9.4
  • Requires PHP: 7.4
  • Rating: 4.9/5 (2,342 ratings)
  • Support: 4/4 resolved (100%)
  • View on WordPress.org
  • Download Plugin

Scan Summary

  • Errors: 1
  • Warnings: 69
  • Notices: 4
  • Last Scanned: 2026-05-10 20:56:03
Scans are performed automatically once per day.

What Changed Since Last Scan

Run at least two completed scans to view issue deltas.

Detected Issues

Severity Category Message File Fix Guidance
NOTICE REPO Main plugin file does not declare a Domain Path header. mainwp.php
Quick Add a Domain Path header if language files are stored in a languages directory.
Moderate Apply the same remediation pattern across repo findings and re-scan to confirm notice issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
NOTICE REPO Plugin package does not include a license file.
Quick Add a LICENSE or COPYING file so distribution terms are explicit.
Moderate Apply the same remediation pattern across repo findings and re-scan to confirm notice issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-system.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. class/class-mainwp-system.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. class/class-mainwp-system.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. class/class-mainwp-extensions-view.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Raw superglobal access detected. class/class-mainwp-uptime-monitoring-edit.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-encrypt-data-lib.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. class/class-mainwp-auto-updates-db.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-api-manager-plugin-update.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Use of unserialize() detected. class/class-mainwp-api-manager-plugin-update.php
Quick Switch the flagged payload to JSON decoding where practical.
Moderate If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced Move state transfer to signed/typed schemas and add security tests for malformed payloads.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-api-manager-password-management.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
NOTICE CODE_QUALITY Legacy mysql_* function detected. class/class-mainwp-db-base.php
Quick Use WordPress database APIs or mysqli/PDO-based abstractions instead of deprecated mysql_* calls.
Moderate Apply the same remediation pattern across code quality findings and re-scan to confirm notice issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. class/class-mainwp-plugins-install-list-table.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-keys-manager.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. class/class-mainwp-manage-sites-update-view.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. class/class-mainwp-manage-sites-list-table.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Raw superglobal access detected. class/class-mainwp-ui-manage-widgets-layout.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. class/class-mainwp-ui.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-system-view.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. class/class-mainwp-hooks.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-db.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-system-utility.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. class/class-mainwp-system-utility.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Raw superglobal access detected. class/class-mainwp-post-plugin-theme-handler.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-meta-boxes.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. class/class-mainwp-meta-boxes.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-connect.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. class/class-mainwp-bulk-post.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
NOTICE ACCESSIBILITY Clickable div/span markup detected. class/class-mainwp-ui-select-sites.php
Quick Replace clickable div/span elements with semantic button or link elements.
Moderate Standardize interactive UI patterns in shared components with keyboard and focus support.
Advanced Create accessibility component standards and enforce them with UI linting and automated tests.
WARNING SECURITY Use of base64_decode() detected. class/class-mainwp-post-handler.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. class/class-mainwp-post-handler.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. class/class-mainwp-demo-handle.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
ERROR SECURITY Use of eval() detected. cron/bootstrap.php
Quick Comment out or remove eval() usage in the flagged file and verify behavior with existing plugin flows.
Moderate Refactor the dynamic logic into explicit conditional branches or a vetted callback map.
Advanced Add static analysis and CI rules to block eval() and require code review approval for dynamic execution paths.
WARNING SECURITY Raw superglobal access detected. includes/rest-api/class-mainwp-rest-authentication.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. includes/rest-api/controller/version2/class-mainwp-rest-controller.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. modules/api-backups/classes/class-api-backups-3rd-party.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. modules/logs/classes/class-log-db.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING SECURITY Raw superglobal access detected. modules/logs/classes/class-log-settings.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. modules/logs/classes/class-log-install.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. modules/logs/classes/class-log-db-driver-wpdb.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. modules/logs/classes/class-log-query.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. modules/logs/classes/class-log-db-helper.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING SECURITY Raw superglobal access detected. modules/cost-tracker/classes/class-cost-tracker-admin.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. modules/cost-tracker/classes/class-cost-tracker-db.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING SECURITY Raw superglobal access detected. modules/cost-tracker/pages/page-cost-tracker-add-edit.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Raw superglobal access detected. widgets/widget-mainwp-updates-overview.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Raw superglobal access detected. widgets/widget-mainwp-uptime-monitoring-site-widget.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-site-open.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. pages/page-mainwp-site-open.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Raw superglobal access detected. pages/page-mainwp-manage-sites.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-install-bulk.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. pages/page-mainwp-manage-backups.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Raw superglobal access detected. pages/page-mainwp-bulk-update-admin-passwords.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-themes-handler.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-bulk-add.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. pages/page-mainwp-settings.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. pages/page-mainwp-setup-wizard.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-password-policy-settings.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Use of unserialize() detected. pages/page-mainwp-password-policy-settings.php
Quick Switch the flagged payload to JSON decoding where practical.
Moderate If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced Move state transfer to signed/typed schemas and add security tests for malformed payloads.
WARNING SECURITY Raw superglobal access detected. pages/page-mainwp-rest-api-page.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-post-page-handler.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Use of unserialize() detected. pages/page-mainwp-post-page-handler.php
Quick Switch the flagged payload to JSON decoding where practical.
Moderate If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced Move state transfer to signed/typed schemas and add security tests for malformed payloads.
WARNING ACCESSIBILITY Image markup without an alt attribute detected. pages/page-mainwp-post-page-handler.php
Quick Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate Audit all templates/components for missing alternative text and update content guidelines.
Advanced Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
WARNING SECURITY Direct database query detected without an immediately visible $wpdb->prepare() wrapper. pages/page-mainwp-server-information-handler.php
Quick Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-extensions-handler.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-plugins-handler.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. pages/page-mainwp-extensions-groups.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-page.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Use of unserialize() detected. pages/page-mainwp-page.php
Quick Switch the flagged payload to JSON decoding where practical.
Moderate If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced Move state transfer to signed/typed schemas and add security tests for malformed payloads.
WARNING SECURITY Raw superglobal access detected. pages/page-mainwp-page.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-post.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
WARNING SECURITY Raw superglobal access detected. pages/page-mainwp-updates.php
Quick Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate Centralize request normalization in helper methods so handlers consume validated input only.
Advanced Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
WARNING SECURITY Use of base64_decode() detected. pages/page-mainwp-user.php
Quick Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.

Score History

No history available yet. · All-Time High: N/A