MainWP Dashboard: Self-hosted WordPress Management for Agencies
Slug: mainwp · mainwp · 20,000+
Overall Score
Some areas need attention
What this score means
Scores are calculated on a 100-point scale by analysing six weighted categories: Security, WP.org Readiness, Performance, Code Quality, Accessibility, and Vulnerabilities.
-
Excellent The plugin follows best practices across every measured category. It is well-maintained, low-risk, and recommended for production use.
-
Good Strong overall quality with minor areas for improvement. Generally safe to use on most sites.
-
Needs Review Some areas of concern detected. Review the full issues report and weigh the risks before installing on production.
-
High Risk Significant quality or security problems found. Exercise caution — check the details carefully before using this plugin.
- Wordfence: No successful sync yet
- WPScan: No successful sync yet
- Patchstack: No successful sync yet
Score Breakdown
Why this score?
Top deductions are based on 2 affected rules, reducing this category by 250 total points.
| Rule | Hits | Impact | Share |
|---|---|---|---|
| Security issue: Warning | 60 | -240 | 96% |
| Security issue: Error | 1 | -10 | 4% |
Why this score?
Top deductions are based on 1 affected rules, reducing this category by 2 total points.
| Rule | Hits | Impact | Share |
|---|---|---|---|
| Repo issue: Notice | 2 | -2 | 100% |
Why this score?
Top deductions are based on 0 affected rules, reducing this category by 0 total points.
No deductions were applied for this category in the latest score run.
Why this score?
Top deductions are based on 1 affected rules, reducing this category by 1 total points.
| Rule | Hits | Impact | Share |
|---|---|---|---|
| Code Quality issue: Notice | 1 | -1 | 100% |
Why this score?
Top deductions are based on 2 affected rules, reducing this category by 19 total points.
| Rule | Hits | Impact | Share |
|---|---|---|---|
| Accessibility issue: Warning | 9 | -18 | 94.7% |
| Accessibility issue: Notice | 1 | -1 | 5.3% |
Why this score?
Top deductions are based on 0 affected rules, reducing this category by 0 total points.
No deductions were applied for this category in the latest score run.
Plugin Details
- Version: 6.0.12
- Active Installs: 20,000+
- Last Updated: 2026-05-05 16:08:00
- Tested up to: 6.9.4
- Requires PHP: 7.4
- Rating: 4.9/5 (2,342 ratings)
- Support: 4/4 resolved (100%)
- View on WordPress.org
- Download Plugin
Scan Summary
- Errors: 1
- Warnings: 69
- Notices: 4
- Last Scanned: 2026-05-10 20:56:03
What Changed Since Last Scan
Run at least two completed scans to view issue deltas.
Detected Issues
| Severity | Category | Message | File | Fix Guidance |
|---|---|---|---|---|
| NOTICE | REPO | Main plugin file does not declare a Domain Path header. | mainwp.php |
Quick
Add a Domain Path header if language files are stored in a languages directory.
Moderate
Apply the same remediation pattern across repo findings and re-scan to confirm notice issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| NOTICE | REPO | Plugin package does not include a license file. |
Quick
Add a LICENSE or COPYING file so distribution terms are explicit.
Moderate
Apply the same remediation pattern across repo findings and re-scan to confirm notice issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-system.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | class/class-mainwp-system.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | class/class-mainwp-system.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | class/class-mainwp-extensions-view.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Raw superglobal access detected. | class/class-mainwp-uptime-monitoring-edit.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-encrypt-data-lib.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | class/class-mainwp-auto-updates-db.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-api-manager-plugin-update.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Use of unserialize() detected. | class/class-mainwp-api-manager-plugin-update.php |
Quick
Switch the flagged payload to JSON decoding where practical.
Moderate
If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced
Move state transfer to signed/typed schemas and add security tests for malformed payloads.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-api-manager-password-management.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| NOTICE | CODE_QUALITY | Legacy mysql_* function detected. | class/class-mainwp-db-base.php |
Quick
Use WordPress database APIs or mysqli/PDO-based abstractions instead of deprecated mysql_* calls.
Moderate
Apply the same remediation pattern across code quality findings and re-scan to confirm notice issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | class/class-mainwp-plugins-install-list-table.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-keys-manager.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | class/class-mainwp-manage-sites-update-view.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | class/class-mainwp-manage-sites-list-table.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Raw superglobal access detected. | class/class-mainwp-ui-manage-widgets-layout.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | class/class-mainwp-ui.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-system-view.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | class/class-mainwp-hooks.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-db.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-system-utility.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | class/class-mainwp-system-utility.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Raw superglobal access detected. | class/class-mainwp-post-plugin-theme-handler.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-meta-boxes.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | class/class-mainwp-meta-boxes.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-connect.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | class/class-mainwp-bulk-post.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| NOTICE | ACCESSIBILITY | Clickable div/span markup detected. | class/class-mainwp-ui-select-sites.php |
Quick
Replace clickable div/span elements with semantic button or link elements.
Moderate
Standardize interactive UI patterns in shared components with keyboard and focus support.
Advanced
Create accessibility component standards and enforce them with UI linting and automated tests.
|
| WARNING | SECURITY | Use of base64_decode() detected. | class/class-mainwp-post-handler.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | class/class-mainwp-post-handler.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | class/class-mainwp-demo-handle.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| ERROR | SECURITY | Use of eval() detected. | cron/bootstrap.php |
Quick
Comment out or remove eval() usage in the flagged file and verify behavior with existing plugin flows.
Moderate
Refactor the dynamic logic into explicit conditional branches or a vetted callback map.
Advanced
Add static analysis and CI rules to block eval() and require code review approval for dynamic execution paths.
|
| WARNING | SECURITY | Raw superglobal access detected. | includes/rest-api/class-mainwp-rest-authentication.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | includes/rest-api/controller/version2/class-mainwp-rest-controller.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | modules/api-backups/classes/class-api-backups-3rd-party.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | modules/logs/classes/class-log-db.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Raw superglobal access detected. | modules/logs/classes/class-log-settings.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | modules/logs/classes/class-log-install.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | modules/logs/classes/class-log-db-driver-wpdb.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | modules/logs/classes/class-log-query.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | modules/logs/classes/class-log-db-helper.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Raw superglobal access detected. | modules/cost-tracker/classes/class-cost-tracker-admin.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | modules/cost-tracker/classes/class-cost-tracker-db.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Raw superglobal access detected. | modules/cost-tracker/pages/page-cost-tracker-add-edit.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Raw superglobal access detected. | widgets/widget-mainwp-updates-overview.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Raw superglobal access detected. | widgets/widget-mainwp-uptime-monitoring-site-widget.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-site-open.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | pages/page-mainwp-site-open.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Raw superglobal access detected. | pages/page-mainwp-manage-sites.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-install-bulk.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | pages/page-mainwp-manage-backups.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Raw superglobal access detected. | pages/page-mainwp-bulk-update-admin-passwords.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-themes-handler.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-bulk-add.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | pages/page-mainwp-settings.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | pages/page-mainwp-setup-wizard.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-password-policy-settings.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Use of unserialize() detected. | pages/page-mainwp-password-policy-settings.php |
Quick
Switch the flagged payload to JSON decoding where practical.
Moderate
If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced
Move state transfer to signed/typed schemas and add security tests for malformed payloads.
|
| WARNING | SECURITY | Raw superglobal access detected. | pages/page-mainwp-rest-api-page.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-post-page-handler.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Use of unserialize() detected. | pages/page-mainwp-post-page-handler.php |
Quick
Switch the flagged payload to JSON decoding where practical.
Moderate
If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced
Move state transfer to signed/typed schemas and add security tests for malformed payloads.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | pages/page-mainwp-post-page-handler.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | pages/page-mainwp-server-information-handler.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-extensions-handler.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-plugins-handler.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | pages/page-mainwp-extensions-groups.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-page.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Use of unserialize() detected. | pages/page-mainwp-page.php |
Quick
Switch the flagged payload to JSON decoding where practical.
Moderate
If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced
Move state transfer to signed/typed schemas and add security tests for malformed payloads.
|
| WARNING | SECURITY | Raw superglobal access detected. | pages/page-mainwp-page.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-post.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Raw superglobal access detected. | pages/page-mainwp-updates.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Use of base64_decode() detected. | pages/page-mainwp-user.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
Score History
No history available yet. · All-Time High: N/A