{"id":73477,"date":"2017-08-23T21:42:02","date_gmt":"2017-08-23T21:42:02","guid":{"rendered":"https:\/\/wordpress.org\/plugins\/prevent-xss-vulnerability\/"},"modified":"2024-06-28T10:45:03","modified_gmt":"2024-06-28T10:45:03","slug":"prevent-xss-vulnerability","status":"publish","type":"plugin","link":"https:\/\/wordpress.org\/plugins\/prevent-xss-vulnerability\/","author":14736021,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rating":5,"active_installs":7000,"downloads":54475,"tested":"6.5.5","requires":"3.5","requires_php":"","stable_tag":"2.0.1","donate_link":"","version":"2.0.1","header_name":"Prevent XSS Vulnerability","header_plugin_uri":"https:\/\/www.yasglobal.com\/web-design-development\/wordpress\/prevent-xss-vulnerability\/","header_author":"Sami Ahmed Siddiqui","header_author_uri":"https:\/\/www.linkedin.com\/in\/sami-ahmed-siddiqui\/","header_description":"Allow you to make your site prevent from the XSS Vulnerability.","assets_banners_color":"ced6dc","support_threads":0,"support_threads_resolved":0},"class_list":["post-73477","plugin","type-plugin","status-publish","hentry","plugin_tags-attack","plugin_tags-cross-site-scripting","plugin_tags-security","plugin_tags-vulnerability","plugin_tags-xss","plugin_category-security-and-spam-protection","plugin_contributors-sasiddiqui","plugin_committers-sasiddiqui"],"banners":{"banner":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/banner-772x250.png?rev=1795795","banner_2x":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/banner-1544x500.png?rev=1795795","banner_rtl":false,"banner_2x_rtl":false},"icons":{"svg":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/icon.svg?rev=1785920","icon":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/icon.svg?rev=1785920","icon_2x":false,"generated":false},"rating":5,"ratings":{"1":0,"2":0,"3":0,"4":0,"5":7},"screenshots":[{"src":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/screenshot-1.png?rev=2051252","caption":"

It removes the parameters from the URL which are used in XSS Attack and redirects the user (Recommended).<\/p>"},{"src":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/screenshot-2.png?rev=2051252","caption":"

It encodes the parameters from the URL which are used in XSS Attack.<\/p>"},{"src":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/screenshot-3.png?rev=2051252","caption":"

It escapes the HTML from the $_GET<\/code> PHP variable which is mostly used to read the data from the URL (Recommended).<\/p>"},{"src":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/screenshot-4.png?rev=2051252","caption":"

Add the message in developer console for the user to alert about the XSS attack.<\/p>"},{"src":"https:\/\/ps.w.org\/prevent-xss-vulnerability\/assets\/screenshot-5.png?rev=2051252","caption":"

Show message in developer console to alert user about the Self-XSS attack. This message can be customized from the settings page.<\/p>"}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin\/73477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin"}],"about":[{"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/types\/plugin"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/comments?post=73477"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wporg\/v1\/users\/sasiddiqui"}],"wp:attachment":[{"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/media?parent=73477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}