Disable WooCommerce cart page and force customers to buy single products.
| Code | Message | Location | Category | |
|---|---|---|---|---|
| ERROR | WordPress.Security.EscapeOutput.UnsafePrintingFunction | All output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found '_e'. | 112:57 | Security |
| ERROR | outdated_tested_upto_header | Tested up to: 6.6 < 6.8. The "Tested up to" value in your plugin is not set to the current version of WordPress. This means your plugin will not show up in searches, as we require plugins to be compatible and documented as tested up to the most recent version of WordPress. | — | Plugin Repo |
| ERROR | readme_invalid_donate_link | The "Donate link" header in the readme file must be a valid URL. | — | Plugin Repo |
| WARNING | WordPress.Security.NonceVerification.Recommended | Processing form data without nonce verification. | 38:48 | Security |
| WARNING | WordPress.Security.ValidatedSanitizedInput.MissingUnslash | $_REQUEST['plugin'] not unslashed before sanitization. Use wp_unslash() or similar | 38:48 | Security |
| WARNING | WordPress.Security.NonceVerification.Recommended | Processing form data without nonce verification. | 28:48 | Security |
| WARNING | WordPress.Security.SafeRedirect.wp_redirect_wp_redirect | wp_redirect() found. Using wp_safe_redirect(), along with the "allowed_redirect_hosts" filter if needed, can help avoid any chances of malicious redirects within code. It is also important to remember to call exit() after a redirect so that no other unwanted code is executed. | 158:13 | Security |
| WARNING | WordPress.Security.SafeRedirect.wp_redirect_wp_redirect | wp_redirect() found. Using wp_safe_redirect(), along with the "allowed_redirect_hosts" filter if needed, can help avoid any chances of malicious redirects within code. It is also important to remember to call exit() after a redirect so that no other unwanted code is executed. | 163:9 | Security |
| WARNING | WordPress.Security.ValidatedSanitizedInput.InputNotSanitized | Detected usage of a non-sanitized input variable: $_REQUEST['plugin'] | 38:48 | Security |
| WARNING | WordPress.Security.ValidatedSanitizedInput.MissingUnslash | $_REQUEST['plugin'] not unslashed before sanitization. Use wp_unslash() or similar | 28:48 | Security |
| 11/14/2025, 1:23:25 AM | 9s | 96 | 3 | 8 |