Clean your WordPress! Eliminate unused and broken media files. For a faster, and better website.
| Code | Message | Location | Category | |
|---|---|---|---|---|
| ERROR | WordPress.Security.EscapeOutput.OutputNotEscaped | All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$post'. | classes/ui.php:93:95 | Security |
| ERROR | WordPress.Security.EscapeOutput.OutputNotEscaped | All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$wpdb'. | classes/parsers/my-calendar.php:23:14 | Security |
| ERROR | WordPress.Security.EscapeOutput.OutputNotEscaped | All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'get_edit_post_link'. | classes/ui.php:94:42 | Security |
| ERROR | PluginCheck.Security.DirectDB.UnescapedDBParameter | Unescaped parameter $table_ref used in $wpdb->get_results($wpdb->prepare( "SELECT *\n\t\t\t\t\tFROM $table_ref\n\t\t\t\t\tWHERE 1=1\n\t\t\t\t\t$where_sql\n\t\t\t\t\t$order_sql\n\t\t\t\t\tLIMIT %d, %d", $skip, $limit\n\t\t\t\t))\n$table_ref assigned unsafely at line 676:\n $table_ref = $wpdb->prefix . "mclean_refs"\n$total assigned unsafely at line 678:\n $total = $this->count_references($search, $referenceFilter)\n$search assigned unsafely at line 674:\n $search = sanitize_text_field( $request->get_param('search') )\nNote: sanitize_text_field() is not a safe escaping function.\n$referenceFilter assigned unsafely at line 675:\n $referenceFilter = sanitize_text_field( $request->get_param('referenceFilter') )\n$request used without escaping. | classes/rest.php:699:22 | Security |
| ERROR | WordPress.DB.PreparedSQL.NotPrepared | Use placeholders and $wpdb->prepare(); found $q | classes/parsers/maxmegamenu.php:14:25 | Security |
| ERROR | PluginCheck.Security.DirectDB.UnescapedDBParameter | Unescaped parameter $request used in $wpdb->get_col($request)\n$request assigned unsafely at line 354:\n $request = ( $wpdb->prepare( "SELECT mediaUrl FROM $table_name_refs WHERE originType LIKE %s", $hash ) )\n$table_name_refs assigned unsafely at line 352:\n $table_name_refs = $wpdb->prefix . "mclean_refs"\n$hash used without escaping. | classes/engine.php:356:20 | Security |
| ERROR | WordPress.Security.EscapeOutput.OutputNotEscaped | All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$wpdb'. | classes/parsers/maxmegamenu.php:18:13 | Security |
| ERROR | WordPress.DB.PreparedSQL.NotPrepared | Use placeholders and $wpdb->prepare(); found $request | classes/engine.php:356:29 | Security |
| ERROR | WordPress.WP.I18n.MissingTranslatorsComment | A function call to __() with texts containing placeholders was found, but was not accompanied by a "translators:" comment on the line above to clarify the meaning of the placeholders. | classes/rest.php:365:35 | General |
| ERROR | WordPress.DB.PreparedSQL.NotPrepared | Use placeholders and $wpdb->prepare(); found $q | classes/parsers/metaslider.php:13:30 | Security |
| 16.12.2025, 08:02:25 | 17s | 25 | 116 | 368 |
| 03.12.2025, 09:31:34 | 14s | 25 | 116 | 368 |
| 19.11.2025, 09:37:12 | 18s | 27 | 116 | 347 |
| 12.11.2025, 22:15:58 | 17s | 25 | 118 | 364 |