Ultimate freedom to upload any file type in WordPress—including restricted or custom formats like media, documents, and more.
| Code | Message | Location | Category | |
|---|---|---|---|---|
| ERROR | WordPress.Security.EscapeOutput.UnsafePrintingFunction | All output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found '_e'. | 296:35 | Security |
| ERROR | WordPress.Security.EscapeOutput.UnsafePrintingFunction | All output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found '_e'. | 300:35 | Security |
| ERROR | WordPress.WP.I18n.MissingTranslatorsComment | A function call to __() with texts containing placeholders was found, but was not accompanied by a "translators:" comment on the line above to clarify the meaning of the placeholders. | 151:40 | General |
| ERROR | WordPress.WP.I18n.MissingTranslatorsComment | A function call to __() with texts containing placeholders was found, but was not accompanied by a "translators:" comment on the line above to clarify the meaning of the placeholders. | 129:40 | General |
| ERROR | WordPress.Security.EscapeOutput.OutputNotEscaped | All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$notice'. | 105:35 | Security |
| ERROR | readme_mismatched_header_requires | Mismatched Requires at least: 5.0 != 5.6. "Requires at least" needs to be exactly the same with that in your main plugin file's header. | — | Plugin Repo |
| ERROR | WordPress.Security.EscapeOutput.UnsafePrintingFunction | All output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found '_e'. | 203:43 | Security |
| WARNING | WordPress.Security.SafeRedirect.wp_redirect_wp_redirect | wp_redirect() found. Using wp_safe_redirect(), along with the "allowed_redirect_hosts" filter if needed, can help avoid any chances of malicious redirects within code. It is also important to remember to call exit() after a redirect so that no other unwanted code is executed. | 77:17 | Security |
| WARNING | WordPress.Security.ValidatedSanitizedInput.InputNotSanitized | Detected usage of a non-sanitized input variable: $_FILES['file'] | 125:17 | Security |
| WARNING | mismatched_plugin_name | Plugin name "Upload Any MIME Types – Support SVG, JSON, APK, TTF, and others" is different from the name declared in plugin header "Upload Any MIME Types". | — | — |
| 16.11.2025, 04:47:32 | 11s | 95 | 7 | 9 |