• Resolved victort

    (@victort)


    I’m using eform as my form plugin, the plugin supporting staff found out ninjafirewall is blocking my editor (the role) to edit eform at the backend.

    Example of error log:
    POST /wp-admin/admin-ajax.php – SQL injection – [POST:ipt_ps_post = action=ipt_fsqm_form_view_all_nonce_post_action&ipt_fsqm_form_view_all_nonce=4c42d8c3fd&_wp_http_referer=%2Fwp-admin%2Fadmin.php%3Fpage%3Dipt_fsqm_all_forms%26action%3Dedit%26…]

    I would like to whitelist either:
    – the editor role, or
    – a particular user, or
    – a plugin
    from having false positive threat reports and blocking plugins from running normally. Is any of these possible with ninjafirewall free?

Viewing 3 replies - 1 through 3 (of 3 total)
  • Plugin Author nintechnet

    (@nintechnet)

    You can’t whitelist a user role in the free version, that’s a premium feature.
    You can disable the security rule that blocked the request. But I can’t tell you which one it is because you removed it from the log line. Each line in the log has the following format: date + incident number + severity level + rule ID + IP + request. Can you check again the log and give me the corresponding rule ID?

    Thread Starter victort

    (@victort)

    The rule id is involved is 252

    Plugin Author nintechnet

    (@nintechnet)

    You can disable it (“NinjaFirewall > Security Rules > Rules Editor” tab), it’s a rule that deals with very specific SQL attacks and it is unlikely to be used to attack most WP blogs.

Viewing 3 replies - 1 through 3 (of 3 total)
  • The topic ‘How can I whitelist the SQL injection from a particular user (or user role)?’ is closed to new replies.