Code Injection
-
We discovered the following code injection security vulnerability in the Prime Mover plugin. We are running WP 6.0.3 and PHP 8. Can you please respond to let us know whether you agree it is an issue, and if so when it will be addressed? If you do not consider it an issue, we would appreciate an explanation of why. Thank you.
Locations:
Lines 194 and 421 of
…/class-fs-plugin-updater.phpDescription:
The software allows untrusted input to be fed directly into a function (e.g. “eval”) that dynamically evaluates and executes the input as code, usually in the same interpreted language that the product uses.Recommendations:
Validate all untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. In general, avoid executing code derived from untrusted input.
- The topic ‘Code Injection’ is closed to new replies.