Sauter la navigation

[Résolu] Toolset using eval() flagged as security issue by WP Defender plugin

This support ticket is created Il y a 4 années et 4 mois. There's a good chance that you are reading advice that it now obsolete.

This is the technical support forum for Toolset - a suite of plugins for developing WordPress sites without writing PHP.

Everyone can read this forum, but only Toolset clients can post in it. Toolset support works 6 days per week, 19 hours per day.

Marqué : 

Ce sujet contient 2 réponses, a 2 voix.

Dernière mise à jour par Clifford Il y a 4 années et 4 mois.

Auteur
Publications
#1793421
2020-09-27 Toolset eval reported by WP Defender.png

When using the WP Defender Pro plugin (lien caché), it reports a security concern due to Toolset's code using eval()

lien caché
> Caution: The eval() language construct is very dangerous because it allows execution of arbitrary PHP code. Its use thus is discouraged. If you have carefully verified that there is no other option than to use this construct, pay special attention not to pass any user provided data into it without properly validating it beforehand.

So why does eval() exist in your code? If it's absolutely necessary, I will "Ignore" it in the report's action items but thought I'd confirm with you first.

#1794163

Nigel
Supporter

Les langues: Anglais (English ) Espagnol (Español )

Fuseau horaire: Europe/London (GMT+00:00)

Hi Clifford

It's effectively a false-positive in this case, and eval is required.

You can read more here: https://toolset.com/toolset-requirements/#eval-usage

#1797353

tyvm