1and1 Website Application Scan

edited April 2017 in Theme support
hi there. this weekend we got mail from our hosting partner:

Using the GET HTTP method, 1and1 SiteLock found that :

The following resources may be vulnerable to blind SQL injection 

The 'load%5B%5D' parameter of the /wp-admin/load-styles.php CGI 

/wp-admin/load-styles.php?c=0&ver=4.7.3&dir=ltr&load%5B%5D=dashicons%2cb

uttons%2cforms%2cl10n%2cloginzz0&ver=4.7.3&dir=ltr&load%5B%5D=dashicons%

2cbuttons%2cforms%2cl10n%2cloginyy


its an issue with theme files or the main wordpress files?


thanks for info.

wistlaumann


p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 13.0px Times; color: #646e80; -webkit-text-stroke: #646e80}
span.s1 {font-kerning: none}

Comments

Sign In or Register to comment.