Good day,
I have been given a warning by VaultPress in regard to code vulnerabilities.
You may find details in this
.
In item N. 2 the code is:
if ( Kirki_Toolkit::is_parent_theme( __FILE__ ) ) {
27
$relative_url = str_replace( Kirki_Toolkit::clean_file_path( get_template_directory() ), ”, $tfbs( $tfbs( __FILE__ ) ) );
28
Kirki::$url = trailingslashit( get_template_directory_uri() . $relative_url );
…
33
elseif ( Kirki_Toolkit::is_child_theme( __FILE__ ) ) {
34
$relative_url = str_replace( Kirki_Toolkit::clean_file_path( get_stylesheet_directory() ), ”, $tfbs( $tfbs( __FILE__ ) ) );
35
Kirki::$url = trailingslashit( get_stylesheet_directory_uri() . $relative_url );
Is this a problem?
Thanks for your reply in advance,
Ignacio
Hi Ignacio,
Thank you for writing. I hope you are doing well.
No, that’s not dangerous. Often times, Vaulpress and other security plugins flag problems where they aren’t.
Best,
Juan.