Suspicious Code Dangerous and threatening code often used to attack sites

This support request was posted in Flatbase by ingecorp

Request ID #37655 In Progress
  • Good day,

    I have been given a warning by VaultPress in regard to code vulnerabilities.

    You may find details in this screenshot.

    In item N. 2 the code is:

    if ( Kirki_Toolkit::is_parent_theme( __FILE__ ) ) {
    27
    $relative_url = str_replace( Kirki_Toolkit::clean_file_path( get_template_directory() ), ”, $tfbs( $tfbs( __FILE__ ) ) );
    28
    Kirki::$url = trailingslashit( get_template_directory_uri() . $relative_url );

    33
    elseif ( Kirki_Toolkit::is_child_theme( __FILE__ ) ) {
    34
    $relative_url = str_replace( Kirki_Toolkit::clean_file_path( get_stylesheet_directory() ), ”, $tfbs( $tfbs( __FILE__ ) ) );
    35
    Kirki::$url = trailingslashit( get_stylesheet_directory_uri() . $relative_url );

    Is this a problem?

    Thanks for your reply in advance,

    Ignacio

    Juanfra Aldasoro

    Hi Ignacio,

    Thank you for writing. I hope you are doing well.

    No, that’s not dangerous. Often times, Vaulpress and other security plugins flag problems where they aren’t.

    Best,
    Juan.

Viewing 2 posts - 1 through 2 (of 2 total)

You must be logged in to reply to this topic.

Login to your Account

Welcome back! Please log in to your account by filling the fields below:

Forgot?

Not a member? Create a free account.

Create a Free Account

You're 27 seconds away from some awesome WordPress free stuff, benefits and more. Create a free account and have access to our free products, benefits and more!

Already have an account? Log in
Secure Server