Showing 251 of 251 total issues
Use Yoda Condition checks, you must. Open
Open
if ( $i == 1 ) {
- Exclude checks
No space found before comment text; expected "// TODO: investigate what of the following information makes sense here" but found "//TODO: investigate what of the following information makes sense here" Open
Open
//TODO: investigate what of the following information makes sense here
- Exclude checks
Inline comments must end in full-stops, exclamation marks, or question marks Open
Open
//TODO: investigate what of the following information makes sense here
- Exclude checks
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'global_admin_url'. Open
Open
<form action="<?php echo global_admin_url( 'user-new.php?action=add-user' ); ?>" id="adduser" method="post" novalidate="novalidate">
- Exclude checks
All output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found '_e'. Open
Open
<th scope="row"><label for="username"><?php _e( 'Username' ); ?></label></th>
- Exclude checks
Detected usage of a non-sanitized input variable: $_GET Open
Open
do_action( 'global_admin_edit_' . $_GET['action'] );
- Exclude checks
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '__'. Open
Open
wp_die( __( 'Multinetwork support is not enabled.', 'wp-global-admin' ) );
- Exclude checks
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '__'. Open
Open
wp_die( sprintf( __( 'Warning! User cannot be modified. The user %s is a network administrator.' ), esc_html( $user->user_login ) ) );
- Exclude checks
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '__'. Open
Open
wp_die( __( 'You do not have permission to access this page.' ), 403 );
- Exclude checks
Missing wp_unslash() before sanitization. Open
Open
foreach ( $_POST['blog'] as $id => $users ) {
- Exclude checks
Array item not aligned correctly; expected 4 spaces but found 8 Open
Open
'id' => 'overview',
- Exclude checks
Use Yoda Condition checks, you must. Open
Open
<?php if ( $user->user_email != get_global_option( 'admin_email' ) || ! is_global_administrator( $user->ID ) ) : ?>
- Exclude checks
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '__'. Open
Open
wp_die( __( 'Sorry, you are not allowed to access this page.' ), 403 );
- Exclude checks
All output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found '_e'. Open
Open
_e( 'Users marked as spam.' );
- Exclude checks
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '__'. Open
Open
wp_die( __( 'Multinetwork support is not enabled.', 'wp-global-admin' ) );
- Exclude checks
Each array item in a multi-line array declaration must end in a comma Open
Open
'<p>' . __( 'You can make an existing user an additional global admin by going to the Edit User profile page and checking the box to grant that privilege.', 'wp-global-admin' ) . '</p>'
- Exclude checks
Inline comments must end in full-stops, exclamation marks, or question marks Open
Open
//$overview .= '<li>' . __( 'Update your network', 'wp-global-admin' ) . '</li>';
- Exclude checks
No space found before comment text; expected "// require_once( ABSPATH . 'wp-admin/includes/menu.php' );" but found "//require_once( ABSPATH . 'wp-admin/includes/menu.php' );" Open
Open
//require_once( ABSPATH . 'wp-admin/includes/menu.php' );
- Exclude checks
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '__'. Open
Open
wp_die( __( 'Sorry, you are not allowed to add users to this setup.', 'wp-global-admin' ) );
- Exclude checks
Detected usage of a non-validated input variable: $_POST Open
Open
$user = wp_unslash( $_POST['user'] );
- Exclude checks