felixarntz/global-admin

View on GitHub

Showing 251 of 251 total issues

All output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found '_e'.
Open

                _e( 'Users deleted.' );

Detected usage of a non-sanitized input variable: $_REQUEST
Open

            $args['orderby'] = $_REQUEST['orderby'];

All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$edit_link'.
Open

            <a href="<?php echo $edit_link; ?>" class="edit"><?php echo $user->user_login; ?></a>

All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '"<span class="$action">$link$sep</span>"'.
Open

                echo "<span class='$action'>$link$sep</span>";

Use placeholders and $wpdb->prepare(); found $insert
Open

        $wpdb->query( "INSERT INTO $wpdb->global_options ( option_name, option_value, autoload ) VALUES " . implode( ', ', $insert ) );

All output should be run through an escaping function (like esc_html_e() or esc_attr_e()), found '_e'.
Open

                _e( 'User added.' );

All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$classes'.
Open

        echo '<td class="', $classes, ' has-row-actions" ', $data, '>';

Detected usage of a non-validated input variable: $_SERVER
Open

        if ( 'POST' == $_SERVER['REQUEST_METHOD'] && isset( $_POST['widget_id'] ) ) {

All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'network_admin_url'.
Open

        <form action="<?php echo network_admin_url( 'users.php' ); ?>" method="get">

Overriding WordPress globals is prohibited. Found assignment to $submenu
Open

    $submenu = array();

Overriding WordPress globals is prohibited. Found assignment to $pagenow
Open

        $pagenow = trim( $pagenow, '/' );

Detected usage of a non-sanitized input variable: $_REQUEST
Open

        $usersearch = isset( $_REQUEST['s'] ) ? wp_unslash( trim( $_REQUEST['s'] ) ) : '';

Detected usage of a non-sanitized input variable: $_REQUEST
Open

            $args['order'] = $_REQUEST['order'];

Overriding WordPress globals is prohibited. Found assignment to $wp_dashboard_control_callbacks
Open

        $wp_dashboard_control_callbacks = array();

Missing wp_unslash() before sanitization.
Open

        preg_match( '#/wp-admin/global/?(.*?)$#i', $_SERVER['PHP_SELF'], $self_matches );

Overriding WordPress globals is prohibited. Found assignment to $pagenow
Open

            $pagenow = 'index.php';

Missing wp_unslash() before sanitization.
Open

            $args['order'] = $_REQUEST['order'];

All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$network'.
Open

            echo '<span class="network-' . $network->id . '" >';

Overriding WordPress globals is prohibited. Found assignment to $pagenow
Open

            $pagenow = strtolower( $self_matches[1] );

A gettext call containing placeholders was found, but was not accompanied by a "translators:" comment on the line above to clarify the meaning of the placeholders.
Open

    $blogname = sprintf( __( 'Global Admin: %s' ), esc_html( get_global_option( 'global_name' ) ) );
Severity
Category
Status
Source
Language