Codebase Security Scan Report
Generated: 2026-03-07 10:00:38
Executive Summary
| Metric | Value |
|---|---|
| Projects Scanned | 64 |
| Files Scanned | 23360 |
| Total Issues | 4071 |
| CRITICAL | 3410 |
| HIGH | 116 |
| MEDIUM | 545 |
| LOW | 0 |
Critical Findings
3410 Critical Issues Require Immediate Attention
1. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:282
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Event ID: " . $data['event_id'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:283
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Nature: " . $data['nature'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:284
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Location: " . $data['location'] . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
4. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:287
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " Received: " . $data['call_received_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
5. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:288
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " Dispatch: " . $data['first_dispatch_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
6. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:289
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " En-Route: " . $data['first_enroute_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
7. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:290
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " Arrive: " . $data['first_arrive_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
8. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " Clear: " . $data['last_clear_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
9. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:298
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " " . $unit['unit_id'] . ":\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
10. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:299
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['dispatched']) $output .= " Dispatched: " . $unit['dispatched'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
11. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:300
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['enroute']) $output .= " En-Route: " . $unit['enroute'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
12. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:301
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['arrived']) $output .= " Arrived: " . $unit['arrived'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
13. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['at_hospital']) $output .= " At Hospital: " . $unit['at_hospital'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
14. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['clear']) $output .= " Clear: " . $unit['clear'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
15. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:310
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " " . $note['timestamp'] . " - " . $service . $note['note'] . " (" . $note['user'] . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
16. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:282
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Event ID: " . $data['event_id'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
17. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:283
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Nature: " . $data['nature'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
18. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:284
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Location: " . $data['location'] . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
19. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:287
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " Received: " . $data['call_received_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
20. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:288
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " Dispatch: " . $data['first_dispatch_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
21. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:289
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " En-Route: " . $data['first_enroute_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
22. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:290
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " Arrive: " . $data['first_arrive_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
23. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " Clear: " . $data['last_clear_time'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
24. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:298
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " " . $unit['unit_id'] . ":\n";
Recommendation: Use $wpdb->prepare() with placeholders
25. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:299
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['dispatched']) $output .= " Dispatched: " . $unit['dispatched'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
26. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:300
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['enroute']) $output .= " En-Route: " . $unit['enroute'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
27. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:301
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['arrived']) $output .= " Arrived: " . $unit['arrived'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
28. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['at_hospital']) $output .= " At Hospital: " . $unit['at_hospital'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
29. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ($unit['clear']) $output .= " Clear: " . $unit['clear'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
30. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/class-cxq-email-relay-pdf-parser.php:310
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= " " . $note['timestamp'] . " - " . $service . $note['note'] . " (" . $note['user'] . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders
31. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
32. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
33. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
34. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
35. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
36. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
37. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
38. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
39. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-email-relay/includes/admin/class-cxq-email-relay-admin.php:569
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$senders = $wpdb->get_results("SELECT * FROM {$table} ORDER BY sender_pattern ASC");
Recommendation: Use $wpdb->prepare() with placeholders
40. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-board-docs/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
41. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-board-docs/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
42. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-board-docs/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
43. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-board-docs/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
44. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-board-docs/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
45. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-board-docs/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
46. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-board-docs/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
47. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-board-docs/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
48. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-gateway-stripe/includes/class-wc-stripe-logger.php:61
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$log_entry .= '====Start Log ' . $formatted_start_time . '====' . "\n" . $message . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
49. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-gateway-stripe/includes/class-wc-stripe-logger.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$log_entry .= '====Start Log====' . "\n" . $message . "\n" . '====End Log====' . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
50. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-gateway-stripe/includes/class-wc-stripe-logger.php:61
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$log_entry .= '====Start Log ' . $formatted_start_time . '====' . "\n" . $message . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
51. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-gateway-stripe/includes/class-wc-stripe-logger.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$log_entry .= '====Start Log====' . "\n" . $message . "\n" . '====End Log====' . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
52. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-gateway-stripe/includes/class-wc-stripe-account.php:491
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
WC_Stripe_Logger::log( "Failed to check/reconfigure webhooks for {$mode} mode: " . $e->getMessage() );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
53. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-gateway-stripe/includes/class-wc-stripe-account.php:491
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
WC_Stripe_Logger::log( "Failed to check/reconfigure webhooks for {$mode} mode: " . $e->getMessage() );
Recommendation: Use $wpdb->prepare() with placeholders
54. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/cache.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
new dBug2("HTTP request failed. Error was: " . $error['message']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
55. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/cache.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
new dBug2("HTTP request failed. Error was: " . $error['message']);
Recommendation: Use $wpdb->prepare() with placeholders
56. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
57. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
58. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
59. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
60. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
61. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
62. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
63. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
64. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
65. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
66. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
67. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
68. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:313
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
69. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
70. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
71. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
72. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
73. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
74. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
75. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
76. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
77. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
78. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
79. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
80. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
81. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
82. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:313
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
83. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/dBug.class.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
84. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/includes/google-api-php-client-main/src/Http/Batch.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content ? "\n" . $content : ''
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
85. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/includes/google-api-php-client-main/src/Http/Batch.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content ? "\n" . $content : ''
Recommendation: Use $wpdb->prepare() with placeholders
86. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/includes/google-api-php-client-main/src/Utils/UriTemplate.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$values[] = $pkey . "=" . $pvalue; // Explode triggers = combine.
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
87. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/includes/google-api-php-client-main/src/Utils/UriTemplate.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$values[] = $pkey . "=" . $pvalue; // Explode triggers = combine.
Recommendation: Use $wpdb->prepare() with placeholders
88. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/includes/google-api-php-client--PHP7.4/src/Http/Batch.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content ? "\n".$content : ''
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
89. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/includes/google-api-php-client--PHP7.4/src/Http/Batch.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content ? "\n".$content : ''
Recommendation: Use $wpdb->prepare() with placeholders
90. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/includes/google-api-php-client--PHP7.4/src/Utils/UriTemplate.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$values[] = $pkey . "=" . $pvalue; // Explode triggers = combine.
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
91. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-cashdrawer/includes/google-api-php-client--PHP7.4/src/Utils/UriTemplate.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$values[] = $pkey . "=" . $pvalue; // Explode triggers = combine.
Recommendation: Use $wpdb->prepare() with placeholders
92. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/uninstall.php:37
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS " . $wpdb->prefix . "wcpv_commissions" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
93. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/uninstall.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS " . $wpdb->prefix . "wcpv_per_product_shipping_rules" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
94. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/uninstall.php:37
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS " . $wpdb->prefix . "wcpv_commissions" );
Recommendation: Use $wpdb->prepare() with placeholders
95. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/uninstall.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS " . $wpdb->prefix . "wcpv_per_product_shipping_rules" );
Recommendation: Use $wpdb->prepare() with placeholders
96. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-commission.php:177
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$commissions = $wpdb->get_results( "SELECT DISTINCT `id`, `order_id`, `order_item_id`, `vendor_id`, `total_commission_amount` FROM {$this->table_name} WHERE `id` IN ( $commission_ids ) AND `commission_status` = 'unpaid'" );
Recommendation: Use $wpdb->prepare() with placeholders
97. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-commission.php:229
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$commissions = $wpdb->get_results( "SELECT DISTINCT `id`, `order_id` FROM {$this->table_name} WHERE `commission_status` = 'unpaid'" );
Recommendation: Use $wpdb->prepare() with placeholders
98. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-commission.php:262
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$commissions = $wpdb->get_results( "SELECT * FROM {$this->table_name} WHERE `commission_status` = 'unpaid'" );
Recommendation: Use $wpdb->prepare() with placeholders
99. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-logger.php:41
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$log_entry = '====Start Log ' . $formatted_start_time . '====' . "\n" . $message . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
100. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-logger.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$log_entry = '====Start Log====' . "\n" . $message . "\n" . '====End Log====' . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
101. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-logger.php:41
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$log_entry = '====Start Log ' . $formatted_start_time . '====' . "\n" . $message . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
102. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-logger.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$log_entry = '====Start Log====' . "\n" . $message . "\n" . '====End Log====' . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
103. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-install.php:295
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wcpv_commissions DROP PRIMARY KEY, ADD `id` bigint(20) NOT NULL PRIMARY KEY AUTO_INCREMENT;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
104. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/class-wc-product-vendors-install.php:304
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wcpv_per_product_shipping_rules DROP PRIMARY KEY, ADD `rule_id` bigint(20) NOT NULL PRIMARY KEY AUTO_INCREMENT;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
105. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/admin/class-wc-product-vendors-vendor-dashboard.php:270
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<?php printf( __( "%s top seller this month (sold %d)", 'woocommerce-product-vendors' ), "<strong>" . $top_seller_title . "</strong>", $top_seller_qty ); ?>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
106. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/admin/class-wc-product-vendors-vendor-dashboard.php:270
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<?php printf( __( "%s top seller this month (sold %d)", 'woocommerce-product-vendors' ), "<strong>" . $top_seller_title . "</strong>", $top_seller_qty ); ?>
Recommendation: Use $wpdb->prepare() with placeholders
107. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/sample/common.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "http://localhost" . $relativePath;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
108. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/sample/common.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "http://localhost" . $relativePath;
Recommendation: Use $wpdb->prepare() with placeholders
109. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConfig.php:238
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new PayPalConfigurationException("Invalid proxy configuration " . $proxy);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
110. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConfig.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->curlOptions[CURLOPT_PROXY] .= ":" . $urlParts["port"];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
111. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConfig.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->curlOptions[CURLOPT_PROXYUSERPWD] = $urlParts["user"] . ":" . $urlParts["pass"];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
112. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConfig.php:238
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new PayPalConfigurationException("Invalid proxy configuration " . $proxy);
Recommendation: Use $wpdb->prepare() with placeholders
113. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConfig.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->curlOptions[CURLOPT_PROXY] .= ":" . $urlParts["port"];
Recommendation: Use $wpdb->prepare() with placeholders
114. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConfig.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->curlOptions[CURLOPT_PROXYUSERPWD] = $urlParts["user"] . ":" . $urlParts["pass"];
Recommendation: Use $wpdb->prepare() with placeholders
115. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConnection.php:145
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logger->debug(($data && $data != '' ? "Request Data\t\t: " . $data : "No Request Payload") . "\n" . str_repeat('-', 128) . "\n");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
116. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConnection.php:146
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logger->info("Response Status \t: " . $httpStatus);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
117. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConnection.php:160
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logger->error("Got Http response code $httpStatus when accessing {$this->httpConfig->getUrl()}. " . $result);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
118. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConnection.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logger->debug(($result && $result != '' ? "Response Data \t: " . $result : "No Response Body") . "\n\n" . str_repeat('=', 128) . "\n");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
119. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConnection.php:145
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logger->debug(($data && $data != '' ? "Request Data\t\t: " . $data : "No Request Payload") . "\n" . str_repeat('-', 128) . "\n");
Recommendation: Use $wpdb->prepare() with placeholders
120. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConnection.php:146
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logger->info("Response Status \t: " . $httpStatus);
Recommendation: Use $wpdb->prepare() with placeholders
121. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConnection.php:160
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logger->error("Got Http response code $httpStatus when accessing {$this->httpConfig->getUrl()}. " . $result);
Recommendation: Use $wpdb->prepare() with placeholders
122. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Core/PayPalHttpConnection.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logger->debug(($result && $result != '' ? "Response Data \t: " . $result : "No Response Body") . "\n\n" . str_repeat('=', 128) . "\n");
Recommendation: Use $wpdb->prepare() with placeholders
123. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Common/ReflectionUtil.php:102
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new \RuntimeException("Property type of " . $class . "::{$propertyName} cannot be resolved");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
124. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Common/ReflectionUtil.php:102
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new \RuntimeException("Property type of " . $class . "::{$propertyName} cannot be resolved");
Recommendation: Use $wpdb->prepare() with placeholders
125. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Api/OpenIdTokeninfo.php:200
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
'Authorization' => 'Basic ' . base64_encode($clientId . ":" . $clientSecret)
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
126. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Api/OpenIdTokeninfo.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
'Authorization' => 'Basic ' . base64_encode($clientId . ":" . $clientSecret)
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
127. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Api/OpenIdTokeninfo.php:200
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
'Authorization' => 'Basic ' . base64_encode($clientId . ":" . $clientSecret)
Recommendation: Use $wpdb->prepare() with placeholders
128. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Api/OpenIdTokeninfo.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
'Authorization' => 'Basic ' . base64_encode($clientId . ":" . $clientSecret)
Recommendation: Use $wpdb->prepare() with placeholders
129. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Api/OpenIdUserinfo.php:527
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
'Authorization' => "Bearer " . $params['access_token'],
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
130. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Api/OpenIdUserinfo.php:527
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
'Authorization' => "Bearer " . $params['access_token'],
Recommendation: Use $wpdb->prepare() with placeholders
131. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Handler/RestHandler.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$httpConfig->addHeader('Authorization', "Bearer " . $credential->getAccessToken($config), false);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
132. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Handler/RestHandler.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$httpConfig->addHeader('Authorization', "Bearer " . $credential->getAccessToken($config), false);
Recommendation: Use $wpdb->prepare() with placeholders
133. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Handler/OauthHandler.php:57
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Authorization" => "Basic " . base64_encode($options['clientId'] . ":" . $options['clientSecret']),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
134. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Handler/OauthHandler.php:57
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Authorization" => "Basic " . base64_encode($options['clientId'] . ":" . $options['clientSecret']),
Recommendation: Use $wpdb->prepare() with placeholders
135. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Log/PayPalLogger.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("[" . date('d-m-Y h:i:s') . "] " . $this->loggerName . " : " . strtoupper($level) . ": $message\n", 3, $this->loggerFile);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
136. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/gateways/paypal-php-sdk/paypal/rest-api-sdk-php/lib/PayPal/Log/PayPalLogger.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("[" . date('d-m-Y h:i:s') . "] " . $this->loggerName . " : " . strtoupper($level) . ": $message\n", 3, $this->loggerFile);
Recommendation: Use $wpdb->prepare() with placeholders
137. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/admin/updates/wc-product-vendors-update-2.0.0.php:141
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->prefix}woocommerce_order_itemmeta WHERE `meta_key` = '_commission'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
138. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/admin/reports/store/class-wc-product-vendors-store-report-sales-by-date.php:107
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql .= " AND DATE( commission.order_date ) BETWEEN '" . $start_date . "' AND '" . $end_date . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
139. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/admin/reports/store/class-wc-product-vendors-store-report-sales-by-date.php:341
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql .= " AND DATE( commission.order_date ) BETWEEN '" . $start_date . "' AND '" . $end_date . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
140. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/admin/reports/store/class-wc-product-vendors-store-report-sales-by-date.php:107
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql .= " AND DATE( commission.order_date ) BETWEEN '" . $start_date . "' AND '" . $end_date . "'";
Recommendation: Use $wpdb->prepare() with placeholders
141. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/includes/admin/reports/store/class-wc-product-vendors-store-report-sales-by-date.php:341
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql .= " AND DATE( commission.order_date ) BETWEEN '" . $start_date . "' AND '" . $end_date . "'";
Recommendation: Use $wpdb->prepare() with placeholders
142. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/product-added-notice.php:13
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
143. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/product-added-notice.php:13
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
144. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/vendor-registration-email-to-admin.php:13
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
145. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/vendor-registration-email-to-admin.php:13
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
146. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/order-note-to-customer.php:13
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
147. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/order-note-to-customer.php:13
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
148. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/cancelled-order-email-to-vendor.php:15
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
149. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/cancelled-order-email-to-vendor.php:15
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
150. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/vendor-approval.php:20
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
151. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/vendor-approval.php:20
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
152. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/vendor-registration-email-to-vendor.php:13
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
153. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/vendor-registration-email-to-vendor.php:13
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
154. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/order-fulfill-status-to-admin.php:15
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
155. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/order-fulfill-status-to-admin.php:15
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
156. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/order-email-to-vendor.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
157. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-vendors/templates/emails/plain/order-email-to-vendor.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "= " . $email_heading . " =\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
158. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceURLHoover.php:162
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "INSERT INTO " . $this->table . " (owner, host, path, hostKey) VALUES ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
159. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceURLHoover.php:261
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->errorMsg = "Invalid data length received from Wordfence server: " . $dataLen;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
160. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceURLHoover.php:267
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->errorMsg = "Wordfence server responded with an error. HTTP code " . $resp['code'] . " and data: " . $resp['data'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
161. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceURLHoover.php:162
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "INSERT INTO " . $this->table . " (owner, host, path, hostKey) VALUES ";
Recommendation: Use $wpdb->prepare() with placeholders
162. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceURLHoover.php:261
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->errorMsg = "Invalid data length received from Wordfence server: " . $dataLen;
Recommendation: Use $wpdb->prepare() with placeholders
163. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceURLHoover.php:267
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->errorMsg = "Wordfence server responded with an error. HTTP code " . $resp['code'] . " and data: " . $resp['data'];
Recommendation: Use $wpdb->prepare() with placeholders
164. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:145
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wordfence::status(10, 'info', "SUM_PAIDONLY:" . $message);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
165. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:150
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wordfence::status(10, 'info', "SUM_DISABLED:" . $message);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
166. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:375
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $this->getDB()->querySelect("SELECT id from " . $this->issuesTable . " where status='ignoreP' or status='ignoreC'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
167. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:383
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("delete from " . $this->issuesTable . " where status='ignoreP' or status='ignoreC'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
168. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:411
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("update " . $this->issuesTable . " set status='ignoreC' where status='new'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
169. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:564
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("delete from " . $this->issuesTable . " where id=%d", $id);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
170. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:566
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("update " . $this->issuesTable . " set status='%s' where id=%d", $status, $id);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
171. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:577
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rec = $this->getDB()->querySingleRec("select * from " . $this->issuesTable . " where id=%d", $id);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
172. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:615
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q1 = $this->getDB()->querySelect("SELECT *, {$sortTagging} AS sortTag FROM " . $this->issuesTable . " WHERE status = 'new' ORDER BY severity DESC, sortTag ASC, type ASC, time DESC LIMIT %d,%d", $offset, $limit);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
173. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:616
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q2 = $this->getDB()->querySelect("SELECT *, {$sortTagging} AS sortTag FROM " . $this->issuesTable . " WHERE status = 'ignoreP' OR status = 'ignoreC' ORDER BY severity DESC, sortTag ASC, type ASC, time DESC LIMIT %d,%d", $ignoredOffset, $ignoredLimit);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
174. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:628
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Issue has bad status: " . $i['status']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
175. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:704
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $this->getDB()->querySingle("select COUNT(*) from " . $this->issuesTable . " WHERE status = 'new'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
176. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:707
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $this->getDB()->querySingle("select COUNT(*) from " . $this->pendingIssuesTable . " WHERE status = 'new'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
177. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:710
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $this->getDB()->querySingle("select MAX(lastUpdated) from " . $this->issuesTable);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
178. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:145
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wordfence::status(10, 'info', "SUM_PAIDONLY:" . $message);
Recommendation: Use $wpdb->prepare() with placeholders
179. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:150
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wordfence::status(10, 'info', "SUM_DISABLED:" . $message);
Recommendation: Use $wpdb->prepare() with placeholders
180. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:375
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $this->getDB()->querySelect("SELECT id from " . $this->issuesTable . " where status='ignoreP' or status='ignoreC'");
Recommendation: Use $wpdb->prepare() with placeholders
181. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:383
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("delete from " . $this->issuesTable . " where status='ignoreP' or status='ignoreC'");
Recommendation: Use $wpdb->prepare() with placeholders
182. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:411
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("update " . $this->issuesTable . " set status='ignoreC' where status='new'");
Recommendation: Use $wpdb->prepare() with placeholders
183. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:564
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("delete from " . $this->issuesTable . " where id=%d", $id);
Recommendation: Use $wpdb->prepare() with placeholders
184. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:566
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("update " . $this->issuesTable . " set status='%s' where id=%d", $status, $id);
Recommendation: Use $wpdb->prepare() with placeholders
185. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:577
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rec = $this->getDB()->querySingleRec("select * from " . $this->issuesTable . " where id=%d", $id);
Recommendation: Use $wpdb->prepare() with placeholders
186. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:615
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q1 = $this->getDB()->querySelect("SELECT *, {$sortTagging} AS sortTag FROM " . $this->issuesTable . " WHERE status = 'new' ORDER BY severity DESC, sortTag ASC, type ASC, time DESC LIMIT %d,%d", $offset, $limit);
Recommendation: Use $wpdb->prepare() with placeholders
187. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:616
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q2 = $this->getDB()->querySelect("SELECT *, {$sortTagging} AS sortTag FROM " . $this->issuesTable . " WHERE status = 'ignoreP' OR status = 'ignoreC' ORDER BY severity DESC, sortTag ASC, type ASC, time DESC LIMIT %d,%d", $ignoredOffset, $ignoredLimit);
Recommendation: Use $wpdb->prepare() with placeholders
188. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:628
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Issue has bad status: " . $i['status']);
Recommendation: Use $wpdb->prepare() with placeholders
189. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:704
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $this->getDB()->querySingle("select COUNT(*) from " . $this->issuesTable . " WHERE status = 'new'");
Recommendation: Use $wpdb->prepare() with placeholders
190. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:707
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $this->getDB()->querySingle("select COUNT(*) from " . $this->pendingIssuesTable . " WHERE status = 'new'");
Recommendation: Use $wpdb->prepare() with placeholders
191. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfIssues.php:710
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $this->getDB()->querySingle("select MAX(lastUpdated) from " . $this->issuesTable);
Recommendation: Use $wpdb->prepare() with placeholders
192. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfCache.php:98
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::$lastRecursiveDeleteError = "Could not delete file " . $dir . "/" . $file . " : " . wfUtils::getLastError();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
193. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfCache.php:98
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::$lastRecursiveDeleteError = "Could not delete file " . $dir . "/" . $file . " : " . wfUtils::getLastError();
Recommendation: Use $wpdb->prepare() with placeholders
194. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfSchema.php:276
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->db->queryWrite("CREATE TABLE IF NOT EXISTS " . wfDB::networkTable($table) . " " . $def);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
195. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfSchema.php:276
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->db->queryWrite("CREATE TABLE IF NOT EXISTS " . wfDB::networkTable($table) . " " . $def);
Recommendation: Use $wpdb->prepare() with placeholders
196. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:87
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$table} WHERE `expiration` < UNIX_TIMESTAMP()");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
197. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:191
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("insert into " . $this->loginsTable . " (hitID, ctime, fail, action, username, userID, IP, UA) values (%d, %f, %d, '%s', '%s', %s, {$ipHex}, '%s')",
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
198. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:707
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->currentRequest->actionDescription = "blocked: " . $reason;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
199. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:763
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("insert into " . $this->statusTable . " (ctime, level, type, msg) values (%s, %d, '%s', '%s')", sprintf('%.6f', microtime(true)), $level, $type, $msg);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
200. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:767
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lastCtime = $this->getDB()->querySingle("select ctime from " . $this->statusTable . " order by ctime desc limit 1000,1");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
201. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:772
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $this->getDB()->querySelect("select ctime, level, type, msg from " . $this->statusTable . " where ctime > %f order by ctime asc", $lastCtime);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
202. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:782
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $this->getDB()->querySelect("select ctime, level, type, msg from " . $this->statusTable . " where level = 10 order by ctime desc limit 100");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
203. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:191
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("insert into " . $this->loginsTable . " (hitID, ctime, fail, action, username, userID, IP, UA) values (%d, %f, %d, '%s', '%s', %s, {$ipHex}, '%s')",
Recommendation: Use $wpdb->prepare() with placeholders
204. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:707
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->currentRequest->actionDescription = "blocked: " . $reason;
Recommendation: Use $wpdb->prepare() with placeholders
205. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:763
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->getDB()->queryWrite("insert into " . $this->statusTable . " (ctime, level, type, msg) values (%s, %d, '%s', '%s')", sprintf('%.6f', microtime(true)), $level, $type, $msg);
Recommendation: Use $wpdb->prepare() with placeholders
206. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:767
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lastCtime = $this->getDB()->querySingle("select ctime from " . $this->statusTable . " order by ctime desc limit 1000,1");
Recommendation: Use $wpdb->prepare() with placeholders
207. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:772
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $this->getDB()->querySelect("select ctime, level, type, msg from " . $this->statusTable . " where ctime > %f order by ctime asc", $lastCtime);
Recommendation: Use $wpdb->prepare() with placeholders
208. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfLog.php:782
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $this->getDB()->querySelect("select ctime, level, type, msg from " . $this->statusTable . " where level = 10 order by ctime desc limit 100");
Recommendation: Use $wpdb->prepare() with placeholders
209. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:1208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q1 = $wfdb->querySelect("select ID from " . $blog['table'] . " where post_type IN ('page', 'post') and post_status = 'publish'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
210. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:1362
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q1 = $wfdb->querySelect("select comment_ID from " . $blog['table'] . " where comment_approved=1 and not comment_type = 'order_note'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
211. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:1421
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$comment = $wfdb->querySingleRec("select comment_ID, comment_date, comment_type, comment_author, comment_author_url, comment_content from " . $blog['table'] . " where comment_ID=%d", $commentID);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
212. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:1566
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "select ID from " . $wpdb->users;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
213. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:2359
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q = $wfdb->querySelect("SELECT option_name, option_value FROM " . $blog['table'] . " WHERE option_name REGEXP '^td_[0-9]+$' OR option_name = '%s'", TD_THEME_OPTIONS_NAME);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
214. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:2361
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q = $wfdb->querySelect("SELECT option_name, option_value FROM " . $blog['table'] . " WHERE option_name REGEXP '^td_[0-9]+$'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
215. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:2737
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pluginFullDir = "wp-content/plugins/" . $pluginDir;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
216. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:1208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q1 = $wfdb->querySelect("select ID from " . $blog['table'] . " where post_type IN ('page', 'post') and post_status = 'publish'");
Recommendation: Use $wpdb->prepare() with placeholders
217. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:1362
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q1 = $wfdb->querySelect("select comment_ID from " . $blog['table'] . " where comment_approved=1 and not comment_type = 'order_note'");
Recommendation: Use $wpdb->prepare() with placeholders
218. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:1421
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$comment = $wfdb->querySingleRec("select comment_ID, comment_date, comment_type, comment_author, comment_author_url, comment_content from " . $blog['table'] . " where comment_ID=%d", $commentID);
Recommendation: Use $wpdb->prepare() with placeholders
219. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:1566
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "select ID from " . $wpdb->users;
Recommendation: Use $wpdb->prepare() with placeholders
220. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:2359
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q = $wfdb->querySelect("SELECT option_name, option_value FROM " . $blog['table'] . " WHERE option_name REGEXP '^td_[0-9]+$' OR option_name = '%s'", TD_THEME_OPTIONS_NAME);
Recommendation: Use $wpdb->prepare() with placeholders
221. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:2361
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$q = $wfdb->querySelect("SELECT option_name, option_value FROM " . $blog['table'] . " WHERE option_name REGEXP '^td_[0-9]+$'");
Recommendation: Use $wpdb->prepare() with placeholders
222. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfScanEngine.php:2737
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pluginFullDir = "wp-content/plugins/" . $pluginDir;
Recommendation: Use $wpdb->prepare() with placeholders
223. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:1770
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("$mem at " . $caller['file'] . " line " . $caller['line']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
224. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:1776
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Caller for " . $caller['file'] . " line " . $caller['line'] . " is " . $c2['file'] . ' line ' . $c2['line']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
225. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2046
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row = $db->querySingleRec("select IP, ctime, failed, city, region, countryName, countryCode, lat, lon, unix_timestamp() - ctime as age from " . $locsTable . " where IP={$ipHex}");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
226. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2050
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db->queryWrite("delete from " . $locsTable . " where IP={$ipHex}");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
227. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2102
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db->queryWrite("insert IGNORE into " . $locsTable . " (IP, ctime, failed) values ({$ipHex}, unix_timestamp(), 1)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
228. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2109
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db->queryWrite("insert IGNORE into " . $locsTable . " (IP, ctime, failed, city, region, countryName, countryCode, lat, lon) values ({$ipHex}, unix_timestamp(), 0, '%s', '%s', '%s', '%s', %s, %s)",
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
229. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$host = $db->querySingle("select host from " . $reverseTable . " where IP={$ipHex} and unix_timestamp() - lastUpdate < %d", WORDFENCE_REVERSE_LOOKUP_CACHE_TIME);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
230. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db->queryWrite("insert into " . $reverseTable . " (IP, host, lastUpdate) values ({$ipHex}, '%s', unix_timestamp()) ON DUPLICATE KEY UPDATE host='%s', lastUpdate=unix_timestamp()", $host, $host);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
231. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2648
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
file_put_contents($htaccess, trim($code) . "\n" . $content, LOCK_EX);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
232. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:1770
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("$mem at " . $caller['file'] . " line " . $caller['line']);
Recommendation: Use $wpdb->prepare() with placeholders
233. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:1776
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Caller for " . $caller['file'] . " line " . $caller['line'] . " is " . $c2['file'] . ' line ' . $c2['line']);
Recommendation: Use $wpdb->prepare() with placeholders
234. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2046
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row = $db->querySingleRec("select IP, ctime, failed, city, region, countryName, countryCode, lat, lon, unix_timestamp() - ctime as age from " . $locsTable . " where IP={$ipHex}");
Recommendation: Use $wpdb->prepare() with placeholders
235. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2050
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db->queryWrite("delete from " . $locsTable . " where IP={$ipHex}");
Recommendation: Use $wpdb->prepare() with placeholders
236. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2102
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db->queryWrite("insert IGNORE into " . $locsTable . " (IP, ctime, failed) values ({$ipHex}, unix_timestamp(), 1)");
Recommendation: Use $wpdb->prepare() with placeholders
237. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2109
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db->queryWrite("insert IGNORE into " . $locsTable . " (IP, ctime, failed, city, region, countryName, countryCode, lat, lon) values ({$ipHex}, unix_timestamp(), 0, '%s', '%s', '%s', '%s', %s, %s)",
Recommendation: Use $wpdb->prepare() with placeholders
238. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$host = $db->querySingle("select host from " . $reverseTable . " where IP={$ipHex} and unix_timestamp() - lastUpdate < %d", WORDFENCE_REVERSE_LOOKUP_CACHE_TIME);
Recommendation: Use $wpdb->prepare() with placeholders
239. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db->queryWrite("insert into " . $reverseTable . " (IP, host, lastUpdate) values ({$ipHex}, '%s', unix_timestamp()) ON DUPLICATE KEY UPDATE host='%s', lastUpdate=unix_timestamp()", $host, $host);
Recommendation: Use $wpdb->prepare() with placeholders
240. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfUtils.php:2648
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
file_put_contents($htaccess, trim($code) . "\n" . $content, LOCK_EX);
Recommendation: Use $wpdb->prepare() with placeholders
241. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfDB.php:231
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$whereExpressions[] = "{$column} = " . $getBinding($value);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
242. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfDB.php:231
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$whereExpressions[] = "{$column} = " . $getBinding($value);
Recommendation: Use $wpdb->prepare() with placeholders
243. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:501
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$configTable} ADD COLUMN autoload ENUM('no', 'yes') NOT NULL DEFAULT 'yes'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
244. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:502
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("UPDATE {$configTable} SET autoload = 'no' WHERE name = 'wfsd_engine' OR name LIKE 'wordfence_chunked_%'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
245. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:691
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$snipCacheTable}` ADD `type` INT UNSIGNED NOT NULL DEFAULT '0'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
246. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:692
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$snipCacheTable}` ADD INDEX (`type`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
247. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:705
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$fileModsTable} ADD COLUMN stoppedOnSignature VARCHAR(255) NOT NULL DEFAULT ''");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
248. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:706
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$fileModsTable} ADD COLUMN stoppedOnPosition INT UNSIGNED NOT NULL DEFAULT '0'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
249. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:718
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$blockedIPLogTable} ADD blockType VARCHAR(50) NOT NULL DEFAULT 'generic'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
250. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:719
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$blockedIPLogTable} DROP PRIMARY KEY");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
251. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:720
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$blockedIPLogTable} ADD PRIMARY KEY (IP, unixday, blockType)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
252. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:741
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$fileModsTable} ADD COLUMN `SHAC` BINARY(32) NOT NULL DEFAULT '' AFTER `newMD5`");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
253. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:742
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$fileModsTable} ADD COLUMN `isSafeFile` VARCHAR(1) NOT NULL DEFAULT '?' AFTER `stoppedOnPosition`");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
254. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:755
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$hooverTable} CHANGE `hostKey` `hostKey` VARBINARY(124) NULL DEFAULT NULL");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
255. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:890
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$issuesTable}` ADD `lastUpdated` INT UNSIGNED NOT NULL AFTER `time`");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
256. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:891
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$issuesTable}` ADD INDEX (`lastUpdated`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
257. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:892
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$issuesTable}` ADD INDEX (`status`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
258. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:893
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$issuesTable}` ADD INDEX (`ignoreP`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
259. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:894
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$issuesTable}` ADD INDEX (`ignoreC`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
260. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:895
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("UPDATE `{$issuesTable}` SET `lastUpdated` = `time` WHERE `lastUpdated` = 0");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
261. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:897
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$pendingIssuesTable}` ADD `lastUpdated` INT UNSIGNED NOT NULL AFTER `time`");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
262. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:898
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$pendingIssuesTable}` ADD INDEX (`lastUpdated`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
263. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:899
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$pendingIssuesTable}` ADD INDEX (`status`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
264. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:900
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$pendingIssuesTable}` ADD INDEX (`ignoreP`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
265. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:901
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$pendingIssuesTable}` ADD INDEX (`ignoreC`)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
266. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:1103
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM `{$knownFilesTable}`");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
267. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:1104
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$knownFilesTable}` ADD COLUMN wordpress_path TEXT NOT NULL");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
268. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:1109
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM `{$fileModsTable}`");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
269. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:1110
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$fileModsTable}` ADD COLUMN real_path TEXT NOT NULL AFTER filename");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
270. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:1114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$fileModsTable} ALTER COLUMN oldMD5 SET DEFAULT ''");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
271. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:2691
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<input type=\"hidden\" id=\"wordfence_twoFactorUser\" name=\"wordfence_twoFactorUser\" value=\"" . $userID . "\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
272. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:2692
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<input type=\"hidden\" id=\"wordfence_twoFactorNonce\" name=\"wordfence_twoFactorNonce\" value=\"" . $twoFactorNonce . "\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
273. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:3565
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$body = "<style>.screen-reader-text{ display: none !important; }</style>This email is the diagnostic from " . site_url() . ".\nThe IP address that requested this was: " . wfUtils::getIP() . "\nTicket Number/Forum Username: " . $_POST['ticket'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
274. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:5346
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (@file_put_contents($htaccess, trim($content . "\n" . $change), LOCK_EX) === false) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
275. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:5658
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Tested up to " . $finalUsage . " megabytes.\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
276. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:5965
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$table} WHERE `timestamp` < DATE_SUB(NOW(), INTERVAL 1 DAY)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
277. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:6946
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
add_submenu_page("Wordfence", $message, "<strong id=\"wfMenuCallout\" style=\"color: #FCB214;\">" . $message . "</strong>", "activate_plugins", $slug, 'wordfence::_menu_noop');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
278. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:7764
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (file_put_contents($htaccessPath, "# Added by Wordfence " . date('r') . "\nOptions -Indexes\n\n" . $fileContents, LOCK_EX)) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
279. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8250
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$installError = "<p>" . $e->getMessage() . "</p>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
280. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8432
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$installError = "<p>" . $e->getMessage() . "</p>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
281. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8718
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "\n" . $date . $ip . $attackMessage;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
282. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8751
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"LIMIT " . $limit,
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
283. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8765
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"ORDER BY id LIMIT " . $limit,
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
284. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:9926
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$updatedHtaccessContent = $beforeWAFBlock . $beforeMod_php . $php5Matches[0][0] . "\n" . $php7Matches[0][0] . "\n" . sprintf("<IfModule mod_php.c>\n\tphp_value auto_prepend_file '%s'\n</IfModule>", $php5Matches[1][0] /* already escaped */) . $afterMod_php . $afterWAFBlock;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
285. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:10095
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$htaccessContent .= "\n\n" . $autoPrependDirective;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
286. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:10136
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$userIniContent .= "\n\n" . $autoPrependIni;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
287. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:829
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$advancedBlocks = $wpdb->get_results("SELECT * FROM {$advancedBlocksTable}", ARRAY_A);
Recommendation: Use $wpdb->prepare() with placeholders
288. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:845
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$throttles = $wpdb->get_results("SELECT * FROM {$throttleTable}", ARRAY_A);
Recommendation: Use $wpdb->prepare() with placeholders
289. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:858
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lockouts = $wpdb->get_results("SELECT * FROM {$lockoutTable}", ARRAY_A);
Recommendation: Use $wpdb->prepare() with placeholders
290. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:2691
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<input type=\"hidden\" id=\"wordfence_twoFactorUser\" name=\"wordfence_twoFactorUser\" value=\"" . $userID . "\">
Recommendation: Use $wpdb->prepare() with placeholders
291. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:2692
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<input type=\"hidden\" id=\"wordfence_twoFactorNonce\" name=\"wordfence_twoFactorNonce\" value=\"" . $twoFactorNonce . "\">
Recommendation: Use $wpdb->prepare() with placeholders
292. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:3565
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$body = "<style>.screen-reader-text{ display: none !important; }</style>This email is the diagnostic from " . site_url() . ".\nThe IP address that requested this was: " . wfUtils::getIP() . "\nTicket Number/Forum Username: " . $_POST['ticket'];
Recommendation: Use $wpdb->prepare() with placeholders
293. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:5346
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (@file_put_contents($htaccess, trim($content . "\n" . $change), LOCK_EX) === false) {
Recommendation: Use $wpdb->prepare() with placeholders
294. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:5658
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Tested up to " . $finalUsage . " megabytes.\n";
Recommendation: Use $wpdb->prepare() with placeholders
295. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:6946
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
add_submenu_page("Wordfence", $message, "<strong id=\"wfMenuCallout\" style=\"color: #FCB214;\">" . $message . "</strong>", "activate_plugins", $slug, 'wordfence::_menu_noop');
Recommendation: Use $wpdb->prepare() with placeholders
296. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:7764
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (file_put_contents($htaccessPath, "# Added by Wordfence " . date('r') . "\nOptions -Indexes\n\n" . $fileContents, LOCK_EX)) {
Recommendation: Use $wpdb->prepare() with placeholders
297. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8250
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$installError = "<p>" . $e->getMessage() . "</p>";
Recommendation: Use $wpdb->prepare() with placeholders
298. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8432
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$installError = "<p>" . $e->getMessage() . "</p>";
Recommendation: Use $wpdb->prepare() with placeholders
299. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8718
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "\n" . $date . $ip . $attackMessage;
Recommendation: Use $wpdb->prepare() with placeholders
300. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8751
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"LIMIT " . $limit,
Recommendation: Use $wpdb->prepare() with placeholders
301. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:8765
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"ORDER BY id LIMIT " . $limit,
Recommendation: Use $wpdb->prepare() with placeholders
302. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:9926
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$updatedHtaccessContent = $beforeWAFBlock . $beforeMod_php . $php5Matches[0][0] . "\n" . $php7Matches[0][0] . "\n" . sprintf("<IfModule mod_php.c>\n\tphp_value auto_prepend_file '%s'\n</IfModule>", $php5Matches[1][0] /* already escaped */) . $afterMod_php . $afterWAFBlock;
Recommendation: Use $wpdb->prepare() with placeholders
303. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:10095
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$htaccessContent .= "\n\n" . $autoPrependDirective;
Recommendation: Use $wpdb->prepare() with placeholders
304. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceClass.php:10136
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$userIniContent .= "\n\n" . $autoPrependIni;
Recommendation: Use $wpdb->prepare() with placeholders
305. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfDiagnostic.php:721
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = __('wp_remote_post() test to noc1.wordfence.com failed! Response was: ', 'wordfence') . $result['response']['code'] . " " . $result['response']['message'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
306. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfDiagnostic.php:762
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$messageTextOnly = __('wp_remote_post() test back to this server failed! Response was: ', 'wordfence') . "\n" . $result['response']['code'] . ' ' . $result['response']['message'] . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
307. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfDiagnostic.php:721
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = __('wp_remote_post() test to noc1.wordfence.com failed! Response was: ', 'wordfence') . $result['response']['code'] . " " . $result['response']['message'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
308. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfDiagnostic.php:762
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$messageTextOnly = __('wp_remote_post() test back to this server failed! Response was: ', 'wordfence') . "\n" . $result['response']['code'] . ' ' . $result['response']['message'] . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
309. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceScanner.php:353
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//wordfence::status(4, 'info', "Searching for malware scan resume point (". $stoppedOnSignature . ") at rule " . $rule[0]);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
310. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wordfenceScanner.php:353
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//wordfence::status(4, 'info', "Searching for malware scan resume point (". $stoppedOnSignature . ") at rule " . $rule[0]);
Recommendation: Use $wpdb->prepare() with placeholders
311. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfConfig.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (!($rawOptions = $wpdb->get_results("SELECT name, val FROM {$table} WHERE autoload = 'yes'"))) {
Recommendation: Use $wpdb->prepare() with placeholders
312. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfConfig.php:304
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rawOptions = $wpdb->get_results("SELECT name, val FROM {$table}");
Recommendation: Use $wpdb->prepare() with placeholders
313. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/lib/wfConfig.php:628
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rows = $wpdb->get_results("SELECT name, val, autoload FROM {$table} WHERE name IN ({$keysINClause})", ARRAY_A);
Recommendation: Use $wpdb->prepare() with placeholders
314. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/modules/login-security/classes/utility/multisite.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $wpdb->get_results("SELECT * FROM {$wpdb->blogs} WHERE blog_id IN ({$blogIdsQuery}) AND archived = 0 AND spam = 0 AND deleted = 0");
Recommendation: Use $wpdb->prepare() with placeholders
315. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/modules/login-security/classes/utility/multisite.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $wpdb->get_results("SELECT * FROM {$wpdb->blogs} WHERE archived = 0 AND spam = 0 AND deleted = 0");
Recommendation: Use $wpdb->prepare() with placeholders
316. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/wordfence/modules/login-security/classes/model/2fainitializationdata.php:33
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
return "otpauth://totp/" . rawurlencode(preg_replace('~^https?://(?:www\.)?~i', '', home_url()) . ':' . $this->user->user_login) . '?secret=' . $this->get_base32_secret() . '&algorithm=SHA1&digits=6&period=30&issuer=' . rawurlencode(preg_replace('~^https?://(?:www\.)?~i', '', home_url()));
Recommendation: Move credentials to environment variables or secure configuration
317. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/modules/login-security/classes/model/settings/db.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$raw = $wpdb->get_results("SELECT `name`, `value` FROM `{$table}` WHERE `autoload` = 'yes'");
Recommendation: Use $wpdb->prepare() with placeholders
318. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/entry.php:121
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$key = ! $this->context ? $this->singular : $this->context . "\4" . $this->singular;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
319. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/entry.php:121
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$key = ! $this->context ? $this->singular : $this->context . "\4" . $this->singular;
Recommendation: Use $wpdb->prepare() with placeholders
320. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/mo.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exported .= "\0" . $entry->plural;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
321. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/mo.php:211
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exported = $entry->context . "\4" . $exported;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
322. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/mo.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exported .= "\0" . $entry->plural;
Recommendation: Use $wpdb->prepare() with placeholders
323. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/mo.php:211
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exported = $entry->context . "\4" . $exported;
Recommendation: Use $wpdb->prepare() with placeholders
324. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/po.php:311
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$translation = "\n" . $translation;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
325. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/po.php:531
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$entry->extracted_comments = trim( $entry->extracted_comments . "\n" . $comment );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
326. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/po.php:535
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$entry->translator_comments = trim( $entry->translator_comments . "\n" . $comment );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
327. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/po.php:311
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$translation = "\n" . $translation;
Recommendation: Use $wpdb->prepare() with placeholders
328. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/po.php:531
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$entry->extracted_comments = trim( $entry->extracted_comments . "\n" . $comment );
Recommendation: Use $wpdb->prepare() with placeholders
329. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/waf/pomo/po.php:535
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$entry->translator_comments = trim( $entry->translator_comments . "\n" . $comment );
Recommendation: Use $wpdb->prepare() with placeholders
330. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/models/block/wfBlock.php:560
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM `{$blocksTable}` WHERE `expiration` <= UNIX_TIMESTAMP() AND `expiration` != " . self::DURATION_FOREVER);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
331. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/models/block/wfBlock.php:1691
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "DELETE FROM `{$blocksTable}` WHERE `id` IN (" . $inClause . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
332. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/models/block/wfBlock.php:574
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$removing = self::_recordsFromRows($wpdb->get_results("SELECT * FROM `{$blocksTable}` WHERE `expiration` = " . self::DURATION_FOREVER, ARRAY_A));
Recommendation: Use $wpdb->prepare() with placeholders
333. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/models/block/wfBlock.php:1117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rows = $wpdb->get_results("SELECT * FROM `{$blocksTable}` WHERE `type` IN (" . implode(', ', array(self::TYPE_IP_MANUAL, self::TYPE_IP_AUTOMATIC_TEMPORARY, self::TYPE_IP_AUTOMATIC_PERMANENT, self::TYPE_WFSN_TEMPORARY, self::TYPE_RATE_BLOCK, self::TYPE_RATE_THROTTLE, self::TYPE_LOCKOUT)) . ")", ARRAY_A);
Recommendation: Use $wpdb->prepare() with placeholders
334. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/models/block/wfBlock.php:1130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rows = $wpdb->get_results("SELECT * FROM `{$blocksTable}` WHERE `type` IN (" . implode(', ', array(self::TYPE_COUNTRY)) . ")", ARRAY_A);
Recommendation: Use $wpdb->prepare() with placeholders
335. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/models/block/wfBlock.php:1188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rows = $wpdb->get_results("SELECT * FROM `{$blocksTable}` WHERE `IP` = {$ipHex}", ARRAY_A);
Recommendation: Use $wpdb->prepare() with placeholders
336. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/models/block/wfBlock.php:1682
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$data = wfUtils::array_kmap(function($r) { return array($r['id'] => $r); }, $wpdb->get_results("SELECT * FROM `{$blocksTable}` WHERE `id` IN ({$populateInClause})", ARRAY_A));
Recommendation: Use $wpdb->prepare() with placeholders
337. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wordfence/models/block/wfBlock.php:1691
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "DELETE FROM `{$blocksTable}` WHERE `id` IN (" . $inClause . ")";
Recommendation: Use $wpdb->prepare() with placeholders
338. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-submission-debug.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . get_class($callback['function'][0]) . "::" . $callback['function'][1] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
339. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-submission-debug.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . get_class($callback['function'][0]) . "::" . $callback['function'][1] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
340. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-phase2-integration.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Plugin version: " . $plugin->getVersion() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
341. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-phase2-integration.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Migration version: " . $status['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
342. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-phase2-integration.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Organization type: " . $status['organization_type'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
343. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-phase2-integration.php:100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
344. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-phase2-integration.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Plugin version: " . $plugin->getVersion() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
345. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-phase2-integration.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Migration version: " . $status['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
346. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-phase2-integration.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Organization type: " . $status['organization_type'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
347. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-phase2-integration.php:100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
348. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Using existing place (ID: $place_id) - " . $places[0]->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
349. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:88
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Claim code: " . $claim_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
350. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:98
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - ID: " . $orphan->ID . " | " . $orphan->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
351. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Email: " . $test_username . "@example.com\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
352. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
353. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Method: " . $claim->verification_method . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
354. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:131
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Code: " . $claim->verification_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
355. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $claim->claim_date . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
356. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
357. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - Claim #" . $pending->id . " | Place: " . $pending->place_name . " | User: " . $pending->display_name . " | Status: " . $pending->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
358. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total claims: " . $stats['total'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
359. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Pending: " . $stats['pending'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
360. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Verified: " . $stats['verified'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
361. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:167
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Approved: " . $stats['approved'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
362. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejected: " . $stats['rejected'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
363. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Orphan places: " . $stats['orphan_places'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
364. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $manager->display_name . " (" . $manager->role . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
365. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Final status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
366. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:195
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Reviewed by: User ID " . $claim->reviewed_by . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
367. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Notes: " . $claim->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
368. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:204
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Place URL: " . $place_url . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
369. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:219
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\nNext: Test frontend at: " . $place_url . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
370. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Using existing place (ID: $place_id) - " . $places[0]->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
371. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:88
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Claim code: " . $claim_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
372. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:98
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - ID: " . $orphan->ID . " | " . $orphan->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
373. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Email: " . $test_username . "@example.com\n";
Recommendation: Use $wpdb->prepare() with placeholders
374. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
375. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Method: " . $claim->verification_method . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
376. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:131
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Code: " . $claim->verification_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
377. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $claim->claim_date . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
378. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
379. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - Claim #" . $pending->id . " | Place: " . $pending->place_name . " | User: " . $pending->display_name . " | Status: " . $pending->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
380. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total claims: " . $stats['total'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
381. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Pending: " . $stats['pending'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
382. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Verified: " . $stats['verified'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
383. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:167
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Approved: " . $stats['approved'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
384. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejected: " . $stats['rejected'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
385. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Orphan places: " . $stats['orphan_places'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
386. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $manager->display_name . " (" . $manager->role . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders
387. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Final status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
388. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:195
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Reviewed by: User ID " . $claim->reviewed_by . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
389. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Notes: " . $claim->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
390. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:204
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Place URL: " . $place_url . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
391. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-workflow.php:219
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\nNext: Test frontend at: " . $place_url . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
392. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Database error: " . $wpdb->last_error . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
393. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ID: " . $manager->id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
394. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Role: " . $manager->role . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
395. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $manager->date_added . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
396. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $mgr->display_name . " (" . $mgr->role . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
397. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Database error: " . $wpdb->last_error . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
398. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ID: " . $manager->id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
399. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Role: " . $manager->role . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
400. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $manager->date_added . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
401. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $mgr->display_name . " (" . $mgr->role . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders
402. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/debug-frontend.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Found Places hook: $class::" . $callback['function'][1] . " at priority $priority\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
403. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/debug-frontend.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Found Places hook: $class::" . $callback['function'][1] . " at priority $priority\n";
Recommendation: Use $wpdb->prepare() with placeholders
404. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/check-admin-status.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - {$id}: " . $module->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
405. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/check-admin-status.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✓ Active Module: " . $active->getName() . " ({$active->getId()})\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
406. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/check-admin-status.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error loading modules: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
407. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/check-admin-status.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - {$id}: " . $module->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
408. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/check-admin-status.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✓ Active Module: " . $active->getName() . " ({$active->getId()})\n";
Recommendation: Use $wpdb->prepare() with placeholders
409. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/check-admin-status.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error loading modules: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
410. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/check-admin-status.php:89
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$all_org_options = $wpdb->get_results("SELECT option_name, option_value FROM {$wpdb->options} WHERE option_name LIKE 'cxq_mm_%' ORDER BY option_name");
Recommendation: Use $wpdb->prepare() with placeholders
411. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/temp_verify_fix.php:27
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
412. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/temp_verify_fix.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
413. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/temp_verify_fix.php:27
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
414. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/temp_verify_fix.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
415. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ID: " . $instance->getId() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
416. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $instance->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
417. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Description: " . $instance->getDescription() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
418. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Icon: " . $instance->getIcon() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
419. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
420. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✓ Active module: " . $active->getName() . " ({$active->getId()})\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
421. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
422. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ID: " . $instance->getId() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
423. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $instance->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
424. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Description: " . $instance->getDescription() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
425. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Icon: " . $instance->getIcon() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
426. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
427. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✓ Active module: " . $active->getName() . " ({$active->getId()})\n";
Recommendation: Use $wpdb->prepare() with placeholders
428. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-org-types.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
429. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-libraries.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "❌ <strong>{$service_name}</strong>: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
430. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-libraries.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "❌ <strong>{$service_name}</strong>: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
431. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Query failed: " . $e->getMessage() . " ✗\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
432. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:91
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Failed to create test user: " . $test_user_id->get_error_message() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
433. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Place ID: " . $claim->place_id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
434. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " User ID: " . $claim->user_id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
435. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
436. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Method: " . $claim->verification_method . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
437. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:121
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Code: " . $claim->verification_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
438. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $claim->claim_date . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
439. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New status: " . $claim_obj->status . " (should be 'verified')\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
440. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " First claim ID: " . $pending[0]->id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
441. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:173
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Place name: " . $pending[0]->place_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
442. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " User: " . $pending[0]->display_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
443. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total: " . $stats['total'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
444. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:186
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Pending: " . $stats['pending'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
445. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:187
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Verified: " . $stats['verified'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
446. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Approved: " . $stats['approved'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
447. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejected: " . $stats['rejected'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
448. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Orphan places: " . $stats['orphan_places'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
449. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:211
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Final status: " . $claim_obj->status . " (should be 'approved')\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
450. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Reviewed by: " . $claim_obj->reviewed_by . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
451. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:213
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Notes: " . $claim_obj->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
452. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:249
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim_obj_2->status . " (should be 'rejected')\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
453. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:250
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejection reason: " . $claim_obj_2->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
454. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Query failed: " . $e->getMessage() . " ✗\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
455. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:91
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Failed to create test user: " . $test_user_id->get_error_message() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
456. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Place ID: " . $claim->place_id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
457. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " User ID: " . $claim->user_id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
458. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
459. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Method: " . $claim->verification_method . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
460. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:121
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Code: " . $claim->verification_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
461. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $claim->claim_date . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
462. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New status: " . $claim_obj->status . " (should be 'verified')\n";
Recommendation: Use $wpdb->prepare() with placeholders
463. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " First claim ID: " . $pending[0]->id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
464. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:173
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Place name: " . $pending[0]->place_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
465. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " User: " . $pending[0]->display_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
466. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total: " . $stats['total'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
467. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:186
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Pending: " . $stats['pending'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
468. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:187
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Verified: " . $stats['verified'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
469. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Approved: " . $stats['approved'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
470. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejected: " . $stats['rejected'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
471. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Orphan places: " . $stats['orphan_places'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
472. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:211
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Final status: " . $claim_obj->status . " (should be 'approved')\n";
Recommendation: Use $wpdb->prepare() with placeholders
473. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Reviewed by: " . $claim_obj->reviewed_by . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
474. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:213
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Notes: " . $claim_obj->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
475. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:249
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim_obj_2->status . " (should be 'rejected')\n";
Recommendation: Use $wpdb->prepare() with placeholders
476. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-claims-service-only.php:250
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejection reason: " . $claim_obj_2->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
477. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
478. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active Module: " . $active_module->getName() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
479. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
480. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
481. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:89
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
482. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
483. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active Module: " . $active_module->getName() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
484. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
485. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
486. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard.php:89
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
487. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-asset-manager.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error registering stylesheet: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
488. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-asset-manager.php:72
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error registering script: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
489. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-asset-manager.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error registering stylesheet: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
490. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-asset-manager.php:72
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error registering script: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
491. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:688
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
492. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2304
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_event($user->ID,'Registration',"Failed to change username from `{$user->user_login}` to `{$new_username}`: ".$wpdb->show_errors(false));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
493. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2527
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
494. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2586
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
495. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2653
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "<select name='" . esc_attr( $parsed_args['name'] ) . "'" . $class . " id='" . esc_attr( $parsed_args['id'] ) . "'>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
496. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2655
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
497. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2705
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "<select name='" . esc_attr( $parsed_args['name'] ) . "'" . $class . " id='" . esc_attr( $parsed_args['id'] ) . "'>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
498. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2707
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
499. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2714
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"" . esc_attr( $parsed_args['option_now_value'] ) . "\"{$selected}>" . $parsed_args['show_option_now'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
500. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2718
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"" . esc_attr( $parsed_args['option_custom_default_value'] ) . "\"{$selected}>" . $parsed_args['show_option_custom_default'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
501. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:688
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
502. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2304
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_event($user->ID,'Registration',"Failed to change username from `{$user->user_login}` to `{$new_username}`: ".$wpdb->show_errors(false));
Recommendation: Use $wpdb->prepare() with placeholders
503. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2527
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
504. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2586
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
505. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2653
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "<select name='" . esc_attr( $parsed_args['name'] ) . "'" . $class . " id='" . esc_attr( $parsed_args['id'] ) . "'>\n";
Recommendation: Use $wpdb->prepare() with placeholders
506. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2655
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
507. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2705
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "<select name='" . esc_attr( $parsed_args['name'] ) . "'" . $class . " id='" . esc_attr( $parsed_args['id'] ) . "'>\n";
Recommendation: Use $wpdb->prepare() with placeholders
508. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2707
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
509. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2714
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"" . esc_attr( $parsed_args['option_now_value'] ) . "\"{$selected}>" . $parsed_args['show_option_now'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
510. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/cxq-membership.php:2718
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"" . esc_attr( $parsed_args['option_custom_default_value'] ) . "\"{$selected}>" . $parsed_args['show_option_custom_default'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
511. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-features-comprehensive.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $org_instance->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
512. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-features-comprehensive.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Description: " . $org_instance->getDescription() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
513. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-features-comprehensive.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Icon: " . $org_instance->getIcon() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
514. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-features-comprehensive.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $org_instance->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
515. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-features-comprehensive.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Description: " . $org_instance->getDescription() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
516. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-features-comprehensive.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Icon: " . $org_instance->getIcon() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
517. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-features-integration.php:69
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✓ Active module loaded: " . $active_module->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
518. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-features-integration.php:69
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✓ Active module loaded: " . $active_module->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
519. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard-simulation.php:405
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $result['name'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
520. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard-simulation.php:407
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " " . $result['details'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
521. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard-simulation.php:405
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $result['name'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
522. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-setup-wizard-simulation.php:407
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " " . $result['details'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
523. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-php-validation.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
524. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-php-validation.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
525. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-php-validation.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
526. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-php-validation.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
527. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/simple-test.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ ServiceContainer instantiation failed: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
528. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/simple-test.php:73
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Service test failed: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
529. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/simple-test.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ ServiceContainer instantiation failed: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
530. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/simple-test.php:73
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Service test failed: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
531. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Post type: " . $place->post_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
532. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:18
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Post title: " . $place->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
533. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Wrong post type! Expected 'cxq_mm_member', got '" . $place->post_type . "'\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
534. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Username: " . $user->user_login . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
535. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Email: " . $user->user_email . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
536. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Post type: " . $place->post_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
537. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:18
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Post title: " . $place->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
538. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Wrong post type! Expected 'cxq_mm_member', got '" . $place->post_type . "'\n";
Recommendation: Use $wpdb->prepare() with placeholders
539. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Username: " . $user->user_login . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
540. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/test-permissions-debug.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Email: " . $user->user_email . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
541. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/migration-phase2.php:194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->usermeta} WHERE meta_key = '_org_positions'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
542. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/migration-phase2.php:195
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->usermeta} WHERE meta_key = '_primary_position'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
543. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/migration-phase2.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->usermeta} WHERE meta_key = '_credentials'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
544. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/register-deregister-post-status.class.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
jQuery( 'select[name=\"post_status\"]' ).append( '<option value=\"{$status}\">{$label}</option>' );".$jq_status;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
545. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/register-deregister-post-status.class.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
jQuery( 'select[name=\"post_status\"]' ).append( '<option value=\"{$status}\">{$label}</option>' );".$jq_status;
Recommendation: Use $wpdb->prepare() with placeholders
546. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/tests/simple-integration-test.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Migration Version: " . $status['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
547. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/tests/simple-integration-test.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Migration Version: " . $status['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
548. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/build/build.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (is_dir($dir . "/" . $object)) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
549. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/build/build.php:170
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rrmdir($dir . "/" . $object);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
550. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/build/build.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
unlink($dir . "/" . $object);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
551. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/build/build.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (is_dir($dir . "/" . $object)) {
Recommendation: Use $wpdb->prepare() with placeholders
552. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/build/build.php:170
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rrmdir($dir . "/" . $object);
Recommendation: Use $wpdb->prepare() with placeholders
553. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/build/build.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
unlink($dir . "/" . $object);
Recommendation: Use $wpdb->prepare() with placeholders
554. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
555. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
556. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
557. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
558. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
559. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
560. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
561. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
562. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/core/cxq-membership-profiles.php:1372
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html.="<td class=\"{$column_name}\">".$this->return_column_value( $column_name, $user).'</td>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
563. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/core/cxq-membership-profiles.php:1372
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html.="<td class=\"{$column_name}\">".$this->return_column_value( $column_name, $user).'</td>';
Recommendation: Use $wpdb->prepare() with placeholders
564. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/custom/cxq-membership-cust-ems.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT meta_key,meta_value as member_id, count(meta_key) as count FROM `".$wpdb->usermeta."` WHERE meta_key = 'cxq_member_id_number' and meta_value<>'' group by meta_key,meta_value;";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
565. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/custom/cxq-membership-cust-ems.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT meta_key,meta_value as member_id, count(meta_key) as count FROM `".$wpdb->usermeta."` WHERE meta_key = 'cxq_member_id_number' and meta_value<>'' group by meta_key,meta_value;";
Recommendation: Use $wpdb->prepare() with placeholders
566. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/custom/cxq-membership-cust-nsp.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT meta_key,meta_value as member_id, count(meta_key) as count FROM `".$wpdb->usermeta."` WHERE meta_key = 'cxq_member_id_number' and meta_value<>'' group by meta_key,meta_value;";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
567. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/custom/cxq-membership-cust-nsp.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT meta_key,meta_value as member_id, count(meta_key) as count FROM `".$wpdb->usermeta."` WHERE meta_key = 'cxq_member_id_number' and meta_value<>'' group by meta_key,meta_value;";
Recommendation: Use $wpdb->prepare() with placeholders
568. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/core/optional/cxq-membership-attachments.php:818
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exif[] = exif_read_data("data://{$mime_type};base64," . $file,$sections );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
569. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/includes/core/optional/cxq-membership-attachments.php:818
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exif[] = exif_read_data("data://{$mime_type};base64," . $file,$sections );
Recommendation: Use $wpdb->prepare() with placeholders
570. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Admin/PlaceClaimsPage.php:478
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$claims = $wpdb->get_results("SELECT * FROM {$table} {$where} ORDER BY claim_date DESC");
Recommendation: Use $wpdb->prepare() with placeholders
571. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Core/ErrorHandler.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$context_str ? "\nContext: " . $context_str : ''
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
572. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Core/ErrorHandler.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$context_str ? "\nContext: " . $context_str : ''
Recommendation: Use $wpdb->prepare() with placeholders
573. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/UserProfileService.php:305
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Failed to change username from `{$user->user_login}` to `{$new_username}`: " . $wpdb->show_errors(false)
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
574. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/UserProfileService.php:305
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Failed to change username from `{$user->user_login}` to `{$new_username}`: " . $wpdb->show_errors(false)
Recommendation: Use $wpdb->prepare() with placeholders
575. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:613
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: submitClaim() FAILED - Invalid verification_method: " . $data['verification_method']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
576. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:639
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: Database insert FAILED: " . $this->wpdb->last_error);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
577. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:653
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: Sending verification via method: " . $data['verification_method']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
578. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:671
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: User email: " . $user_email);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
579. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:1171
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: wp_create_user FAILED - error: " . $new_user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
580. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:1212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: Database update FAILED: " . $this->wpdb->last_error);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
581. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:2017
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ Place Claim: Failed to create user - " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
582. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:613
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: submitClaim() FAILED - Invalid verification_method: " . $data['verification_method']);
Recommendation: Use $wpdb->prepare() with placeholders
583. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:639
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: Database insert FAILED: " . $this->wpdb->last_error);
Recommendation: Use $wpdb->prepare() with placeholders
584. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:653
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: Sending verification via method: " . $data['verification_method']);
Recommendation: Use $wpdb->prepare() with placeholders
585. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:671
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: User email: " . $user_email);
Recommendation: Use $wpdb->prepare() with placeholders
586. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:1171
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: wp_create_user FAILED - error: " . $new_user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
587. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:1212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ CLAIM: Database update FAILED: " . $this->wpdb->last_error);
Recommendation: Use $wpdb->prepare() with placeholders
588. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/PlaceClaimService.php:2017
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CXQ Place Claim: Failed to create user - " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
589. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/WorkflowExecutionService.php:201
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Failed to update user: " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
590. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/WorkflowExecutionService.php:224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Failed to create user: " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
591. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/WorkflowExecutionService.php:201
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Failed to update user: " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
592. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership/src/Services/WorkflowExecutionService.php:224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Failed to create user: " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
593. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
594. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
595. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
596. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
597. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
598. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
599. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
600. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
601. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
602. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
603. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
604. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
605. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
606. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
607. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
608. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
609. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
610. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
611. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
612. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
613. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
614. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
615. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
616. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
617. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
618. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
619. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
620. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-dev-tools/includes/dBug.class.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
621. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->comments} DROP INDEX woo_idx_comment_type;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
622. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->comments} DROP INDEX woo_idx_comment_date_type;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
623. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:93
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->posts} WHERE post_type IN ( 'product', 'product_variation', 'shop_coupon', 'shop_order', 'shop_order_refund' );" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
624. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:94
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE meta FROM {$wpdb->postmeta} meta LEFT JOIN {$wpdb->posts} posts ON posts.ID = meta.post_id WHERE posts.ID IS NULL;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
625. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:96
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->comments} WHERE comment_type IN ( 'order_note' );" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
626. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:97
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE meta FROM {$wpdb->commentmeta} meta LEFT JOIN {$wpdb->comments} comments ON comments.comment_ID = meta.comment_id WHERE comments.comment_ID IS NULL;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
627. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE tr FROM {$wpdb->term_relationships} tr LEFT JOIN {$wpdb->posts} posts ON posts.ID = tr.object_id WHERE posts.ID IS NULL;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
628. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:125
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE t FROM {$wpdb->terms} t LEFT JOIN {$wpdb->term_taxonomy} tt ON t.term_id = tt.term_id WHERE tt.term_id IS NULL;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
629. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/uninstall.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE tm FROM {$wpdb->termmeta} tm LEFT JOIN {$wpdb->term_taxonomy} tt ON tm.term_id = tt.term_id WHERE tt.term_id IS NULL;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
630. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-core-functions.php:1029
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wc_queued_js .= "\n" . $code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
631. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-core-functions.php:1029
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wc_queued_js .= "\n" . $code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
632. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-term-functions.php:288
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ( $wpdb->query( "INSERT INTO {$wpdb->termmeta} ( term_id, meta_key, meta_value ) SELECT woocommerce_term_id, meta_key, meta_value FROM {$wpdb->prefix}woocommerce_termmeta;" ) ) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
633. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-term-functions.php:289
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS {$wpdb->prefix}woocommerce_termmeta" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
634. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1086
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ( $wpdb->query( "INSERT INTO {$wpdb->termmeta} ( term_id, meta_key, meta_value ) SELECT woocommerce_term_id, meta_key, meta_value FROM {$wpdb->prefix}woocommerce_termmeta;" ) ) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
635. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1087
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS {$wpdb->prefix}woocommerce_termmeta" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
636. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1105
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}woocommerce_shipping_zones CHANGE `zone_type` `zone_type` VARCHAR(40) NOT NULL DEFAULT '';" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
637. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1106
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}woocommerce_shipping_zones CHANGE `zone_enabled` `zone_enabled` INT(1) NOT NULL DEFAULT 1;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
638. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1192
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "UPDATE {$wpdb->prefix}woocommerce_shipping_zone_locations SET location_code = REPLACE( location_code, '-', '...' );" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
639. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1263
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->comments} ADD INDEX woo_idx_comment_type (comment_type)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
640. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1395
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}woocommerce_downloadable_product_permissions ADD INDEX order_id (order_id)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
641. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1866
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_download_log DROP FOREIGN KEY `{$foreign_key_name}`" ); // phpcs:ignore WordPress.DB.PreparedSQL.InterpolatedNotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
642. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1930
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_download_log DROP FOREIGN KEY fk_wc_download_log_permission_id" ); // phpcs:ignore WordPress.WP.PreparedSQL.NotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
643. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1973
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "UPDATE {$wpdb->termmeta} SET meta_key = 'order' WHERE meta_key LIKE 'order_pa_%';" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
644. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1987
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}woocommerce_downloadable_product_permissions ADD INDEX user_order_remaining_expires (user_id,order_id,downloads_remaining,access_expires)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
645. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:2112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_product_meta_lookup MODIFY COLUMN `min_price` decimal(19,4) NULL default NULL" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
646. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:2113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_product_meta_lookup MODIFY COLUMN `max_price` decimal(19,4) NULL default NULL" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
647. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:2464
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_download_log DROP FOREIGN KEY `{$foreign_key_name}`" ); // phpcs:ignore WordPress.DB.PreparedSQL.InterpolatedNotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
648. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:3125
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->comments} ADD INDEX woo_idx_comment_date_type (comment_date_gmt, comment_type, comment_approved, comment_post_ID)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
649. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$existing_file_paths = $wpdb->get_results( "SELECT meta_value, meta_id, post_id FROM {$wpdb->postmeta} WHERE meta_key = '_file_path' AND meta_value != '';" );
Recommendation: Use $wpdb->prepare() with placeholders
650. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:503
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$existing_file_paths = $wpdb->get_results( "SELECT meta_value, meta_id FROM {$wpdb->postmeta} WHERE meta_key = '_file_paths' AND meta_value != '';" );
Recommendation: Use $wpdb->prepare() with placeholders
651. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-update-functions.php:1123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$old_methods = $wpdb->get_results( "SELECT zone_id, shipping_method_type, shipping_method_order, shipping_method_id FROM {$wpdb->prefix}woocommerce_shipping_zone_shipping_methods;" );
Recommendation: Use $wpdb->prepare() with placeholders
652. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-ajax.php:2140
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$menu_orders = wp_list_pluck( $wpdb->get_results( "SELECT ID, menu_order FROM {$wpdb->posts} WHERE post_type = 'product' ORDER BY menu_order ASC, post_title ASC" ), 'menu_order', 'ID' );
Recommendation: Use $wpdb->prepare() with placeholders
653. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-install.php:1671
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}woocommerce_downloadable_product_permissions DROP PRIMARY KEY, ADD `permission_id` bigint(20) unsigned NOT NULL PRIMARY KEY AUTO_INCREMENT;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
654. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-install.php:1677
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_order_product_lookup DROP PRIMARY KEY, ADD PRIMARY KEY (order_item_id, order_id)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
655. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-install.php:1704
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->comments} ADD INDEX woo_idx_comment_type (comment_type)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
656. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-install.php:1711
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->comments} ADD INDEX woo_idx_comment_date_type (comment_date_gmt, comment_type, comment_approved, comment_post_ID)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
657. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-install.php:2180
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS {$table}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
658. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-tax.php:945
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE locations FROM {$wpdb->prefix}woocommerce_tax_rate_locations locations LEFT JOIN {$wpdb->prefix}woocommerce_tax_rates rates ON rates.tax_rate_id = locations.tax_rate_id WHERE rates.tax_rate_id IS NULL;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
659. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-tax.php:1215
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "INSERT INTO {$wpdb->prefix}woocommerce_tax_rate_locations ( location_code, tax_rate_id, location_type ) VALUES $sql;" ); // @codingStandardsIgnoreLine.
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
660. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-tax.php:362
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$postcode_ranges = $wpdb->get_results( "SELECT tax_rate_id, location_code FROM {$wpdb->prefix}woocommerce_tax_rate_locations WHERE location_type = 'postcode' AND location_code LIKE '%...%';" );
Recommendation: Use $wpdb->prepare() with placeholders
661. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/class-wc-tax.php:1235
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$locations = $wpdb->get_results( "SELECT * FROM `{$wpdb->prefix}woocommerce_tax_rate_locations`" );
Recommendation: Use $wpdb->prepare() with placeholders
662. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/wc-attribute-functions.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$raw_attribute_taxonomies = $wpdb->get_results( "SELECT * FROM {$wpdb->prefix}woocommerce_attribute_taxonomies WHERE attribute_name != '' ORDER BY attribute_name ASC;" );
Recommendation: Use $wpdb->prepare() with placeholders
663. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Symfony/Component/CssSelector/XPath/Translator.php:67
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$element."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
664. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Symfony/Component/CssSelector/XPath/Translator.php:67
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$element."'";
Recommendation: Use $wpdb->prepare() with placeholders
665. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Symfony/Component/CssSelector/Node/FunctionNode.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$token->getValue()."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
666. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Symfony/Component/CssSelector/Node/FunctionNode.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$token->getValue()."'";
Recommendation: Use $wpdb->prepare() with placeholders
667. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Pelago/Emogrifier/CssInliner.php:485
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "\n\n" . $styleNode->nodeValue;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
668. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Pelago/Emogrifier/CssInliner.php:485
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "\n\n" . $styleNode->nodeValue;
Recommendation: Use $wpdb->prepare() with placeholders
669. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Sabberworm/CSS/OutputFormatter.php:258
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return str_replace("\n", "\n" . $this->indent(), $sSpaceString);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
670. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Sabberworm/CSS/OutputFormatter.php:258
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return str_replace("\n", "\n" . $this->indent(), $sSpaceString);
Recommendation: Use $wpdb->prepare() with placeholders
671. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Sabberworm/CSS/Property/Import.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $oOutputFormat->comments($this) . "@import " . $this->oLocation->render($oOutputFormat)
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
672. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/lib/packages/Sabberworm/CSS/Property/Import.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $oOutputFormat->comments($this) . "@import " . $this->oLocation->render($oOutputFormat)
Recommendation: Use $wpdb->prepare() with placeholders
673. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/data-stores/class-wc-shipping-zone-data-store.php:321
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$postcode_locations = $wpdb->get_results( "SELECT zone_id, location_code FROM {$wpdb->prefix}woocommerce_shipping_zone_locations WHERE location_type = 'postcode';" );
Recommendation: Use $wpdb->prepare() with placeholders
674. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/data-stores/class-wc-shipping-zone-data-store.php:360
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $wpdb->get_results( "SELECT zone_id, zone_name, zone_order FROM {$wpdb->prefix}woocommerce_shipping_zones order by zone_order ASC, zone_id ASC;" );
Recommendation: Use $wpdb->prepare() with placeholders
675. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/react-admin/wc-admin-update-functions.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP INDEX `status` ON {$wpdb->prefix}wc_order_stats" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
676. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/react-admin/wc-admin-update-functions.php:49
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_order_stats DROP COLUMN `total_sales`" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
677. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/react-admin/wc-admin-update-functions.php:51
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_order_stats CHANGE COLUMN `gross_total` `total_sales` double DEFAULT 0 NOT NULL" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
678. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/react-admin/wc-admin-update-functions.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE actions FROM {$wpdb->prefix}wc_admin_note_actions actions INNER JOIN {$wpdb->prefix}wc_admin_notes notes USING (note_id) WHERE actions.name = 'tracking-dismiss' AND notes.name = 'wc-admin-usage-tracking-opt-in'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
679. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/react-admin/wc-admin-update-functions.php:277
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_admin_note_actions DROP COLUMN `is_primary`" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
680. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/react-admin/wc-admin-update-functions.php:295
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_order_stats ADD INDEX idx_date_paid_status_parent (date_paid, status, parent_id)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
681. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/log-handlers/class-wc-log-handler-db.php:105
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $wpdb->query( "TRUNCATE TABLE {$wpdb->prefix}woocommerce_log" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
682. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/widgets/class-wc-widget-price-filter.php:179
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['join'] . $meta_query_sql['join'] . "
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
683. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/widgets/class-wc-widget-price-filter.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['where'] . $meta_query_sql['where'] . $search_query_sql . '
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
684. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/widgets/class-wc-widget-price-filter.php:179
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['join'] . $meta_query_sql['join'] . "
Recommendation: Use $wpdb->prepare() with placeholders
685. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/widgets/class-wc-widget-price-filter.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['where'] . $meta_query_sql['where'] . $search_query_sql . '
Recommendation: Use $wpdb->prepare() with placeholders
686. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/widgets/class-wc-widget-brand-nav.php:519
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['join'] . $meta_query_sql['join'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
687. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/widgets/class-wc-widget-brand-nav.php:523
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['where'] . $meta_query_sql['where'] . '
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
688. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/widgets/class-wc-widget-brand-nav.php:519
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['join'] . $meta_query_sql['join'];
Recommendation: Use $wpdb->prepare() with placeholders
689. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/widgets/class-wc-widget-brand-nav.php:523
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['where'] . $meta_query_sql['where'] . '
Recommendation: Use $wpdb->prepare() with placeholders
690. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/admin/class-wc-admin-settings.php:682
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<?php echo str_replace( ' id=', " data-placeholder='" . esc_attr__( 'Select a page…', 'woocommerce' ) . "' style='" . $value['css'] . "' class='" . $value['class'] . "' id=", wp_dropdown_pages( $args ) ); // WPCS: XSS ok. ?> <?php echo $description; // WPCS: XSS ok. ?>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
691. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/admin/class-wc-admin-settings.php:682
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<?php echo str_replace( ' id=', " data-placeholder='" . esc_attr__( 'Select a page…', 'woocommerce' ) . "' style='" . $value['css'] . "' class='" . $value['class'] . "' id=", wp_dropdown_pages( $args ) ); // WPCS: XSS ok. ?> <?php echo $description; // WPCS: XSS ok. ?>
Recommendation: Use $wpdb->prepare() with placeholders
692. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/export/abstract-wc-csv-exporter.php:384
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$data = "'" . $data;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
693. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/export/abstract-wc-csv-exporter.php:384
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$data = "'" . $data;
Recommendation: Use $wpdb->prepare() with placeholders
694. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/legacy/abstract-wc-legacy-order.php:339
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
update_post_meta( $this->get_id(), "_{$type}_" . $key, $value );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
695. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/legacy/abstract-wc-legacy-order.php:339
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
update_post_meta( $this->get_id(), "_{$type}_" . $key, $value );
Recommendation: Use $wpdb->prepare() with placeholders
696. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/rest-api/Controllers/Version2/class-wc-rest-system-status-tools-v2-controller.php:550
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "TRUNCATE {$wpdb->prefix}woocommerce_sessions" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
697. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/rest-api/Controllers/Version2/class-wc-rest-system-status-tools-v2-controller.php:552
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = absint( $wpdb->query( "DELETE FROM {$wpdb->usermeta} WHERE meta_key='_woocommerce_persistent_cart_" . get_current_blog_id() . "';" ) ); // WPCS: unprepared SQL ok.
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
698. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/rest-api/Controllers/Version2/class-wc-rest-system-status-tools-v2-controller.php:564
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->prefix}woocommerce_tax_rates;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
699. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/rest-api/Controllers/Version2/class-wc-rest-system-status-tools-v2-controller.php:565
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->prefix}woocommerce_tax_rate_locations;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
700. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/rest-api/Controllers/Version1/class-wc-rest-webhooks-v1-controller.php:522
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$data->post_password = 'webhook_' . wp_generate_password();
Recommendation: Move credentials to environment variables or secure configuration
701. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/admin/list-tables/class-wc-admin-list-table-orders.php:339
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html .= "<div><small class='refunded'>-" . $refund['quantity'] . '</small></div><br/>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
702. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/admin/list-tables/class-wc-admin-list-table-orders.php:339
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html .= "<div><small class='refunded'>-" . $refund['quantity'] . '</small></div><br/>';
Recommendation: Use $wpdb->prepare() with placeholders
703. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/admin/reports/class-wc-report-downloads.php:333
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->items = $wpdb->get_results( "SELECT * {$query_from} {$query_order}" ); // WPCS: cache ok, db call ok, unprepared SQL ok.
Recommendation: Use $wpdb->prepare() with placeholders
704. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/includes/admin/meta-boxes/views/html-order-items.php:485
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rates = $wpdb->get_results( "SELECT * FROM {$wpdb->prefix}woocommerce_tax_rates ORDER BY tax_rate_name LIMIT 100" );
Recommendation: Use $wpdb->prepare() with placeholders
705. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/action-scheduler/classes/data-stores/ActionScheduler_DBStore.php:1169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row_updates = $wpdb->query( "UPDATE {$wpdb->actionscheduler_actions} SET claim_id = 0 WHERE action_id IN ({$action_id_string})" ); // phpcs:ignore WordPress.DB.PreparedSQL.InterpolatedNotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
706. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/action-scheduler/classes/data-stores/ActionScheduler_wpCommentLogger.php:203
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$count = $wpdb->get_results( "SELECT comment_approved, COUNT( * ) AS num_comments FROM {$wpdb->comments} WHERE comment_type NOT IN('order_note','action_log') GROUP BY comment_approved", ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
707. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/blueprint/src/ResourceStorages/LocalPluginResourceStorage.php:42
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$full_path = $path . "/{$this->suffix}/" . $slug . '.zip';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
708. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/blueprint/src/ResourceStorages/LocalPluginResourceStorage.php:42
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$full_path = $path . "/{$this->suffix}/" . $slug . '.zip';
Recommendation: Use $wpdb->prepare() with placeholders
709. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Symfony/Component/CssSelector/XPath/Translator.php:67
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$element."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
710. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Symfony/Component/CssSelector/XPath/Translator.php:67
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$element."'";
Recommendation: Use $wpdb->prepare() with placeholders
711. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Symfony/Component/CssSelector/Node/FunctionNode.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$token->getValue()."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
712. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Symfony/Component/CssSelector/Node/FunctionNode.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$token->getValue()."'";
Recommendation: Use $wpdb->prepare() with placeholders
713. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Pelago/Emogrifier/CssInliner.php:485
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "\n\n" . $styleNode->nodeValue;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
714. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Pelago/Emogrifier/CssInliner.php:485
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "\n\n" . $styleNode->nodeValue;
Recommendation: Use $wpdb->prepare() with placeholders
715. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Sabberworm/CSS/OutputFormatter.php:258
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return str_replace("\n", "\n" . $this->indent(), $sSpaceString);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
716. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Sabberworm/CSS/OutputFormatter.php:258
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return str_replace("\n", "\n" . $this->indent(), $sSpaceString);
Recommendation: Use $wpdb->prepare() with placeholders
717. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Sabberworm/CSS/Property/Import.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $oOutputFormat->comments($this) . "@import " . $this->oLocation->render($oOutputFormat)
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
718. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/vendor-prefixed/packages/Sabberworm/CSS/Property/Import.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $oOutputFormat->comments($this) . "@import " . $this->oLocation->render($oOutputFormat)
Recommendation: Use $wpdb->prepare() with placeholders
719. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/src/Engine/Renderer/class-html2text.php:374
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $text;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
720. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/src/Engine/Renderer/class-html2text.php:614
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "\n" . $output;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
721. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/src/Engine/Renderer/class-html2text.php:625
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "\n" . $output . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
722. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/src/Engine/Renderer/class-html2text.php:374
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $text;
Recommendation: Use $wpdb->prepare() with placeholders
723. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/src/Engine/Renderer/class-html2text.php:614
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "\n" . $output;
Recommendation: Use $wpdb->prepare() with placeholders
724. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/packages/email-editor/src/Engine/Renderer/class-html2text.php:625
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "\n" . $output . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
725. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CostOfGoodsSold/CostOfGoodsSoldController.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_product_meta_lookup ADD COLUMN cogs_total_value DECIMAL(19,4)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
726. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CostOfGoodsSold/CostOfGoodsSoldController.php:131
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wc_product_meta_lookup DROP COLUMN cogs_total_value" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
727. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductAttributesLookup/DataRegenerator.php:145
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "TRUNCATE TABLE {$this->lookup_table_name}" ); // phpcs:disable WordPress.DB.PreparedSQL.InterpolatedNotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
728. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductAttributesLookup/Filterer.php:337
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['join'] . $meta_query_sql['join'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
729. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductAttributesLookup/Filterer.php:337
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['join'] . $meta_query_sql['join'];
Recommendation: Use $wpdb->prepare() with placeholders
730. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductAttributesLookup/LookupDataStore.php:341
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Lookup data creation (not optimized) failed for product $product_id: " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
731. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductAttributesLookup/LookupDataStore.php:830
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->error( "Lookup data creation (optimized) failed for product $product_id: " . $e->getMessage(), $data );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
732. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductAttributesLookup/LookupDataStore.php:341
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Lookup data creation (not optimized) failed for product $product_id: " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders
733. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductAttributesLookup/LookupDataStore.php:830
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->error( "Lookup data creation (optimized) failed for product $product_id: " . $e->getMessage(), $data );
Recommendation: Use $wpdb->prepare() with placeholders
734. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Admin/CategoryLookup.php:95
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "INSERT IGNORE INTO $wpdb->wc_category_lookup (category_tree_id,category_id) VALUES ({$insert_string})" ); // phpcs:ignore WordPress.DB.DirectDatabaseQuery.DirectQuery, WordPress.DB.PreparedSQL.InterpolatedNotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
735. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Admin/CategoryLookup.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "INSERT IGNORE INTO $wpdb->wc_category_lookup (category_id, category_tree_id) VALUES {$insert_string}" ); // phpcs:ignore WordPress.DB.DirectDatabaseQuery.DirectQuery, WordPress.DB.PreparedSQL.InterpolatedNotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
736. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Fulfillments/FulfillmentsController.php:74
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS {$wpdb->prefix}wc_order_fulfillments" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
737. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Fulfillments/FulfillmentsController.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP TABLE IF EXISTS {$wpdb->prefix}wc_order_fulfillment_meta" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
738. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Utilities/DatabaseUtil.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $wpdb->query( "DROP TABLE IF EXISTS `{$table_name}`" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
739. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Utilities/DatabaseUtil.php:304
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$conditions[] = "`$column` = " . $where_format[ $index ];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
740. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Utilities/DatabaseUtil.php:304
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$conditions[] = "`$column` = " . $where_format[ $index ];
Recommendation: Use $wpdb->prepare() with placeholders
741. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Abilities/REST/RestAbilityFactory.php:85
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Failed to register ability {$ability_config['id']}: " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
742. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Abilities/REST/RestAbilityFactory.php:85
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Failed to register ability {$ability_config['id']}: " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders
743. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Admin/Orders/ListTable.php:518
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->order_query_args['date_created'] = "$year-$month-01..." . $last_day_of_month;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
744. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Admin/Orders/ListTable.php:518
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->order_query_args['date_created'] = "$year-$month-01..." . $last_day_of_month;
Recommendation: Use $wpdb->prepare() with placeholders
745. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Admin/Logging/LogHandlerFileV2.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$source = "$type-" . $info['filename'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
746. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Admin/Logging/LogHandlerFileV2.php:144
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$source = "$type-" . $info['dirname'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
747. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Admin/Logging/LogHandlerFileV2.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$source = "$type-" . $info['filename'];
Recommendation: Use $wpdb->prepare() with placeholders
748. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/Admin/Logging/LogHandlerFileV2.php:144
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$source = "$type-" . $info['dirname'];
Recommendation: Use $wpdb->prepare() with placeholders
749. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/OrdersTableMetaQuery.php:561
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$meta_compare_string = $meta_compare_string_start . "AND $subquery_alias.meta_key = %s " . $meta_compare_string_end;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
750. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/OrdersTableMetaQuery.php:565
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$meta_compare_string = $meta_compare_string_start . "AND $subquery_alias.meta_key LIKE %s " . $meta_compare_string_end;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
751. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/OrdersTableMetaQuery.php:572
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$meta_compare_string = $meta_compare_string_start . "AND $subquery_alias.meta_key IN " . $array_subclause . $meta_compare_string_end;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
752. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/OrdersTableMetaQuery.php:583
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$meta_compare_string = $meta_compare_string_start . "AND $subquery_alias.meta_key REGEXP $cast %s " . $meta_compare_string_end;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
753. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/OrdersTableMetaQuery.php:561
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$meta_compare_string = $meta_compare_string_start . "AND $subquery_alias.meta_key = %s " . $meta_compare_string_end;
Recommendation: Use $wpdb->prepare() with placeholders
754. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/OrdersTableMetaQuery.php:565
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$meta_compare_string = $meta_compare_string_start . "AND $subquery_alias.meta_key LIKE %s " . $meta_compare_string_end;
Recommendation: Use $wpdb->prepare() with placeholders
755. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/OrdersTableMetaQuery.php:572
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$meta_compare_string = $meta_compare_string_start . "AND $subquery_alias.meta_key IN " . $array_subclause . $meta_compare_string_end;
Recommendation: Use $wpdb->prepare() with placeholders
756. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/OrdersTableMetaQuery.php:583
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$meta_compare_string = $meta_compare_string_start . "AND $subquery_alias.meta_key REGEXP $cast %s " . $meta_compare_string_end;
Recommendation: Use $wpdb->prepare() with placeholders
757. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/DataStores/Orders/DataSynchronizer.php:879
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->prefix}wc_orders_meta WHERE id IN {$order_id_rows_as_sql_list}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
758. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:135
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->error( "Validation failed for product: {$product_name} - " . $validation_result['message'], array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
759. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Exception importing product: {$product_name} after {$duration}s - " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
760. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:640
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->warning( "Failed to create attribute '{$attr_name}': " . $attribute_id->get_error_message(), array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
761. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:686
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->warning( "Failed to insert term '{$value}' (slug: {$term_slug}) into {$taxonomy_name}: " . $term_result->get_error_message(), array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
762. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:965
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->warning( "Failed to insert term '{$term_name}' (slug: {$term_slug}) into {$taxonomy}: " . $term_result->get_error_message(), array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
763. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:1024
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->error( "Error uploading {$image_url}: " . $attachment_id->get_error_message() . " (Duration: {$duration}s)", array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
764. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:135
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->error( "Validation failed for product: {$product_name} - " . $validation_result['message'], array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders
765. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Exception importing product: {$product_name} after {$duration}s - " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders
766. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:640
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->warning( "Failed to create attribute '{$attr_name}': " . $attribute_id->get_error_message(), array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders
767. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:686
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->warning( "Failed to insert term '{$value}' (slug: {$term_slug}) into {$taxonomy_name}: " . $term_result->get_error_message(), array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders
768. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:965
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->warning( "Failed to insert term '{$term_name}' (slug: {$term_slug}) into {$taxonomy}: " . $term_result->get_error_message(), array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders
769. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/WooCommerceProductImporter.php:1024
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
wc_get_logger()->error( "Error uploading {$image_url}: " . $attachment_id->get_error_message() . " (Duration: {$duration}s)", array( 'source' => 'wc-migrator' ) );
Recommendation: Use $wpdb->prepare() with placeholders
770. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/ProductsController.php:786
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"DRY RUN: Could not update import stats for '{$stat_key}': " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
771. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Core/ProductsController.php:786
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"DRY RUN: Could not update import stats for '{$stat_key}': " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders
772. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Platforms/Shopify/ShopifyClient.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"REST request to {$path} failed with status code {$response_code}: " . $error_message
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
773. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Platforms/Shopify/ShopifyClient.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"GraphQL request failed with status code {$response_code}: " . $error_message
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
774. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Platforms/Shopify/ShopifyClient.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"REST request to {$path} failed with status code {$response_code}: " . $error_message
Recommendation: Use $wpdb->prepare() with placeholders
775. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/CLI/Migrator/Platforms/Shopify/ShopifyClient.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"GraphQL request failed with status code {$response_code}: " . $error_message
Recommendation: Use $wpdb->prepare() with placeholders
776. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductDownloads/ApprovedDirectories/Register.php:448
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ( ! $wpdb->query( "DELETE FROM {$this->get_table()}" ) ) { // phpcs:ignore WordPress.DB.PreparedSQL.InterpolatedNotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
777. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductDownloads/ApprovedDirectories/Register.php:501
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ( ! $wpdb->query( "UPDATE {$this->get_table()} SET enabled = 1" ) ) { // phpcs:ignore WordPress.DB.PreparedSQL.InterpolatedNotPrepared
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
778. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Internal/ProductDownloads/ApprovedDirectories/Register.php:518
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if ( ! $wpdb->query( "UPDATE {$this->get_table()} SET enabled = 0" ) ) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
779. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Blocks/BlockTypes/CustomerAccount.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<a " . $aria_label . " href='" . esc_attr( $account_link ) . "'>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
780. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Blocks/BlockTypes/CustomerAccount.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<a " . $aria_label . " href='" . esc_attr( $account_link ) . "'>
Recommendation: Use $wpdb->prepare() with placeholders
781. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Blocks/BlockTypes/CheckoutOrderSummaryBlock.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$order_summary_totals_content .= "\n" . $inner_block_content;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
782. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Blocks/BlockTypes/CheckoutOrderSummaryBlock.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$order_summary_totals_content .= "\n" . $inner_block_content;
Recommendation: Use $wpdb->prepare() with placeholders
783. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Blocks/BlockTypes/CartOrderSummaryBlock.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$order_summary_totals_content .= "\n" . $inner_block_content;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
784. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Blocks/BlockTypes/CartOrderSummaryBlock.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$order_summary_totals_content .= "\n" . $inner_block_content;
Recommendation: Use $wpdb->prepare() with placeholders
785. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Blocks/BlockTypes/AbstractProductGrid.php:416
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$product_variations = $wpdb->get_results( "SELECT ID as variation_id, post_parent as product_id from {$wpdb->posts} WHERE post_parent IN ( " . implode( ',', $prime_product_ids ) . ' )', ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
786. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Admin/Features/Blueprint/Exporters/ExportWCSettingsShipping.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->get_results( "SELECT * FROM {$wpdb->prefix}woocommerce_shipping_zones", ARRAY_A )
Recommendation: Use $wpdb->prepare() with placeholders
787. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Admin/Features/Blueprint/Exporters/ExportWCSettingsShipping.php:146
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->get_results( "SELECT * FROM {$wpdb->prefix}woocommerce_shipping_zone_locations", ARRAY_A )
Recommendation: Use $wpdb->prepare() with placeholders
788. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Admin/Features/Blueprint/Exporters/ExportWCSettingsShipping.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$methods = $wpdb->get_results( "SELECT * FROM {$wpdb->prefix}woocommerce_shipping_zone_methods", ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
789. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Admin/API/Reports/Orders/Stats/DataStore.php:253
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$where_filters[] = "{$orders_stats_table}.order_id IN (" . $attribute_subquery->get_query_statement() . ')';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
790. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/src/Admin/API/Reports/Orders/Stats/DataStore.php:253
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$where_filters[] = "{$orders_stats_table}.order_id IN (" . $attribute_subquery->get_query_statement() . ')';
Recommendation: Use $wpdb->prepare() with placeholders
791. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/templates/emails/plain/email-order-details.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo wp_kses_post( $total['label'] . "\t " . $total['value'] ) . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
792. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce/templates/emails/plain/email-order-details.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo wp_kses_post( $total['label'] . "\t " . $total['value'] ) . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
793. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/temp_integration_test_page.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->fail("$class: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
794. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/temp_integration_test_page.php:372
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<li style='color: red;'>" . $result['message'] . "</li>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
795. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/temp_integration_test_page.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->fail("$class: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
796. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/temp_integration_test_page.php:372
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<li style='color: red;'>" . $result['message'] . "</li>";
Recommendation: Use $wpdb->prepare() with placeholders
797. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/temp_integration_test.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->fail("$class: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
798. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/temp_integration_test.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->fail("$class: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
799. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
800. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
801. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
802. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
803. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
804. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
805. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
806. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
807. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
808. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
809. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
810. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
811. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
812. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
813. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
814. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
815. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
816. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
817. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
818. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
819. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
820. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
821. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
822. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
823. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
824. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
825. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
826. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/dev/dBug.class.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
827. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/core/PluginInstaller.class.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('error',"Installation of $type `{$slug}` failed (".$installed->get_error_message().')');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
828. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/core/PluginInstaller.class.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('error',"Installation of $type `{$slug}` failed (".$installed->get_error_message().')');
Recommendation: Use $wpdb->prepare() with placeholders
829. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/core/WordpressPages.class.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('info', "Page already exists:" . $title_of_the_page);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
830. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/core/WordpressPages.class.php:109
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('success', "Created page_id=". $page_id." for page '".$title_of_the_page);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
831. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/core/WordpressPages.class.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('info', "Page already exists:" . $title_of_the_page);
Recommendation: Use $wpdb->prepare() with placeholders
832. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/.old-4.3.08/includes/core/WordpressPages.class.php:109
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('success', "Created page_id=". $page_id." for page '".$title_of_the_page);
Recommendation: Use $wpdb->prepare() with placeholders
833. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
834. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
835. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
836. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
837. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
838. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
839. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
840. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
841. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
842. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
843. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
844. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
845. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
846. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
847. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
848. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
849. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
850. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
851. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
852. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
853. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
854. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
855. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
856. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
857. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
858. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
859. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
860. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/dev/dBug.class.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
861. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/core/PluginInstaller.class.php:236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('error',"Installation of $type `{$slug}` failed (".$installed->get_error_message().')');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
862. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/core/PluginInstaller.class.php:236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('error',"Installation of $type `{$slug}` failed (".$installed->get_error_message().')');
Recommendation: Use $wpdb->prepare() with placeholders
863. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/core/WordpressPages.class.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('info', "Page already exists:" . $title_of_the_page);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
864. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/core/WordpressPages.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('success', "Created page_id=". $page_id." for page '".$title_of_the_page);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
865. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/core/WordpressPages.class.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('info', "Page already exists:" . $title_of_the_page);
Recommendation: Use $wpdb->prepare() with placeholders
866. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-client/includes/core/WordpressPages.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('success', "Created page_id=". $page_id." for page '".$title_of_the_page);
Recommendation: Use $wpdb->prepare() with placeholders
867. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Admin/Admin.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$htmlCount = $htmlCount ? "<div class=\"{$classes}\">" . $htmlCount . '</div>' : '';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
868. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Admin/Admin.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$htmlCount = $htmlCount ? "<div class=\"{$classes}\">" . $htmlCount . '</div>' : '';
Recommendation: Use $wpdb->prepare() with placeholders
869. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Utils/Database.php:418
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $this->db->get_results( "SHOW TABLES LIKE '" . $table . "'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
870. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Utils/Database.php:418
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $this->db->get_results( "SHOW TABLES LIKE '" . $table . "'" );
Recommendation: Use $wpdb->prepare() with placeholders
871. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Core/Core.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->posts} WHERE post_type = 'aioseo-location'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
872. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Core/Core.php:148
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->term_taxonomy} WHERE taxonomy = 'aioseo-location-category'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
873. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Core/Core.php:151
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE 'aioseo\_%'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
874. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Core/Core.php:154
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_aioseo\_%'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
875. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Core/Core.php:155
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE 'aioseo\_%'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
876. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Core/Core.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->prefix}actionscheduler_actions WHERE hook LIKE 'aioseo\_%'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
877. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Core/Core.php:159
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->prefix}actionscheduler_groups WHERE slug = 'aioseo'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
878. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Meta/Links.php:152
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$url = trailingslashit( get_permalink() ) . user_trailingslashit( "$wp_rewrite->pagination_base/" . $number, 'single_paged' );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
879. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/app/Common/Meta/Links.php:152
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$url = trailingslashit( get_permalink() ) . user_trailingslashit( "$wp_rewrite->pagination_base/" . $number, 'single_paged' );
Recommendation: Use $wpdb->prepare() with placeholders
880. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Formatter/LineFormatter.php:123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "\n[stacktrace]\n" . $e->getTraceAsString() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
881. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Formatter/LineFormatter.php:123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "\n[stacktrace]\n" . $e->getTraceAsString() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
882. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Formatter/HtmlFormatter.php:49
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<tr style=\"padding: 4px;text-align: left;\">\n<th style=\"vertical-align: top;background: #ccc;color: #000\" width=\"100\">{$th}:</th>\n<td style=\"padding: 4px;text-align: left;vertical-align: top;background: #eee;color: #000\">" . $td . "</td>\n</tr>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
883. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Formatter/HtmlFormatter.php:49
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<tr style=\"padding: 4px;text-align: left;\">\n<th style=\"vertical-align: top;background: #ccc;color: #000\" width=\"100\">{$th}:</th>\n<td style=\"padding: 4px;text-align: left;vertical-align: top;background: #eee;color: #000\">" . $td . "</td>\n</tr>";
Recommendation: Use $wpdb->prepare() with placeholders
884. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Handler/IFTTTHandler.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
\curl_setopt($ch, \CURLOPT_URL, "https://maker.ifttt.com/trigger/" . $this->eventName . "/with/key/" . $this->secretKey);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
885. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Handler/IFTTTHandler.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
\curl_setopt($ch, \CURLOPT_URL, "https://maker.ifttt.com/trigger/" . $this->eventName . "/with/key/" . $this->secretKey);
Recommendation: Use $wpdb->prepare() with placeholders
886. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Handler/SyslogUdpHandler.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<{$priority}>" . $date . " " . $hostname . " " . $this->ident . "[" . $pid . "]: ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
887. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Handler/SyslogUdpHandler.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<{$priority}>1 " . $date . " " . $hostname . " " . $this->ident . " " . $pid . " - - ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
888. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Handler/SyslogUdpHandler.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<{$priority}>" . $date . " " . $hostname . " " . $this->ident . "[" . $pid . "]: ";
Recommendation: Use $wpdb->prepare() with placeholders
889. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Handler/SyslogUdpHandler.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<{$priority}>1 " . $date . " " . $hostname . " " . $this->ident . " " . $pid . " - - ";
Recommendation: Use $wpdb->prepare() with placeholders
890. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Handler/FlowdockHandler.php:107
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = "POST /v1/messages/team_inbox/" . $this->apiToken . " HTTP/1.1\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
891. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-seo-pack-pro/vendor_prefixed/monolog/monolog/src/Monolog/Handler/FlowdockHandler.php:107
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = "POST /v1/messages/team_inbox/" . $this->apiToken . " HTTP/1.1\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
892. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:742
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( $wpdb->prepare( "DELETE FROM {$wpdb->comments} WHERE comment_id IN ( " . $format_string . ' )', $comment_ids ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
893. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:743
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( $wpdb->prepare( "DELETE FROM {$wpdb->commentmeta} WHERE comment_id IN ( " . $format_string . ' )', $comment_ids ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
894. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:755
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "OPTIMIZE TABLE {$wpdb->comments}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
895. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:788
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "OPTIMIZE TABLE {$wpdb->commentmeta}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
896. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:828
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "OPTIMIZE TABLE {$wpdb->commentmeta}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
897. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:862
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $wpdb->get_var( $wpdb->prepare( "SELECT COUNT(*) FROM {$wpdb->comments} WHERE user_id = %d AND comment_approved = 1" . $comment_type_where, $user_id ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
898. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:866
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $wpdb->get_var( $wpdb->prepare( "SELECT COUNT(*) FROM {$wpdb->comments} WHERE comment_author_email = %s AND comment_author = %s AND comment_author_url = %s AND comment_approved = 1" . $comment_type_where, $comment_author_email, $comment_author, $comment_author_url ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
899. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:742
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( $wpdb->prepare( "DELETE FROM {$wpdb->comments} WHERE comment_id IN ( " . $format_string . ' )', $comment_ids ) );
Recommendation: Use $wpdb->prepare() with placeholders
900. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:743
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( $wpdb->prepare( "DELETE FROM {$wpdb->commentmeta} WHERE comment_id IN ( " . $format_string . ' )', $comment_ids ) );
Recommendation: Use $wpdb->prepare() with placeholders
901. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:862
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $wpdb->get_var( $wpdb->prepare( "SELECT COUNT(*) FROM {$wpdb->comments} WHERE user_id = %d AND comment_approved = 1" . $comment_type_where, $user_id ) );
Recommendation: Use $wpdb->prepare() with placeholders
902. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/akismet/class.akismet.php:866
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (int) $wpdb->get_var( $wpdb->prepare( "SELECT COUNT(*) FROM {$wpdb->comments} WHERE comment_author_email = %s AND comment_author = %s AND comment_author_url = %s AND comment_approved = 1" . $comment_type_where, $comment_author_email, $comment_author, $comment_author_url ) );
Recommendation: Use $wpdb->prepare() with placeholders
903. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/cxq-updater-host.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DROP TABLE IF EXISTS {$wpdb->prefix}quigs_plugin_library");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
904. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:214
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Request URL: " . $url);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
905. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:230
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API WP Error: " . $response->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
906. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:237
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Response Code: " . $response_code);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
907. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Error Message: " . $error_message);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
908. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Error Code: HTTP " . $response_code);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
909. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:247
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Error Body: " . $response_body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
910. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:252
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Success: " . $url);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
911. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:214
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Request URL: " . $url);
Recommendation: Use $wpdb->prepare() with placeholders
912. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:230
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API WP Error: " . $response->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
913. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:237
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Response Code: " . $response_code);
Recommendation: Use $wpdb->prepare() with placeholders
914. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Error Message: " . $error_message);
Recommendation: Use $wpdb->prepare() with placeholders
915. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Error Code: HTTP " . $response_code);
Recommendation: Use $wpdb->prepare() with placeholders
916. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:247
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Error Body: " . $response_body);
Recommendation: Use $wpdb->prepare() with placeholders
917. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-updater-host/includes/class-quigs-host-github.php:252
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("System.out.println: GitHub API Success: " . $url);
Recommendation: Use $wpdb->prepare() with placeholders
918. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/cxq-google-hours.php:131
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '_transient_cxq_google_hours_%'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
919. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/cxq-google-hours.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '_transient_timeout_cxq_google_hours_%'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
920. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
921. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
922. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
923. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
924. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
925. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
926. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
927. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-google-hours/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
928. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-ajax-layered-nav/widgets/class-sod-widget-ajax-layered-nav.php:844
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['join'] . $meta_query_sql['join'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
929. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-ajax-layered-nav/widgets/class-sod-widget-ajax-layered-nav.php:849
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['where'] . $meta_query_sql['where'] . "
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
930. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-ajax-layered-nav/widgets/class-sod-widget-ajax-layered-nav.php:844
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['join'] . $meta_query_sql['join'];
Recommendation: Use $wpdb->prepare() with placeholders
931. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-ajax-layered-nav/widgets/class-sod-widget-ajax-layered-nav.php:849
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $tax_query_sql['where'] . $meta_query_sql['where'] . "
Recommendation: Use $wpdb->prepare() with placeholders
932. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Events/Custom_Tables/V1/Schema_Builder/Schema_Builder.php:247
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->get_results( "SELECT 1 FROM {$wpdb->posts} LIMIT 1" );
Recommendation: Use $wpdb->prepare() with placeholders
933. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Events/Custom_Tables/V1/Schema_Builder/Abstract_Custom_Table.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $wpdb->query( "TRUNCATE {$this_table}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
934. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Events/Custom_Tables/V1/Schema_Builder/Abstract_Custom_Table.php:236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $wpdb->query( "DROP TABLE `{$this_table}`" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
935. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Events/Custom_Tables/V1/Tables/Events.php:93
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$updated = $wpdb->query( "ALTER TABLE `{$table_name}`ADD UNIQUE( `post_id` )" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
936. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Events/Custom_Tables/V1/Tables/Occurrences.php:123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$updated = $wpdb->query( "ALTER TABLE {$this_table} DROP FOREIGN KEY {$foreign_key_name}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
937. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Events/Custom_Tables/V1/Tables/Occurrences.php:134
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$updated = $wpdb->query( "ALTER TABLE `{$this_table}`ADD UNIQUE( `hash` )" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
938. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Tribe/Aggregator/Errors.php:324
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$count = $wpdb->get_results( "SELECT comment_approved, COUNT( * ) AS num_comments FROM {$wpdb->comments} {$where} GROUP BY comment_approved", ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
939. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Tribe/Importer/File_Uploader.php:34
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
$moved = move_uploaded_file( $this->tmp_name, self::get_file_path() );
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
940. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Tribe/Google/Maps_API_Key.php:23
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
public static $default_api_key = 'AIzaSyDNsicAsP6-VuGtAb1O9riI3oc_NOb7IOU';
Recommendation: Move credentials to environment variables or secure configuration
941. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Tribe/Aggregator/CLI/Command.php:582
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
WP_CLI::error( "Could not create child record for record {$record_id}: " . $record->get_error_message() );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
942. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/src/Tribe/Aggregator/CLI/Command.php:582
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
WP_CLI::error( "Could not create child record for record {$record_id}: " . $record->get_error_message() );
Recommendation: Use $wpdb->prepare() with placeholders
943. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Promise.php:156
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "\n\t" . $error_message;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
944. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Promise.php:253
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "\n\t" . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
945. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Promise.php:156
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "\n\t" . $error_message;
Recommendation: Use $wpdb->prepare() with placeholders
946. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Promise.php:253
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "\n\t" . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
947. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Utils/Color.php:371
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "{$prefix}background-color: #".$this->_hex.";{$suffix}";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
948. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Utils/Color.php:374
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "{$prefix}filter: progid:DXImageTransform.Microsoft.gradient(startColorstr='#".$g['light']."', endColorstr='#".$g['dark']."');{$suffix}";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
949. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Utils/Color.php:371
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "{$prefix}background-color: #".$this->_hex.";{$suffix}";
Recommendation: Use $wpdb->prepare() with placeholders
950. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Utils/Color.php:374
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "{$prefix}filter: progid:DXImageTransform.Microsoft.gradient(startColorstr='#".$g['light']."', endColorstr='#".$g['dark']."');{$suffix}";
Recommendation: Use $wpdb->prepare() with placeholders
951. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Editor/Blocks/Abstract.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
'Block Attributes: ' . "\n" . $json_string .
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
952. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/the-events-calendar/common/src/Tribe/Editor/Blocks/Abstract.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
'Block Attributes: ' . "\n" . $json_string .
Recommendation: Use $wpdb->prepare() with placeholders
953. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/upgrader.php:594
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE `option_name` = 'mphb_ical_sync_rooms_queue_processed_data'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
954. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/upgrader.php:896
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wp_mphb_sync_logs} DROP COLUMN log_context" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
955. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/upgrader.php:897
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wp_mphb_sync_logs} MODIFY COLUMN log_message VARCHAR(150)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
956. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/i-cal/queue.php:315
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $item . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
957. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/i-cal/queue.php:315
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $item . "'";
Recommendation: Use $wpdb->prepare() with placeholders
958. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/emogrifier/emogrifier.php:427
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "\n\n" . $styleNode->nodeValue;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
959. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/emogrifier/emogrifier.php:427
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "\n\n" . $styleNode->nodeValue;
Recommendation: Use $wpdb->prepare() with placeholders
960. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/wp-meta-query/wp-meta-query.php:490
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql['where'] = '( ' . "\n " . $indent . implode( ' ' . "\n " . $indent . $relation . ' ' . "\n " . $indent, $sql_chunks['where'] ) . "\n" . $indent . ')';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
961. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/wp-meta-query/wp-meta-query.php:490
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql['where'] = '( ' . "\n " . $indent . implode( ' ' . "\n " . $indent . $relation . ' ' . "\n " . $indent, $sql_chunks['where'] ) . "\n" . $indent . ')';
Recommendation: Use $wpdb->prepare() with placeholders
962. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/timezone.php:115
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$datanode = new ZCiCalDataNode("TZOFFSETFROM:".$offset);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
963. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/timezone.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$datanode = new ZCiCalDataNode("TZOFFSETTO:".$offset);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
964. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/timezone.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$datanode = new ZCiCalDataNode("TZNAME:".$transition["abbr"]);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
965. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/timezone.php:115
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$datanode = new ZCiCalDataNode("TZOFFSETFROM:".$offset);
Recommendation: Use $wpdb->prepare() with placeholders
966. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/timezone.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$datanode = new ZCiCalDataNode("TZOFFSETTO:".$offset);
Recommendation: Use $wpdb->prepare() with placeholders
967. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/timezone.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$datanode = new ZCiCalDataNode("TZNAME:".$transition["abbr"]);
Recommendation: Use $wpdb->prepare() with placeholders
968. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "$i: " . $tline[$i] . ", ord() = " . ord($tline[$i]) . "<br>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
969. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "value: " . $tvalue . "<br>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
970. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "creating " . $this->getName();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
971. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " child of " . $_parent->getName() . "/" . count($this->parentnode->child);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
972. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:258
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "moving from " . $this->getName() . " to " . $this->child[0]->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
973. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$txtstr .= "BEGIN:" . $node->getName() . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
974. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:319
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$p .= ";" . strtoupper($key) . "=" . $value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
975. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:326
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$line = $d->getName() . $p . ":" . $values;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
976. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:346
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$txtstr .= "END:" . $node->getName() . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
977. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:398
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
// echo ($linecount + 1) . ": " . $line . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
978. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:417
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "new node: " . $this->curnode->name . "<br/>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
979. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:420
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "parent of " . $this->curnode->getName() . " is " . $this->curnode->getParent()->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
980. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:422
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "parent of " . $this->curnode->getName() . " is null<br/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
981. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:434
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//die("Can't read iCal file structure, expecting " . $this->curnode->getName() . " but reading $name instead");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
982. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:435
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Can't read iCal file structure, expecting " . $this->curnode->getName() . " but reading $name instead");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
983. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:438
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "moving up from " . $this->curnode->getName() ;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
984. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:440
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo " to " . $this->curnode->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
985. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:450
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//die("Can't read iCal file structure, expecting " . $this->curnode->getName() . " but reading $name instead");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
986. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:451
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Can't read iCal file structure, expecting " . $this->curnode->getName() . " but reading $name instead");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
987. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:454
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "moving up from " . $this->curnode->getName() ;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
988. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:456
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo " to " . $this->curnode->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
989. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:659
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "moving from " . $thisnode->getName() . " to " . $thisnode->child[0]->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
990. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:818
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "rule: " . $tzvalues["rrule"] . "<br/>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
991. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "$i: " . $tline[$i] . ", ord() = " . ord($tline[$i]) . "<br>\n";
Recommendation: Use $wpdb->prepare() with placeholders
992. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "value: " . $tvalue . "<br>\n";
Recommendation: Use $wpdb->prepare() with placeholders
993. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "creating " . $this->getName();
Recommendation: Use $wpdb->prepare() with placeholders
994. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " child of " . $_parent->getName() . "/" . count($this->parentnode->child);
Recommendation: Use $wpdb->prepare() with placeholders
995. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:258
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "moving from " . $this->getName() . " to " . $this->child[0]->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders
996. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$txtstr .= "BEGIN:" . $node->getName() . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
997. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:319
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$p .= ";" . strtoupper($key) . "=" . $value;
Recommendation: Use $wpdb->prepare() with placeholders
998. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:326
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$line = $d->getName() . $p . ":" . $values;
Recommendation: Use $wpdb->prepare() with placeholders
999. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:346
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$txtstr .= "END:" . $node->getName() . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1000. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:398
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
// echo ($linecount + 1) . ": " . $line . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders
1001. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:417
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "new node: " . $this->curnode->name . "<br/>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1002. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:420
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "parent of " . $this->curnode->getName() . " is " . $this->curnode->getParent()->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders
1003. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:422
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "parent of " . $this->curnode->getName() . " is null<br/>";
Recommendation: Use $wpdb->prepare() with placeholders
1004. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:434
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//die("Can't read iCal file structure, expecting " . $this->curnode->getName() . " but reading $name instead");
Recommendation: Use $wpdb->prepare() with placeholders
1005. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:435
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Can't read iCal file structure, expecting " . $this->curnode->getName() . " but reading $name instead");
Recommendation: Use $wpdb->prepare() with placeholders
1006. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:438
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "moving up from " . $this->curnode->getName() ;
Recommendation: Use $wpdb->prepare() with placeholders
1007. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:440
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo " to " . $this->curnode->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders
1008. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:450
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//die("Can't read iCal file structure, expecting " . $this->curnode->getName() . " but reading $name instead");
Recommendation: Use $wpdb->prepare() with placeholders
1009. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:451
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Can't read iCal file structure, expecting " . $this->curnode->getName() . " but reading $name instead");
Recommendation: Use $wpdb->prepare() with placeholders
1010. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:454
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "moving up from " . $this->curnode->getName() ;
Recommendation: Use $wpdb->prepare() with placeholders
1011. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:456
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo " to " . $this->curnode->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders
1012. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:659
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "moving from " . $thisnode->getName() . " to " . $thisnode->child[0]->getName() . "<br/>";
Recommendation: Use $wpdb->prepare() with placeholders
1013. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/ical.php:818
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "rule: " . $tzvalues["rrule"] . "<br/>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1014. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo $item[0] . "=" . $item[1] . "<br/>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1015. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:218
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "ZCRecurringDate() error:" . $this->error . "<br />\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1016. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:250
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byYear() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1017. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:273
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byMonth() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1018. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:287
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(2,"mktime(" . $t['hours'] . ", " . $t['minutes']
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1019. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:288
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
. ", " . $t['mon'] . ", " . $day . ", " . $t['year'] . ") returned $wdate");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1020. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byMonthDay() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1021. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:383
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byDay() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1022. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:407
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byHour() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1023. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:430
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byMinute() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1024. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:448
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"bySecond() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1025. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:469
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(2,"freq: " . $this->freq . ", interval: " . $this->interval);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1026. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:590
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(2,ZDateHelper::toSQLDateTime($rdate) . " " . $d["wday"] );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1027. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo $item[0] . "=" . $item[1] . "<br/>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1028. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:218
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "ZCRecurringDate() error:" . $this->error . "<br />\n";
Recommendation: Use $wpdb->prepare() with placeholders
1029. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:250
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byYear() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders
1030. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:273
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byMonth() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders
1031. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:287
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(2,"mktime(" . $t['hours'] . ", " . $t['minutes']
Recommendation: Use $wpdb->prepare() with placeholders
1032. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:288
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
. ", " . $t['mon'] . ", " . $day . ", " . $t['year'] . ") returned $wdate");
Recommendation: Use $wpdb->prepare() with placeholders
1033. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byMonthDay() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders
1034. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:383
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byDay() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders
1035. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:407
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byHour() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders
1036. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:430
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"byMinute() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders
1037. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:448
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(1,"bySecond() returned " . $count );
Recommendation: Use $wpdb->prepare() with placeholders
1038. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:469
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(2,"freq: " . $this->freq . ", interval: " . $this->interval);
Recommendation: Use $wpdb->prepare() with placeholders
1039. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/recurringdate.php:590
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug(2,ZDateHelper::toSQLDateTime($rdate) . " " . $d["wday"] );
Recommendation: Use $wpdb->prepare() with placeholders
1040. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/date.php:451
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$daydatetime = new DateTime("@" . $udate);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1041. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/date.php:479
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$date->sub(new DateInterval("PT".$offset."S"));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1042. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/date.php:451
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$daydatetime = new DateTime("@" . $udate);
Recommendation: Use $wpdb->prepare() with placeholders
1043. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/libraries/ZContent-icalendar/includes/date.php:479
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$date->sub(new DateInterval("PT".$offset."S"));
Recommendation: Use $wpdb->prepare() with placeholders
1044. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/includes/post-types/booking-cpt/logs.php:124
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$count = $wpdb->get_results( "SELECT comment_approved, COUNT( * ) AS total FROM {$wpdb->comments} {$where} GROUP BY comment_approved", ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
1045. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/Util.php:115
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception\Unexpected("Unexpected exception:" . $message);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1046. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/Util.php:115
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception\Unexpected("Unexpected exception:" . $message);
Recommendation: Use $wpdb->prepare() with placeholders
1047. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/WebhookTestingGateway.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$signature = $publicKey . "|" . $sha;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1048. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/WebhookTestingGateway.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$signature = $publicKey . "|" . $sha;
Recommendation: Use $wpdb->prepare() with placeholders
1049. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/SignatureService.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $this->hash($payload) . "|" . $payload;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1050. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/SignatureService.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $this->hash($payload) . "|" . $payload;
Recommendation: Use $wpdb->prepare() with placeholders
1051. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/Error/ValidationErrorCollection.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $this->forKey("index" . $index);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1052. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/Error/ValidationErrorCollection.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $this->forKey("index" . $index);
Recommendation: Use $wpdb->prepare() with placeholders
1053. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/Test/VenmoSdk.php:16
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "stub-" . $number;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1054. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/motopress-hotel-booking/vendors/braintree-sdk/lib/Braintree/Test/VenmoSdk.php:16
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "stub-" . $number;
Recommendation: Use $wpdb->prepare() with placeholders
1055. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:97
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE 'wp\_mail\_smtp%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1056. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->usermeta} WHERE meta_key LIKE 'wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1057. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:103
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_transient\_wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1058. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:104
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_site\_transient\_wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1059. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:105
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_transient\_timeout\_wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1060. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:106
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_site\_transient\_timeout\_wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1061. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE 'wp\_mail\_smtp%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1062. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:193
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->usermeta} WHERE meta_key LIKE 'wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1063. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_transient\_wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1064. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:197
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_site\_transient\_wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1065. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_transient\_timeout\_wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1066. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/uninstall.php:199
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$wpdb->options} WHERE option_name LIKE '\_site\_transient\_timeout\_wp\_mail\_smtp\_%'" ); // phpcs:ignore WordPress.DB
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1067. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/src/MailCatcherTrait.php:240
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error_message = 'Mailer: ' . esc_html( wp_mail_smtp()->get_providers()->get_options( $mailer_slug )->get_title() ) . "\r\n" . $this->ErrorInfo;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1068. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/src/MailCatcherTrait.php:240
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error_message = 'Mailer: ' . esc_html( wp_mail_smtp()->get_providers()->get_options( $mailer_slug )->get_title() ) . "\r\n" . $this->ErrorInfo;
Recommendation: Use $wpdb->prepare() with placeholders
1069. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/google/apiclient/src/AccessToken/Verify.php:146
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new GoogleException("Failed to retrieve verification certificates: '" . $url . "'.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1070. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/google/apiclient/src/AccessToken/Verify.php:146
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new GoogleException("Failed to retrieve verification certificates: '" . $url . "'.");
Recommendation: Use $wpdb->prepare() with placeholders
1071. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/google/apiclient/src/Http/Batch.php:85
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$body .= \sprintf($batchHttpTemplate, $this->boundary, $key, $firstLine, $headers, $content ? "\n" . $content : '');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1072. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/google/apiclient/src/Http/Batch.php:85
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$body .= \sprintf($batchHttpTemplate, $this->boundary, $key, $firstLine, $headers, $content ? "\n" . $content : '');
Recommendation: Use $wpdb->prepare() with placeholders
1073. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/google/apiclient/src/Utils/UriTemplate.php:192
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$values[] = $pkey . "=" . $pvalue;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1074. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/google/apiclient/src/Utils/UriTemplate.php:192
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$values[] = $pkey . "=" . $pvalue;
Recommendation: Use $wpdb->prepare() with placeholders
1075. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/guzzle/src/MessageFormatter.php:84
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = \trim($request->getMethod() . ' ' . $request->getRequestTarget()) . ' HTTP/' . $request->getProtocolVersion() . "\r\n" . $this->headers($request);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1076. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/guzzle/src/MessageFormatter.php:87
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $response ? \sprintf('HTTP/%s %d %s', $response->getProtocolVersion(), $response->getStatusCode(), $response->getReasonPhrase()) . "\r\n" . $this->headers($response) : 'NULL';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1077. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/guzzle/src/MessageFormatter.php:84
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = \trim($request->getMethod() . ' ' . $request->getRequestTarget()) . ' HTTP/' . $request->getProtocolVersion() . "\r\n" . $this->headers($request);
Recommendation: Use $wpdb->prepare() with placeholders
1078. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/guzzle/src/MessageFormatter.php:87
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $response ? \sprintf('HTTP/%s %d %s', $response->getProtocolVersion(), $response->getStatusCode(), $response->getReasonPhrase()) . "\r\n" . $this->headers($response) : 'NULL';
Recommendation: Use $wpdb->prepare() with placeholders
1079. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/psr7/src/Message.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$msg .= "\r\nHost: " . $message->getUri()->getHost();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1080. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/psr7/src/Message.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$msg .= "\r\n{$name}: " . $value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1081. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/psr7/src/Message.php:37
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "{$msg}\r\n\r\n" . $message->getBody();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1082. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/psr7/src/Message.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$msg .= "\r\nHost: " . $message->getUri()->getHost();
Recommendation: Use $wpdb->prepare() with placeholders
1083. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/psr7/src/Message.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$msg .= "\r\n{$name}: " . $value;
Recommendation: Use $wpdb->prepare() with placeholders
1084. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/psr7/src/Message.php:37
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "{$msg}\r\n\r\n" . $message->getBody();
Recommendation: Use $wpdb->prepare() with placeholders
1085. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/psr7/src/UploadedFile.php:127
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
$this->moved = \PHP_SAPI === 'cli' ? \rename($this->file, $targetPath) : \move_uploaded_file($this->file, $targetPath);
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
1086. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/psr/http-message/src/UploadedFileInterface.php:35
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
* Use this method as an alternative to move_uploaded_file(). This method is
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
1087. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/psr/http-message/src/UploadedFileInterface.php:38
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
* appropriate method (move_uploaded_file(), rename(), or a stream
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
1088. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/wp-mail-smtp/vendor_prefixed/psr/http-message/src/UploadedFileInterface.php:51
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
* files via moveTo(), is_uploaded_file() and move_uploaded_file() SHOULD be
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
1089. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityformsuserregistration/class-gf-user-registration.php:4282
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
AND EXISTS ( SELECT 1 FROM {$wpdb->usermeta} as meta2 WHERE meta1.user_id = meta2.user_id and meta2.meta_key = '" . $wpdb->get_blog_prefix() . "capabilities' )",
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1090. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityformsuserregistration/class-gf-user-registration.php:4282
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
AND EXISTS ( SELECT 1 FROM {$wpdb->usermeta} as meta2 WHERE meta1.user_id = meta2.user_id and meta2.meta_key = '" . $wpdb->get_blog_prefix() . "capabilities' )",
Recommendation: Use $wpdb->prepare() with placeholders
1091. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityformsuserregistration/includes/signups.php:15
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$column_exists = $wpdb->query( "SHOW COLUMNS FROM {$wpdb->signups} LIKE 'signup_id'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1092. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib-3rd-party/XLSXWriter.php:92
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$zip->addFile($sheet->filename, "xl/worksheets/" . $sheet->xmlname );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1093. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib-3rd-party/XLSXWriter.php:92
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$zip->addFile($sheet->filename, "xl/worksheets/" . $sheet->xmlname );
Recommendation: Use $wpdb->prepare() with placeholders
1094. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Form/BlockStylesRenderer.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rules[] = "font-size:" . $styles['font_size'] . (is_numeric($styles['font_size']) ? "px;" : ";");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1095. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Form/BlockStylesRenderer.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rules[] = "font-size:" . $formSettings['fontSize'] . (is_numeric($formSettings['fontSize']) ? "px;" : ";");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1096. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Form/BlockStylesRenderer.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rules[] = "font-size:" . $styles['font_size'] . (is_numeric($styles['font_size']) ? "px;" : ";");
Recommendation: Use $wpdb->prepare() with placeholders
1097. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Form/BlockStylesRenderer.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rules[] = "font-size:" . $formSettings['fontSize'] . (is_numeric($formSettings['fontSize']) ? "px;" : ";");
Recommendation: Use $wpdb->prepare() with placeholders
1098. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Form/BlockWrapperRenderer.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$classes = isset($block['params']['class_name']) ? " " . $block['params']['class_name'] : '';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1099. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Form/BlockWrapperRenderer.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$classes = isset($block['params']['class_name']) ? " " . $block['params']['class_name'] : '';
Recommendation: Use $wpdb->prepare() with placeholders
1100. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Newsletter/AutomatedLatestContent.php:40
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
. $newsletterPostsTableName . ".newsletter_id='" . $this->newsletterId . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1101. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Newsletter/AutomatedLatestContent.php:40
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
. $newsletterPostsTableName . ".newsletter_id='" . $this->newsletterId . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1102. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Newsletter/DynamicProducts.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
. $newsletterPostsTableName . ".newsletter_id='" . $this->newsletterId . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1103. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Newsletter/DynamicProducts.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
. $newsletterPostsTableName . ".newsletter_id='" . $this->newsletterId . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1104. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Features/FeatureFlagsRepository.php:44
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new \RuntimeException("Error when saving feature " . $data['name']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1105. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Features/FeatureFlagsRepository.php:44
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new \RuntimeException("Error when saving feature " . $data['name']);
Recommendation: Use $wpdb->prepare() with placeholders
1106. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/SubscribersFinder.php:144
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "INSERT IGNORE INTO $scheduledTaskSubscriberTable (task_id, subscriber_id, processed) " . $selectQueryBuilder->getSQL();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1107. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/SubscribersFinder.php:144
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "INSERT IGNORE INTO $scheduledTaskSubscriberTable (task_id, subscriber_id, processed) " . $selectQueryBuilder->getSQL();
Recommendation: Use $wpdb->prepare() with placeholders
1108. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Config/TranslationUpdater.php:98
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logError("MailPoet: Failed to fetch translations from WordPress.com API with error: " . $rawResponse->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1109. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Config/TranslationUpdater.php:109
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logError("MailPoet: Failed retrying to fetch translations from WordPress.com API with error: " . $rawResponse->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1110. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Config/TranslationUpdater.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logError("MailPoet: Failed to fetch translations from WordPress.com API with $responseCode and response message: " . $this->wpFunctions->wpRemoteRetrieveResponseMessage($rawResponse));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1111. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Config/TranslationUpdater.php:98
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logError("MailPoet: Failed to fetch translations from WordPress.com API with error: " . $rawResponse->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
1112. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Config/TranslationUpdater.php:109
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logError("MailPoet: Failed retrying to fetch translations from WordPress.com API with error: " . $rawResponse->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
1113. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Config/TranslationUpdater.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->logError("MailPoet: Failed to fetch translations from WordPress.com API with $responseCode and response message: " . $this->wpFunctions->wpRemoteRetrieveResponseMessage($rawResponse));
Recommendation: Use $wpdb->prepare() with placeholders
1114. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Tags/TagRepository.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new \RuntimeException("Error when saving tag " . $data['name']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1115. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Tags/TagRepository.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new \RuntimeException("Error when saving tag " . $data['name']);
Recommendation: Use $wpdb->prepare() with placeholders
1116. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Doctrine/WPDB/Connection.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $wpdb->_escape($value) . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1117. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Doctrine/WPDB/Connection.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $wpdb->_escape($value) . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1118. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Form/Block/Html.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$classes = isset($block['params']['class_name']) ? " " . $block['params']['class_name'] : '';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1119. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Form/Block/Html.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$classes = isset($block['params']['class_name']) ? " " . $block['params']['class_name'] : '';
Recommendation: Use $wpdb->prepare() with placeholders
1120. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Newsletter/Sending/ScheduledTaskSubscribersRepository.php:114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
INSERT IGNORE INTO " . $scheduledTaskSubscribersTable . "
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1121. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Newsletter/Sending/ScheduledTaskSubscribersRepository.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
FROM " . $subscribersTable . " s
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1122. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Newsletter/Sending/ScheduledTaskSubscribersRepository.php:114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
INSERT IGNORE INTO " . $scheduledTaskSubscribersTable . "
Recommendation: Use $wpdb->prepare() with placeholders
1123. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Newsletter/Sending/ScheduledTaskSubscribersRepository.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
FROM " . $subscribersTable . " s
Recommendation: Use $wpdb->prepare() with placeholders
1124. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Util/Notices/SenderDomainAuthenticationNotices.php:108
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"@" . $this->getDefaultFromDomain(),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1125. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Util/Notices/SenderDomainAuthenticationNotices.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"@" . $this->getDefaultFromDomain(),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1126. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Util/Notices/SenderDomainAuthenticationNotices.php:108
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"@" . $this->getDefaultFromDomain(),
Recommendation: Use $wpdb->prepare() with placeholders
1127. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Util/Notices/SenderDomainAuthenticationNotices.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"@" . $this->getDefaultFromDomain(),
Recommendation: Use $wpdb->prepare() with placeholders
1128. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Util/Notices/BlackFridayNotice.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$link = "<p><a href='" . $this->getSaleUrl() . "' class='mailpoet-button button-primary' target='_blank'>"
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1129. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Util/Notices/BlackFridayNotice.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$link = "<p><a href='" . $this->getSaleUrl() . "' class='mailpoet-button button-primary' target='_blank'>"
Recommendation: Use $wpdb->prepare() with placeholders
1130. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Cron/Workers/WooCommercePastOrders.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $where . " AND {$wpdb->prefix}posts.ID > " . $lastId;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1131. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Cron/Workers/WooCommercePastOrders.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $where . " AND {$wpdb->prefix}posts.ID > " . $lastId;
Recommendation: Use $wpdb->prepare() with placeholders
1132. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Migrations/Db/Migration_20230824_054259_Db.php:32
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"ALTER TABLE `" . $revenueTable . "`
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1133. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Migrations/Db/Migration_20230824_054259_Db.php:32
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"ALTER TABLE `" . $revenueTable . "`
Recommendation: Use $wpdb->prepare() with placeholders
1134. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Migrations/Db/Migration_20221028_105818.php:652
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql[] = "CREATE TABLE " . $table . " (";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1135. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Migrations/Db/Migration_20221028_105818.php:654
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql[] = ") " . $this->charsetCollate . ";";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1136. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Migrations/Db/Migration_20221028_105818.php:1058
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
UPDATE " . $newsletterTemplatesTable . "
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1137. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Migrations/Db/Migration_20221028_105818.php:652
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql[] = "CREATE TABLE " . $table . " (";
Recommendation: Use $wpdb->prepare() with placeholders
1138. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Migrations/Db/Migration_20221028_105818.php:654
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql[] = ") " . $this->charsetCollate . ";";
Recommendation: Use $wpdb->prepare() with placeholders
1139. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Migrations/Db/Migration_20221028_105818.php:1058
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
UPDATE " . $newsletterTemplatesTable . "
Recommendation: Use $wpdb->prepare() with placeholders
1140. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/FilterDataMapper.php:533
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidFilterException("Unknown action " . $data['action'], InvalidFilterException::MISSING_ACTION);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1141. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/FilterDataMapper.php:560
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidFilterException("Unknown action " . $data['action'], InvalidFilterException::MISSING_ACTION);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1142. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/FilterDataMapper.php:587
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidFilterException("Unknown action " . $data['action'], InvalidFilterException::MISSING_ACTION);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1143. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/FilterDataMapper.php:533
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidFilterException("Unknown action " . $data['action'], InvalidFilterException::MISSING_ACTION);
Recommendation: Use $wpdb->prepare() with placeholders
1144. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/FilterDataMapper.php:560
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidFilterException("Unknown action " . $data['action'], InvalidFilterException::MISSING_ACTION);
Recommendation: Use $wpdb->prepare() with placeholders
1145. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/FilterDataMapper.php:587
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidFilterException("Unknown action " . $data['action'], InvalidFilterException::MISSING_ACTION);
Recommendation: Use $wpdb->prepare() with placeholders
1146. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceProduct.php:61
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->having("COUNT($orderStatsAlias.order_id) = :count" . $parameterSuffix)
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1147. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceProduct.php:61
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->having("COUNT($orderStatsAlias.order_id) = :count" . $parameterSuffix)
Recommendation: Use $wpdb->prepare() with placeholders
1148. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceMembership.php:41
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("posts.post_parent IN (:plans" . $parameterSuffix . ")")
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1149. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceMembership.php:57
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("posts.post_parent IN (:plans" . $parameterSuffix . ")");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1150. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceMembership.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("posts.post_parent IN (:plans" . $parameterSuffix . ")")
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1151. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceMembership.php:41
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("posts.post_parent IN (:plans" . $parameterSuffix . ")")
Recommendation: Use $wpdb->prepare() with placeholders
1152. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceMembership.php:57
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("posts.post_parent IN (:plans" . $parameterSuffix . ")");
Recommendation: Use $wpdb->prepare() with placeholders
1153. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceMembership.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("posts.post_parent IN (:plans" . $parameterSuffix . ")")
Recommendation: Use $wpdb->prepare() with placeholders
1154. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales = :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1155. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales != :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1156. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales > :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1157. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales >= :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1158. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales < :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1159. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales <= :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1160. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales = :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1161. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales != :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1162. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales > :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1163. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales >= :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1164. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales < :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1165. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSingleOrderValue.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->andWhere("$orderStatsAlias.total_sales <= :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1166. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:103
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"$subscribersTable.id = statssent.subscriber_id AND statssent.newsletter_id = :newsletter" . $parameterSuffix
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1167. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"stats.subscriber_id = $subscribersTable.id AND stats.newsletter_id = :newsletter" . $parameterSuffix
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1168. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"$subscribersTable.id = statssent.subscriber_id AND statssent.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1169. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"statssent.subscriber_id = stats.subscriber_id AND stats.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1170. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:177
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"stats.subscriber_id = $subscribersTable.id AND stats.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1171. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$clause = "statssent.subscriber_id = stats.subscriber_id AND stats.newsletter_id = :newsletter" . $parameterSuffix;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1172. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:216
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"$subscribersTable.id = statisticsNewsletter.subscriber_id AND statisticsNewsletter.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1173. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:225
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"statisticsNewsletter.subscriber_id = $subscribersTable.id AND statisticsNewsletter.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1174. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:103
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"$subscribersTable.id = statssent.subscriber_id AND statssent.newsletter_id = :newsletter" . $parameterSuffix
Recommendation: Use $wpdb->prepare() with placeholders
1175. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"stats.subscriber_id = $subscribersTable.id AND stats.newsletter_id = :newsletter" . $parameterSuffix
Recommendation: Use $wpdb->prepare() with placeholders
1176. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"$subscribersTable.id = statssent.subscriber_id AND statssent.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders
1177. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"statssent.subscriber_id = stats.subscriber_id AND stats.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders
1178. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:177
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"stats.subscriber_id = $subscribersTable.id AND stats.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders
1179. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$clause = "statssent.subscriber_id = stats.subscriber_id AND stats.newsletter_id = :newsletter" . $parameterSuffix;
Recommendation: Use $wpdb->prepare() with placeholders
1180. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:216
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"$subscribersTable.id = statisticsNewsletter.subscriber_id AND statisticsNewsletter.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders
1181. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailAction.php:225
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"statisticsNewsletter.subscriber_id = $subscribersTable.id AND statisticsNewsletter.newsletter_id IN (:newsletters" . $parameterSuffix . ')'
Recommendation: Use $wpdb->prepare() with placeholders
1182. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/UserRole.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("wpusermeta.meta_key = '{$wpdb->prefix}capabilities' AND (" . $condition . ')');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1183. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/UserRole.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("wpusermeta.meta_key = '{$wpdb->prefix}capabilities' AND (" . $condition . ')');
Recommendation: Use $wpdb->prepare() with placeholders
1184. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceTotalSpent.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("SUM($orderStatsAlias.total_sales) = :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1185. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceTotalSpent.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("SUM($orderStatsAlias.total_sales) != :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1186. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceTotalSpent.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("SUM($orderStatsAlias.total_sales) > :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1187. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceTotalSpent.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("SUM($orderStatsAlias.total_sales) < :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1188. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceTotalSpent.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("SUM($orderStatsAlias.total_sales) = :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1189. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceTotalSpent.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("SUM($orderStatsAlias.total_sales) != :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1190. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceTotalSpent.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("SUM($orderStatsAlias.total_sales) > :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1191. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceTotalSpent.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("SUM($orderStatsAlias.total_sales) < :amount" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1192. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailOpensAbsoluteCountAction.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("count(opens.id) = :opens" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1193. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailOpensAbsoluteCountAction.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("count(opens.id) != :opens" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1194. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailOpensAbsoluteCountAction.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("count(opens.id) < :opens" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1195. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailOpensAbsoluteCountAction.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("count(opens.id) > :opens" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1196. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailOpensAbsoluteCountAction.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("count(opens.id) = :opens" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1197. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailOpensAbsoluteCountAction.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("count(opens.id) != :opens" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1198. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailOpensAbsoluteCountAction.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("count(opens.id) < :opens" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1199. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/EmailOpensAbsoluteCountAction.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$queryBuilder->having("count(opens.id) > :opens" . $parameterSuffix);
Recommendation: Use $wpdb->prepare() with placeholders
1200. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSubscription.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("itemmeta.meta_value IN (:products" . $parameterSuffix . ")")
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1201. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSubscription.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("itemmeta.meta_value IN (:products" . $parameterSuffix . ")");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1202. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSubscription.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("itemmeta.meta_value IN (:products" . $parameterSuffix . ")")
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1203. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSubscription.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("itemmeta.meta_value IN (:products" . $parameterSuffix . ")")
Recommendation: Use $wpdb->prepare() with placeholders
1204. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSubscription.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("itemmeta.meta_value IN (:products" . $parameterSuffix . ")");
Recommendation: Use $wpdb->prepare() with placeholders
1205. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Segments/DynamicSegments/Filters/WooCommerceSubscription.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
->andWhere("itemmeta.meta_value IN (:products" . $parameterSuffix . ")")
Recommendation: Use $wpdb->prepare() with placeholders
1206. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/API/JSON/Response.php:32
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
header("Location: " . $this->location, true, $this->status);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1207. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/API/JSON/Response.php:32
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
header("Location: " . $this->location, true, $this->status);
Recommendation: Use $wpdb->prepare() with placeholders
1208. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/API/MP/v1/Segments.php:184
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"'" . $segment->getType() . "'",
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1209. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/API/MP/v1/Segments.php:184
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"'" . $segment->getType() . "'",
Recommendation: Use $wpdb->prepare() with placeholders
1210. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Automation/Integrations/WooCommerce/Fields/CustomerOrderFieldsFactory.php:324
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
ORDER BY p.post_date_gmt " . $sorting /* phpcs:ignore WordPress.DB.PreparedSQL.NotPrepared -- The argument is safe. */ . "
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1211. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Automation/Integrations/WooCommerce/Fields/CustomerOrderFieldsFactory.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
JOIN %i AS oi ON oi.order_id IN (" . $orderIdsSubquery . /* phpcs:ignore WordPress.DB.PreparedSQL.NotPrepared -- The subquery uses placeholders. */ ") AND oi.order_item_type = 'line_item'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1212. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Automation/Integrations/WooCommerce/Fields/CustomerOrderFieldsFactory.php:324
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
ORDER BY p.post_date_gmt " . $sorting /* phpcs:ignore WordPress.DB.PreparedSQL.NotPrepared -- The argument is safe. */ . "
Recommendation: Use $wpdb->prepare() with placeholders
1213. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Automation/Integrations/WooCommerce/Fields/CustomerOrderFieldsFactory.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
JOIN %i AS oi ON oi.order_id IN (" . $orderIdsSubquery . /* phpcs:ignore WordPress.DB.PreparedSQL.NotPrepared -- The subquery uses placeholders. */ ") AND oi.order_item_type = 'line_item'
Recommendation: Use $wpdb->prepare() with placeholders
1214. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Automation/Integrations/WooCommerce/Fields/CustomerReviewFieldsFactory.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $inTheLastFilter . /* phpcs:ignore WordPress.DB.PreparedSQL.NotPrepared -- The condition uses placeholders. */ "
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1215. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib/Automation/Integrations/WooCommerce/Fields/CustomerReviewFieldsFactory.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $inTheLastFilter . /* phpcs:ignore WordPress.DB.PreparedSQL.NotPrepared -- The condition uses placeholders. */ "
Recommendation: Use $wpdb->prepare() with placeholders
1216. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib-3rd-party/pquery/gan_formatter.php:224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text = "<!--\n".$text."\n//-->";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1217. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib-3rd-party/pquery/gan_formatter.php:227
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text = indent_text("\n".$text, $c->indent(), $indent_string);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1218. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib-3rd-party/pquery/gan_formatter.php:224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text = "<!--\n".$text."\n//-->";
Recommendation: Use $wpdb->prepare() with placeholders
1219. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/lib-3rd-party/pquery/gan_formatter.php:227
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text = indent_text("\n".$text, $c->indent(), $indent_string);
Recommendation: Use $wpdb->prepare() with placeholders
1220. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/ORMInvalidArgumentException.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given entity of type '" . $className . "' (" . self::objToStr($entity) . ') has no identity/no ' . 'id values set. It cannot be added to the identity map.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1221. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/ORMInvalidArgumentException.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self('A detached entity of type ' . $assoc['targetEntity'] . ' (' . self::objToStr($entry) . ') ' . " was found through the relationship '" . $assoc['sourceEntity'] . '#' . $assoc['fieldName'] . "' " . 'during cascading a persist operation.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1222. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/ORMInvalidArgumentException.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given entity of type '" . $className . "' (" . self::objToStr($entity) . ') has no identity/no ' . 'id values set. It cannot be added to the identity map.');
Recommendation: Use $wpdb->prepare() with placeholders
1223. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/ORMInvalidArgumentException.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self('A detached entity of type ' . $assoc['targetEntity'] . ' (' . self::objToStr($entry) . ') ' . " was found through the relationship '" . $assoc['sourceEntity'] . '#' . $assoc['fieldName'] . "' " . 'during cascading a persist operation.');
Recommendation: Use $wpdb->prepare() with placeholders
1224. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/ResultSetMappingBuilder.php:221
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Entity '" . $classMetadata->name . "' has no field '" . $fieldName . "'. ");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1225. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/ResultSetMappingBuilder.php:221
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Entity '" . $classMetadata->name . "' has no field '" . $fieldName . "'. ");
Recommendation: Use $wpdb->prepare() with placeholders
1226. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/QueryException.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid PathExpression '" . $pathExpr->identificationVariable . '.' . $pathExpr->field . "'.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1227. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/QueryException.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid literal '" . $literal . "'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1228. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/QueryException.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Cannot check if a child of '" . $rootClass . "' is instanceof '" . $className . "', " . 'inheritance hierarchy does not exists between these two classes.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1229. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/QueryException.php:103
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid query component given for DQL alias '" . $dqlAlias . "', " . "requires 'metadata', 'parent', 'relation', 'map', 'nestingLevel' and 'token' keys.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1230. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/QueryException.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid PathExpression '" . $pathExpr->identificationVariable . '.' . $pathExpr->field . "'.");
Recommendation: Use $wpdb->prepare() with placeholders
1231. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/QueryException.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid literal '" . $literal . "'");
Recommendation: Use $wpdb->prepare() with placeholders
1232. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/QueryException.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Cannot check if a child of '" . $rootClass . "' is instanceof '" . $className . "', " . 'inheritance hierarchy does not exists between these two classes.');
Recommendation: Use $wpdb->prepare() with placeholders
1233. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/QueryException.php:103
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid query component given for DQL alias '" . $dqlAlias . "', " . "requires 'metadata', 'parent', 'relation', 'map', 'nestingLevel' and 'token' keys.");
Recommendation: Use $wpdb->prepare() with placeholders
1234. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/FilterCollection.php:37
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Filter '" . $name . "' does not exist.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1235. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/FilterCollection.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Filter '" . $name . "' is not suspended.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1236. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/FilterCollection.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Filter '" . $name . "' is not enabled.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1237. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/FilterCollection.php:37
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Filter '" . $name . "' does not exist.");
Recommendation: Use $wpdb->prepare() with placeholders
1238. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/FilterCollection.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Filter '" . $name . "' is not suspended.");
Recommendation: Use $wpdb->prepare() with placeholders
1239. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/FilterCollection.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Filter '" . $name . "' is not enabled.");
Recommendation: Use $wpdb->prepare() with placeholders
1240. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/Parser.php:238
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = 'line 0, col ' . $tokenPos . " near '" . $tokenStr . "': Error: " . $message;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1241. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/Parser.php:238
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = 'line 0, col ' . $tokenPos . " near '" . $tokenStr . "': Error: " . $message;
Recommendation: Use $wpdb->prepare() with placeholders
1242. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Exception/EntityMissingAssignedId.php:10
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self('Entity of type ' . get_debug_type($entity) . " is missing an assigned ID for field '" . $field . "'. " . 'The identifier generation strategy for this entity requires the ID field to be populated before ' . 'EntityManager#persist() is called. If you want automatically generated identifiers instead ' . 'you need to adjust the metadata mapping accordingly.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1243. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Exception/EntityMissingAssignedId.php:10
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self('Entity of type ' . get_debug_type($entity) . " is missing an assigned ID for field '" . $field . "'. " . 'The identifier generation strategy for this entity requires the ID field to be populated before ' . 'EntityManager#persist() is called. If you want automatically generated identifiers instead ' . 'you need to adjust the metadata mapping accordingly.');
Recommendation: Use $wpdb->prepare() with placeholders
1244. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Exception/InvalidEntityRepository.php:10
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid repository class '" . $className . "'. It must be a " . EntityRepository::class . '.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1245. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Exception/InvalidEntityRepository.php:10
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid repository class '" . $className . "'. It must be a " . EntityRepository::class . '.');
Recommendation: Use $wpdb->prepare() with placeholders
1246. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/ClassMetadataInfo.php:1431
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Association name expected, '" . $assocName . "' is not an association.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1247. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/ClassMetadataInfo.php:1431
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Association name expected, '" . $assocName . "' is not an association.");
Recommendation: Use $wpdb->prepare() with placeholders
1248. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = "The mapping of field '" . $field . "' is invalid: The option '" . $expectedOption . "' is required.";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1249. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self('The entries ' . implode(', ', $entries) . " in discriminator map of class '" . $className . "' is duplicated. " . 'If the discriminator map is automatically generated you have to convert it to an explicit discriminator map now. ' . 'The entries of the current map are: @DiscriminatorMap({' . implode(', ', array_map(static function ($a, $b) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1250. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:215
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Duplicate definition of column '" . $columnName . "' on entity '" . $className . "' in a field or discriminator column mapping.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1251. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:219
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("It is illegal to put an inverse side one-to-many or many-to-many association on mapped superclass '" . $className . '#' . $field . "'.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1252. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:223
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("It is not possible to map entity '" . $className . "' with a composite primary key " . "as part of the primary key of another entity '" . $targetEntity . '#' . $targetField . "'.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1253. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:251
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("It is not supported to define inheritance information on a mapped superclass '" . $className . "'.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1254. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:255
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $className . "' has to be part of the discriminator map of '" . $rootClassName . "' " . "to be properly mapped in the inheritance hierarchy. Alternatively you can make '" . $className . "' an abstract class " . 'to avoid this exception from occurring.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1255. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:259
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $className . "' has no method '" . $methodName . "' to be registered as lifecycle callback.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1256. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:275
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $className . "' has a mapping with invalid fetch mode '" . $fetchMode . "'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1257. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:279
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid generated mode '" . $generatedMode . "'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1258. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:283
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $className . "' has a composite identifier but uses an ID generator other than manually assigning (Identity, Sequence). This is not supported.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1259. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:287
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self('The target-entity ' . $targetEntity . " cannot be found in '" . $sourceEntity . '#' . $associationName . "'.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1260. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $e . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1261. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = "The mapping of field '" . $field . "' is invalid: The option '" . $expectedOption . "' is required.";
Recommendation: Use $wpdb->prepare() with placeholders
1262. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self('The entries ' . implode(', ', $entries) . " in discriminator map of class '" . $className . "' is duplicated. " . 'If the discriminator map is automatically generated you have to convert it to an explicit discriminator map now. ' . 'The entries of the current map are: @DiscriminatorMap({' . implode(', ', array_map(static function ($a, $b) {
Recommendation: Use $wpdb->prepare() with placeholders
1263. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:215
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Duplicate definition of column '" . $columnName . "' on entity '" . $className . "' in a field or discriminator column mapping.");
Recommendation: Use $wpdb->prepare() with placeholders
1264. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:219
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("It is illegal to put an inverse side one-to-many or many-to-many association on mapped superclass '" . $className . '#' . $field . "'.");
Recommendation: Use $wpdb->prepare() with placeholders
1265. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:223
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("It is not possible to map entity '" . $className . "' with a composite primary key " . "as part of the primary key of another entity '" . $targetEntity . '#' . $targetField . "'.");
Recommendation: Use $wpdb->prepare() with placeholders
1266. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:251
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("It is not supported to define inheritance information on a mapped superclass '" . $className . "'.");
Recommendation: Use $wpdb->prepare() with placeholders
1267. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:255
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $className . "' has to be part of the discriminator map of '" . $rootClassName . "' " . "to be properly mapped in the inheritance hierarchy. Alternatively you can make '" . $className . "' an abstract class " . 'to avoid this exception from occurring.');
Recommendation: Use $wpdb->prepare() with placeholders
1268. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:259
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $className . "' has no method '" . $methodName . "' to be registered as lifecycle callback.");
Recommendation: Use $wpdb->prepare() with placeholders
1269. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:275
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $className . "' has a mapping with invalid fetch mode '" . $fetchMode . "'");
Recommendation: Use $wpdb->prepare() with placeholders
1270. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:279
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Invalid generated mode '" . $generatedMode . "'");
Recommendation: Use $wpdb->prepare() with placeholders
1271. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:283
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $className . "' has a composite identifier but uses an ID generator other than manually assigning (Identity, Sequence). This is not supported.");
Recommendation: Use $wpdb->prepare() with placeholders
1272. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:287
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self('The target-entity ' . $targetEntity . " cannot be found in '" . $sourceEntity . '#' . $associationName . "'.");
Recommendation: Use $wpdb->prepare() with placeholders
1273. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/MappingException.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $e . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1274. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Proxy/ProxyFactory.php:255
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$prefix = $property->isPrivate() ? "\x00" . $property->class . "\x00" : ($property->isProtected() ? "\x00*\x00" : '');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1275. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Proxy/ProxyFactory.php:255
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$prefix = $property->isPrivate() ? "\x00" . $property->class . "\x00" : ($property->isProtected() ? "\x00*\x00" : '');
Recommendation: Use $wpdb->prepare() with placeholders
1276. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/Filter/SQLFilter.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Parameter '" . $name . "' does not exist.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1277. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/Filter/SQLFilter.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Parameter '" . $name . "' does not exist.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1278. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/Filter/SQLFilter.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Parameter '" . $name . "' does not exist.");
Recommendation: Use $wpdb->prepare() with placeholders
1279. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Query/Filter/SQLFilter.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidArgumentException("Parameter '" . $name . "' does not exist.");
Recommendation: Use $wpdb->prepare() with placeholders
1280. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Internal/Hydration/HydrationException.php:20
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The DQL alias '" . $dqlAlias . "' contains an entity " . 'of an inheritance hierarchy with an empty discriminator value. This means ' . 'that the database contains inconsistent data with an empty ' . 'discriminator value in a table row.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1281. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Internal/Hydration/HydrationException.php:20
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The DQL alias '" . $dqlAlias . "' contains an entity " . 'of an inheritance hierarchy with an empty discriminator value. This means ' . 'that the database contains inconsistent data with an empty ' . 'discriminator value in a table row.');
Recommendation: Use $wpdb->prepare() with placeholders
1282. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/Reflection/ReflectionPropertiesGetter.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\x00*\x00" . $propertyName;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1283. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/Reflection/ReflectionPropertiesGetter.php:68
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\x00" . $property->class . "\x00" . $propertyName;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1284. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/Reflection/ReflectionPropertiesGetter.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\x00*\x00" . $propertyName;
Recommendation: Use $wpdb->prepare() with placeholders
1285. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Mapping/Reflection/ReflectionPropertiesGetter.php:68
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\x00" . $property->class . "\x00" . $propertyName;
Recommendation: Use $wpdb->prepare() with placeholders
1286. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Repository/Exception/InvalidMagicMethodCall.php:11
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $entityName . "' has no field '" . $fieldName . "'. " . "You can therefore not call '" . $method . "' on the entities' repository.");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1287. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Repository/Exception/InvalidMagicMethodCall.php:15
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("You need to pass a parameter to '" . $methodName . "'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1288. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Repository/Exception/InvalidMagicMethodCall.php:11
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("Entity '" . $entityName . "' has no field '" . $fieldName . "'. " . "You can therefore not call '" . $method . "' on the entities' repository.");
Recommendation: Use $wpdb->prepare() with placeholders
1289. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Repository/Exception/InvalidMagicMethodCall.php:15
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("You need to pass a parameter to '" . $methodName . "'");
Recommendation: Use $wpdb->prepare() with placeholders
1290. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Repository/Exception/InvalidFindByCall.php:11
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("You cannot search for the association field '" . $entityName . '#' . $associationFieldName . "', " . 'because it is the inverse side of an association. Find methods only work on owning side associations.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1291. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/orm/src/Repository/Exception/InvalidFindByCall.php:11
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("You cannot search for the association field '" . $entityName . '#' . $associationFieldName . "', " . 'because it is the inverse side of an association. Find methods only work on owning side associations.');
Recommendation: Use $wpdb->prepare() with placeholders
1292. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/common/src/Proxy/ProxyGenerator.php:449
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$allProperties[] = $prop->isPrivate() ? "\x00" . $prop->getDeclaringClass()->getName() . "\x00" . $prop->getName() : $prop->getName();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1293. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/common/src/Proxy/ProxyGenerator.php:449
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$allProperties[] = $prop->isPrivate() ? "\x00" . $prop->getDeclaringClass()->getName() . "\x00" . $prop->getName() : $prop->getName();
Recommendation: Use $wpdb->prepare() with placeholders
1294. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Exception.php:39
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given 'driver' " . $unknownDriverName . ' is unknown, ' . 'Doctrine currently supports only the following drivers: ' . implode(', ', $knownDrivers));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1295. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Exception.php:43
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given 'wrapperClass' " . $wrapperClass . ' has to be a ' . 'subtype of \\Doctrine\\DBAL\\Connection.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1296. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Exception.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given 'driverClass' " . $driverClass . ' has to implement the ' . Driver::class . ' interface.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1297. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Exception.php:39
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given 'driver' " . $unknownDriverName . ' is unknown, ' . 'Doctrine currently supports only the following drivers: ' . implode(', ', $knownDrivers));
Recommendation: Use $wpdb->prepare() with placeholders
1298. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Exception.php:43
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given 'wrapperClass' " . $wrapperClass . ' has to be a ' . 'subtype of \\Doctrine\\DBAL\\Connection.');
Recommendation: Use $wpdb->prepare() with placeholders
1299. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Exception.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given 'driverClass' " . $driverClass . ' has to implement the ' . Driver::class . ' interface.');
Recommendation: Use $wpdb->prepare() with placeholders
1300. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Query/QueryException.php:10
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given alias '" . $alias . "' is not part of " . 'any FROM or JOIN clause table. The currently registered ' . 'aliases are: ' . implode(', ', $registeredAliases) . '.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1301. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Query/QueryException.php:14
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given alias '" . $alias . "' is not unique " . 'in FROM and JOIN clause table. The currently registered ' . 'aliases are: ' . implode(', ', $registeredAliases) . '.');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1302. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Query/QueryException.php:10
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given alias '" . $alias . "' is not part of " . 'any FROM or JOIN clause table. The currently registered ' . 'aliases are: ' . implode(', ', $registeredAliases) . '.');
Recommendation: Use $wpdb->prepare() with placeholders
1303. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Query/QueryException.php:14
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return new self("The given alias '" . $alias . "' is not unique " . 'in FROM and JOIN clause table. The currently registered ' . 'aliases are: ' . implode(', ', $registeredAliases) . '.');
Recommendation: Use $wpdb->prepare() with placeholders
1304. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Platforms/AbstractPlatform.php:1174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return " DEFAULT '" . $default . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1305. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/dbal/src/Platforms/AbstractPlatform.php:1174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return " DEFAULT '" . $default . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1306. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/persistence/src/Persistence/Reflection/RuntimeReflectionProperty.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->key = $this->isPrivate() ? "\x00" . ltrim($class, '\\') . "\x00" . $name : ($this->isProtected() ? "\x00*\x00" . $name : $name);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1307. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/doctrine/persistence/src/Persistence/Reflection/RuntimeReflectionProperty.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->key = $this->isPrivate() ? "\x00" . ltrim($class, '\\') . "\x00" . $name : ($this->isProtected() ? "\x00*\x00" . $name : $name);
Recommendation: Use $wpdb->prepare() with placeholders
1308. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/nesbot/carbon/src/Carbon/Traits/Creator.php:103
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidFormatException("Could not parse '{$time}': " . $exception->getMessage(), 0, $exception);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1309. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/nesbot/carbon/src/Carbon/Traits/Creator.php:103
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new InvalidFormatException("Could not parse '{$time}': " . $exception->getMessage(), 0, $exception);
Recommendation: Use $wpdb->prepare() with placeholders
1310. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/monolog/monolog/src/Monolog/Utils.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\nThe exception occurred while attempting to log: " . $record['message'] . $context . $extra;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1311. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/monolog/monolog/src/Monolog/Utils.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\nThe exception occurred while attempting to log: " . $record['message'] . $context . $extra;
Recommendation: Use $wpdb->prepare() with placeholders
1312. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/monolog/monolog/src/Monolog/Formatter/LineFormatter.php:101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "\n[previous exception] Over " . $this->maxNormalizeDepth . ' levels deep, aborting normalization';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1313. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/monolog/monolog/src/Monolog/Formatter/LineFormatter.php:104
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "\n[previous exception] " . $this->formatException($previous);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1314. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/monolog/monolog/src/Monolog/Formatter/LineFormatter.php:163
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n[stacktrace]\n" . $trace . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1315. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/monolog/monolog/src/Monolog/Formatter/LineFormatter.php:101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "\n[previous exception] Over " . $this->maxNormalizeDepth . ' levels deep, aborting normalization';
Recommendation: Use $wpdb->prepare() with placeholders
1316. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/monolog/monolog/src/Monolog/Formatter/LineFormatter.php:104
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "\n[previous exception] " . $this->formatException($previous);
Recommendation: Use $wpdb->prepare() with placeholders
1317. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/monolog/monolog/src/Monolog/Formatter/LineFormatter.php:163
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n[stacktrace]\n" . $trace . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1318. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/symfony/validator/ConstraintViolation.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $class . $propertyPath . ":\n " . $this->getMessage() . $code;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1319. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/symfony/validator/ConstraintViolation.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $class . $propertyPath . ":\n " . $this->getMessage() . $code;
Recommendation: Use $wpdb->prepare() with placeholders
1320. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/symfony/polyfill-intl-grapheme/Grapheme.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$s = \preg_split('/(' . SYMFONY_GRAPHEME_CLUSTER_RX . ')/u', "\r\n" . $s, $size + 1, \PREG_SPLIT_NO_EMPTY | \PREG_SPLIT_DELIM_CAPTURE);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1321. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/symfony/polyfill-intl-grapheme/Grapheme.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$s = \preg_split('/(' . SYMFONY_GRAPHEME_CLUSTER_RX . ')/u', "\r\n" . $s, $size + 1, \PREG_SPLIT_NO_EMPTY | \PREG_SPLIT_DELIM_CAPTURE);
Recommendation: Use $wpdb->prepare() with placeholders
1322. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/symfony/css-selector/XPath/Translator.php:28
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $element . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1323. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/symfony/css-selector/XPath/Translator.php:28
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $element . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1324. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/symfony/css-selector/Node/FunctionNode.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $token->getValue() . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1325. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/symfony/css-selector/Node/FunctionNode.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $token->getValue() . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1326. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/pelago/emogrifier/src/CssInliner.php:199
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "\n\n" . $styleNode->nodeValue;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1327. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/pelago/emogrifier/src/CssInliner.php:199
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$css .= "\n\n" . $styleNode->nodeValue;
Recommendation: Use $wpdb->prepare() with placeholders
1328. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/sabberworm/php-css-parser/src/OutputFormatter.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return \str_replace("\n", "\n" . $this->indent(), $sSpaceString);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1329. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/sabberworm/php-css-parser/src/OutputFormatter.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return \str_replace("\n", "\n" . $this->indent(), $sSpaceString);
Recommendation: Use $wpdb->prepare() with placeholders
1330. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/sabberworm/php-css-parser/src/Property/Import.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $oOutputFormat->comments($this) . "@import " . $this->oLocation->render($oOutputFormat) . ($this->sMediaQuery === null ? '' : ' ' . $this->sMediaQuery) . ';';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1331. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/sabberworm/php-css-parser/src/Property/Import.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $oOutputFormat->comments($this) . "@import " . $this->oLocation->render($oOutputFormat) . ($this->sMediaQuery === null ? '' : ' ' . $this->sMediaQuery) . ';';
Recommendation: Use $wpdb->prepare() with placeholders
1332. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/cerdic/css-tidy/class.csstidy_print.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out = \str_replace("\n", "\n" . $template[10], $out);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1333. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mailpoet/vendor-prefixed/cerdic/css-tidy/class.csstidy_print.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out = \str_replace("\n", "\n" . $template[10], $out);
Recommendation: Use $wpdb->prepare() with placeholders
1334. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-wp-migration-unlimited-extension/uninstall.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM `{$wpdb->options}` WHERE `option_name` LIKE 'ai1wmue\_%'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1335. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-cloudflare-manager/cxq-cloudflare-manager.php:24
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//protected $zone_api_token = '-xHZ2Ut7wyszICtT_MMJT9out0uHSltENvyi85Ic';
Recommendation: Move credentials to environment variables or secure configuration
1336. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-cloudflare-manager/cxq-cloudflare-manager.php:25
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
protected $api_key = '3b55771ba3f2a783a2baaa0c11f512b29c7d2'; //
Recommendation: Move credentials to environment variables or secure configuration
1337. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/includes/providers/class-constant-contact.php:56
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
public $api_key = 'c58xq3r27udz59h9rrq7qnvf';
Recommendation: Move credentials to environment variables or secure configuration
1338. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/src/Tasks/Actions/FormsLocatorScanTask.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "$wpdb->posts." . $field;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1339. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/src/Tasks/Actions/FormsLocatorScanTask.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "$wpdb->posts." . $field;
Recommendation: Use $wpdb->prepare() with placeholders
1340. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/src/Tasks/Actions/Migration175Task.php:153
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$this->entry_meta_handler->table_name} MODIFY type VARCHAR(255)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1341. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/tijsverkoyen/css-to-inline-styles/src/CssToInlineStyles.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $doctype . "\n" . $html;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1342. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/tijsverkoyen/css-to-inline-styles/src/CssToInlineStyles.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $doctype . "\n" . $html;
Recommendation: Use $wpdb->prepare() with placeholders
1343. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/symfony/css-selector/XPath/Translator.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $element . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1344. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/symfony/css-selector/XPath/Translator.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $element . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1345. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/symfony/css-selector/Node/FunctionNode.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $token->getValue() . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1346. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/symfony/css-selector/Node/FunctionNode.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $token->getValue() . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1347. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/square/square/example-autoload.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Error loading: " . $file . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1348. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/square/square/example-autoload.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Error loading: " . $file . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1349. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Printer.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $this->start('tr') . "\n" . $this->element('th', $name) . "\n" . $this->element('td', $value) . "\n" . $this->end('tr');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1350. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Printer.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $this->start('tr') . "\n" . $this->element('th', $name) . "\n" . $this->element('td', $value) . "\n" . $this->end('tr');
Recommendation: Use $wpdb->prepare() with placeholders
1351. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Config.php:474
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new HTMLPurifier_Exception("Cannot retrieve raw definition after it has already been setup" . $extra);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1352. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Config.php:478
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new HTMLPurifier_Exception("Optimization status of definition is unknown" . $extra);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1353. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Config.php:483
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new HTMLPurifier_Exception("Inconsistent use of optimized and unoptimized raw definition retrievals" . $extra);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1354. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Config.php:474
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new HTMLPurifier_Exception("Cannot retrieve raw definition after it has already been setup" . $extra);
Recommendation: Use $wpdb->prepare() with placeholders
1355. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Config.php:478
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new HTMLPurifier_Exception("Optimization status of definition is unknown" . $extra);
Recommendation: Use $wpdb->prepare() with placeholders
1356. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Config.php:483
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new HTMLPurifier_Exception("Inconsistent use of optimized and unoptimized raw definition retrievals" . $extra);
Recommendation: Use $wpdb->prepare() with placeholders
1357. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Encoder.php:453
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result .= "&#" . $working . ";";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1358. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Encoder.php:453
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result .= "&#" . $working . ";";
Recommendation: Use $wpdb->prepare() with placeholders
1359. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Printer/HTMLDefinition.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$list[] = "{$name} = <i>" . $this->getClass($obj, 'AttrDef_') . '</i>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1360. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/ezyang/htmlpurifier/library/HTMLPurifier/Printer/HTMLDefinition.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$list[] = "{$name} = <i>" . $this->getClass($obj, 'AttrDef_') . '</i>';
Recommendation: Use $wpdb->prepare() with placeholders
1361. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/apimatic/jsonmapper/src/JsonMapper.php:1334
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\\" . $class->getName();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1362. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/apimatic/jsonmapper/src/JsonMapper.php:1341
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$typeName = "\\" . $this->reflectionTypeToString($type);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1363. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/apimatic/jsonmapper/src/JsonMapper.php:1334
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\\" . $class->getName();
Recommendation: Use $wpdb->prepare() with placeholders
1364. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms-lite/vendor_prefixed/apimatic/jsonmapper/src/JsonMapper.php:1341
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$typeName = "\\" . $this->reflectionTypeToString($type);
Recommendation: Use $wpdb->prepare() with placeholders
1365. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/query-monitor/dispatchers/Html.php:1011
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $value . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1366. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/query-monitor/dispatchers/Html.php:1011
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $value . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1367. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/query-monitor/collectors/logger.php:283
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = $prefix . "\n" . $message;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1368. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/query-monitor/collectors/logger.php:283
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = $prefix . "\n" . $message;
Recommendation: Use $wpdb->prepare() with placeholders
1369. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/wpforms/includes/providers/class-constant-contact.php:48
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
public $api_key = 'c58xq3r27udz59h9rrq7qnvf';
Recommendation: Move credentials to environment variables or secure configuration
1370. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/wpforms/pro/includes/fields/class-file-upload.php:2118
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
if ( false === move_uploaded_file( $path_from, $path_to ) ) {
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
1371. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Tasks/Actions/FormsLocatorScanTask.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "$wpdb->posts." . $field;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1372. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Tasks/Actions/FormsLocatorScanTask.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "$wpdb->posts." . $field;
Recommendation: Use $wpdb->prepare() with placeholders
1373. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Tasks/Actions/Migration175Task.php:153
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$this->entry_meta_handler->table_name} MODIFY type VARCHAR(255)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1374. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Migrations/Upgrade133.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wpforms_entries ADD user_uuid VARCHAR(36)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1375. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Migrations/Upgrade143.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$upgraded = count( $wpdb->get_results( "SELECT DISTINCT entry_id FROM {$fields_table}" ) );
Recommendation: Use $wpdb->prepare() with placeholders
1376. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Migrations/Upgrade189.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$wpdb->prefix}wpforms_entry_fields MODIFY COLUMN field_id VARCHAR(16);" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1377. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Helpers/CSV.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value = "'" . $value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1378. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Helpers/CSV.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value = "'" . $value;
Recommendation: Use $wpdb->prepare() with placeholders
1379. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Integrations/LiteConnect/Integration.php:512
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "\r\n\r\n" . $entries_url;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1380. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Integrations/LiteConnect/Integration.php:512
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "\r\n\r\n" . $entries_url;
Recommendation: Use $wpdb->prepare() with placeholders
1381. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Admin/Entries/Export/File.php:324
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<pre>" . $error . '</pre>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1382. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Admin/Entries/Export/File.php:324
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<pre>" . $error . '</pre>';
Recommendation: Use $wpdb->prepare() with placeholders
1383. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/wpforms/src/Pro/Forms/Fields/FileUpload/Chunk.php:386
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
return @move_uploaded_file( $path_from, $path_to );
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
1384. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/mk-j/php_xlsxwriter/xlsxwriter.class.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$zip->addFile($sheet->filename, "xl/worksheets/" . $sheet->xmlname);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1385. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/mk-j/php_xlsxwriter/xlsxwriter.class.php:205
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lookup_string = $number_format_idx . ";" . $cell_style_string;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1386. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/mk-j/php_xlsxwriter/xlsxwriter.class.php:337
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sheet->merge_cells[] = $startCell . ":" . $endCell;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1387. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/mk-j/php_xlsxwriter/xlsxwriter.class.php:867
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$escaped .= "\\" . $c;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1388. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/mk-j/php_xlsxwriter/xlsxwriter.class.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$zip->addFile($sheet->filename, "xl/worksheets/" . $sheet->xmlname);
Recommendation: Use $wpdb->prepare() with placeholders
1389. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/mk-j/php_xlsxwriter/xlsxwriter.class.php:205
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lookup_string = $number_format_idx . ";" . $cell_style_string;
Recommendation: Use $wpdb->prepare() with placeholders
1390. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/mk-j/php_xlsxwriter/xlsxwriter.class.php:337
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sheet->merge_cells[] = $startCell . ":" . $endCell;
Recommendation: Use $wpdb->prepare() with placeholders
1391. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/mk-j/php_xlsxwriter/xlsxwriter.class.php:867
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$escaped .= "\\" . $c;
Recommendation: Use $wpdb->prepare() with placeholders
1392. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/tijsverkoyen/css-to-inline-styles/src/CssToInlineStyles.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $doctype . "\n" . $html;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1393. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/tijsverkoyen/css-to-inline-styles/src/CssToInlineStyles.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $doctype . "\n" . $html;
Recommendation: Use $wpdb->prepare() with placeholders
1394. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/symfony/css-selector/XPath/Translator.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $element . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1395. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/symfony/css-selector/XPath/Translator.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $element . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1396. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/symfony/css-selector/Node/FunctionNode.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $token->getValue() . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1397. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/wpforms/vendor_prefixed/symfony/css-selector/Node/FunctionNode.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'" . $token->getValue() . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1398. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/helpers.php:1402
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n<script type=\"text/javascript\">\n" . $script . "\n</script>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1399. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/helpers.php:1402
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n<script type=\"text/javascript\">\n" . $script . "\n</script>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1400. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-db-base.php:384
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $wpdb->query( "TRUNCATE TABLE {$table_name}" ) !== false;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1401. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-db-base.php:398
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $wpdb->query( "DROP TABLE IF EXISTS {$table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1402. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-migration.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_error( "Failed to add column {$column} to {$table_name}: " . $wpdb->last_error );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1403. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-migration.php:221
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_error( "Failed to modify column {$column} in {$table_name}: " . $wpdb->last_error );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1404. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-migration.php:264
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_error( "Failed to add index {$index_name} to {$table_name}: " . $wpdb->last_error );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1405. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-migration.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_error( "Failed to drop index {$index_name} from {$table_name}: " . $wpdb->last_error );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1406. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-migration.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_error( "Failed to add column {$column} to {$table_name}: " . $wpdb->last_error );
Recommendation: Use $wpdb->prepare() with placeholders
1407. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-migration.php:221
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_error( "Failed to modify column {$column} in {$table_name}: " . $wpdb->last_error );
Recommendation: Use $wpdb->prepare() with placeholders
1408. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-migration.php:264
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_error( "Failed to add index {$index_name} to {$table_name}: " . $wpdb->last_error );
Recommendation: Use $wpdb->prepare() with placeholders
1409. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/class-migration.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_error( "Failed to drop index {$index_name} from {$table_name}: " . $wpdb->last_error );
Recommendation: Use $wpdb->prepare() with placeholders
1410. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/database/tables/class-cache-table.php:228
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "OPTIMIZE TABLE {$table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1411. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/admin/licensing/autoupdate.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
add_filter( "monsterinsights_is_autoupdate_setting_html_filtered_" . $plugin_file, '__return_true' );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1412. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/admin/licensing/autoupdate.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
add_filter( "monsterinsights_is_autoupdate_setting_html_filtered_" . $plugin_file, '__return_true' );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1413. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/admin/licensing/autoupdate.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
add_filter( "monsterinsights_is_autoupdate_setting_html_filtered_" . $plugin_file, '__return_true' );
Recommendation: Use $wpdb->prepare() with placeholders
1414. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/google-analytics-for-wordpress/includes/admin/licensing/autoupdate.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
add_filter( "monsterinsights_is_autoupdate_setting_html_filtered_" . $plugin_file, '__return_true' );
Recommendation: Use $wpdb->prepare() with placeholders
1415. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/class.jetpack-cli.php:808
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
WP_CLI::success( "\t" . $option );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1416. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/class.jetpack-cli.php:808
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
WP_CLI::success( "\t" . $option );
Recommendation: Use $wpdb->prepare() with placeholders
1417. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/likes.php:183
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html = "<tbody id='likes' class='jetpack-targetable'>" . $html;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1418. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/likes.php:183
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html = "<tbody id='likes' class='jetpack-targetable'>" . $html;
Recommendation: Use $wpdb->prepare() with placeholders
1419. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/json-endpoints/class.wpcom-json-api-update-post-endpoint.php:533
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$input['content'] = "[gallery size=full columns=1]\n\n" . $input['content'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1420. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/json-endpoints/class.wpcom-json-api-update-post-endpoint.php:538
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$input['content'] = "[gallery]\n\n" . $input['content'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1421. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/json-endpoints/class.wpcom-json-api-update-post-endpoint.php:533
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$input['content'] = "[gallery size=full columns=1]\n\n" . $input['content'];
Recommendation: Use $wpdb->prepare() with placeholders
1422. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/json-endpoints/class.wpcom-json-api-update-post-endpoint.php:538
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$input['content'] = "[gallery]\n\n" . $input['content'];
Recommendation: Use $wpdb->prepare() with placeholders
1423. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/shortcodes/slideshare.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$player .= " scrolling='" . $sc . "'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1424. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/shortcodes/slideshare.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$player .= " scrolling='" . $sc . "'";
Recommendation: Use $wpdb->prepare() with placeholders
1425. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/subscriptions/views.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\n" . $after_widget; // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1426. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/subscriptions/views.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\n" . $after_widget; // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped
Recommendation: Use $wpdb->prepare() with placeholders
1427. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/widgets/gallery.php:161
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\n" . $after_widget; // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1428. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/widgets/gallery.php:161
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\n" . $after_widget; // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped
Recommendation: Use $wpdb->prepare() with placeholders
1429. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/widgets/rsslinks-widget.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\n" . $after_widget; // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1430. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/widgets/rsslinks-widget.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\n" . $after_widget; // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped
Recommendation: Use $wpdb->prepare() with placeholders
1431. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/widgets/image-widget.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\n" . $args['after_widget']; // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1432. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/widgets/image-widget.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\n" . $args['after_widget']; // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped
Recommendation: Use $wpdb->prepare() with placeholders
1433. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/widget-visibility/widget-conditions.php:437
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pages = $wpdb->get_results( "SELECT {$wpdb->posts}.ID, {$wpdb->posts}.post_parent, {$wpdb->posts}.post_title, {$wpdb->posts}.post_status FROM {$wpdb->posts} WHERE {$wpdb->posts}.post_type = 'page' AND {$wpdb->posts}.post_status = 'publish' ORDER BY {$wpdb->posts}.post_title ASC" );
Recommendation: Use $wpdb->prepare() with placeholders
1434. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/related-posts/jetpack-related-posts.php:239
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content .= "\n" . $this->get_server_rendered_html();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1435. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/related-posts/jetpack-related-posts.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content .= "\n" . $this->get_client_rendered_html();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1436. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/related-posts/jetpack-related-posts.php:239
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content .= "\n" . $this->get_server_rendered_html();
Recommendation: Use $wpdb->prepare() with placeholders
1437. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/modules/related-posts/jetpack-related-posts.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content .= "\n" . $this->get_client_rendered_html();
Recommendation: Use $wpdb->prepare() with placeholders
1438. Deprecated mysql_query() with user input
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/class.jetpack-search-performance-logger.php:75
CWE: CWE-89
Confidence: HIGH
Description: Deprecated mysql_query() with user input
Code:
public function log_mysql_query( $found_posts, $query ) {
Recommendation: Use PDO or mysqli with prepared statements
1439. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/class.media-extractor.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content = $post->post_title . "\n\n" . $post->post_content;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1440. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/class.media-extractor.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$content = $post->post_title . "\n\n" . $post->post_content;
Recommendation: Use $wpdb->prepare() with placeholders
1441. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/gfm.php:422
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$codeblock = sprintf( $this->shortcode_start, $classname ) . "\n{$codeblock}" . $this->shortcode_end;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1442. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/gfm.php:423
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n\n" . $this->hashBlock( $codeblock ). "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1443. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/gfm.php:422
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$codeblock = sprintf( $this->shortcode_start, $classname ) . "\n{$codeblock}" . $this->shortcode_end;
Recommendation: Use $wpdb->prepare() with placeholders
1444. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/gfm.php:423
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n\n" . $this->hashBlock( $codeblock ). "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1445. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:503
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"\n".$this->hashBlock("<hr$this->empty_element_suffix")."\n",
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1446. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:817
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$block = "<h$level>".$this->runSpanGamut($matches[1])."</h$level>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1447. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:818
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $this->hashBlock($block) . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1448. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:822
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$block = "<h$level>".$this->runSpanGamut($matches[2])."</h$level>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1449. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:823
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $this->hashBlock($block) . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1450. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:907
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $this->hashBlock("<$list_type>\n" . $result . "</$list_type>");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1451. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:908
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n". $result ."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1452. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:980
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<li>" . $item . "</li>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1453. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:1012
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n\n".$this->hashBlock($codeblock)."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1454. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:1214
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n". $this->hashBlock("<blockquote>\n$bq\n</blockquote>")."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1455. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:1283
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
// $graf = $div_open . "\n" . $div_content . "\n" . $div_close;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1456. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:1387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$addr = "mailto:" . $addr;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1457. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2534
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$block = "<h$level$attr>".$this->runSpanGamut($matches[1])."</h$level>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1458. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2535
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $this->hashBlock($block) . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1459. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2540
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$block = "<h$level$attr>".$this->runSpanGamut($matches[2])."</h$level>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1460. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2541
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $this->hashBlock($block) . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1461. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2648
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text .= " <th$attr[$n]>".$this->runSpanGamut(trim($header))."</th>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1462. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2667
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text .= " <td$attr[$n]>".$this->runSpanGamut(trim($cell))."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1463. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2726
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = "<dl>\n" . $result . "\n</dl>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1464. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2779
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text .= "\n<dt>" . $term . "</dt>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1465. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2792
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$def = "\n". $def ."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1466. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2799
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n<dd>" . $def . "</dd>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1467. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2861
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n\n".$this->hashBlock($codeblock)."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1468. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2984
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text .= "<hr". $this->empty_element_suffix ."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1469. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:3077
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "[^".$matches[1]."]";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1470. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:503
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"\n".$this->hashBlock("<hr$this->empty_element_suffix")."\n",
Recommendation: Use $wpdb->prepare() with placeholders
1471. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:817
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$block = "<h$level>".$this->runSpanGamut($matches[1])."</h$level>";
Recommendation: Use $wpdb->prepare() with placeholders
1472. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:818
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $this->hashBlock($block) . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1473. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:822
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$block = "<h$level>".$this->runSpanGamut($matches[2])."</h$level>";
Recommendation: Use $wpdb->prepare() with placeholders
1474. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:823
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $this->hashBlock($block) . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1475. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:907
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $this->hashBlock("<$list_type>\n" . $result . "</$list_type>");
Recommendation: Use $wpdb->prepare() with placeholders
1476. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:908
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n". $result ."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1477. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:980
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<li>" . $item . "</li>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1478. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:1012
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n\n".$this->hashBlock($codeblock)."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1479. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:1214
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n". $this->hashBlock("<blockquote>\n$bq\n</blockquote>")."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1480. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:1283
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
// $graf = $div_open . "\n" . $div_content . "\n" . $div_close;
Recommendation: Use $wpdb->prepare() with placeholders
1481. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:1387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$addr = "mailto:" . $addr;
Recommendation: Use $wpdb->prepare() with placeholders
1482. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2534
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$block = "<h$level$attr>".$this->runSpanGamut($matches[1])."</h$level>";
Recommendation: Use $wpdb->prepare() with placeholders
1483. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2535
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $this->hashBlock($block) . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1484. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2540
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$block = "<h$level$attr>".$this->runSpanGamut($matches[2])."</h$level>";
Recommendation: Use $wpdb->prepare() with placeholders
1485. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2541
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $this->hashBlock($block) . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1486. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2648
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text .= " <th$attr[$n]>".$this->runSpanGamut(trim($header))."</th>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1487. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2667
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text .= " <td$attr[$n]>".$this->runSpanGamut(trim($cell))."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1488. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2726
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = "<dl>\n" . $result . "\n</dl>";
Recommendation: Use $wpdb->prepare() with placeholders
1489. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2779
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text .= "\n<dt>" . $term . "</dt>";
Recommendation: Use $wpdb->prepare() with placeholders
1490. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2792
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$def = "\n". $def ."\n";
Recommendation: Use $wpdb->prepare() with placeholders
1491. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2799
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n<dd>" . $def . "</dd>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1492. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2861
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n\n".$this->hashBlock($codeblock)."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1493. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:2984
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$text .= "<hr". $this->empty_element_suffix ."\n";
Recommendation: Use $wpdb->prepare() with placeholders
1494. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/_inc/lib/markdown/extra.php:3077
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "[^".$matches[1]."]";
Recommendation: Use $wpdb->prepare() with placeholders
1495. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form.php:1160
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
id='" . $element_id . "'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1496. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form.php:1160
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
id='" . $element_id . "'
Recommendation: Use $wpdb->prepare() with placeholders
1497. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:922
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $class . $placeholder . '
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1498. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:925
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" />\n " . $this->get_error_div( $id, $type ) . " \n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1499. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
style='" . $this->field_styles . "'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1500. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1230
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
. "</textarea>\n " . $this->get_error_div( $id, 'textarea' ) . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1501. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1395
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field .= "<input id='" . esc_attr( $id ) . "' type='checkbox' data-wp-on--change='actions.onFieldChange' name='" . esc_attr( $id ) . "' value='" . esc_attr__( 'Yes', 'jetpack-forms' ) . "' " . $class . checked( (bool) $value, true, false ) . ' ' . ( $required ? "required aria-required='true'" : '' ) . "/> \n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1502. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1422
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field .= "\t\t<input type='checkbox' name='" . esc_attr( $id ) . "' value='" . esc_attr__( 'Yes', 'jetpack-forms' ) . "' " . $class . "/> \n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1503. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1725
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field = "<fieldset {$fieldset_id} class='grunion-checkbox-multiple-options " . $options_classes . "' style='" . $options_styles . "' " . ( $required ? 'data-required' : '' ) . ' data-wp-bind--aria-invalid="state.fieldHasErrors">';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1504. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1733
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field .= "<div class='grunion-checkbox-multiple-options " . $options_classes . "' style='" . $options_styles . "' " . '>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1505. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1836
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field .= "\t\t<option value=''>" . $this->get_attribute( 'togglelabel' ) . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1506. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:2191
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
id='" . $input_id . "'
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1507. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:2509
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_class = "class='" . $trimmed_type . ' ' . esc_attr( $class ) . "' ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1508. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:2519
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$shell_field_class = "class='" . $field_wrapper_classes . 'grunion-field-' . $trimmed_type . '-wrap ' . esc_attr( $wrap_classes ) . "' ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1509. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:922
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" . $class . $placeholder . '
Recommendation: Use $wpdb->prepare() with placeholders
1510. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:925
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
" />\n " . $this->get_error_div( $id, $type ) . " \n";
Recommendation: Use $wpdb->prepare() with placeholders
1511. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
style='" . $this->field_styles . "'
Recommendation: Use $wpdb->prepare() with placeholders
1512. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1230
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
. "</textarea>\n " . $this->get_error_div( $id, 'textarea' ) . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1513. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1395
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field .= "<input id='" . esc_attr( $id ) . "' type='checkbox' data-wp-on--change='actions.onFieldChange' name='" . esc_attr( $id ) . "' value='" . esc_attr__( 'Yes', 'jetpack-forms' ) . "' " . $class . checked( (bool) $value, true, false ) . ' ' . ( $required ? "required aria-required='true'" : '' ) . "/> \n";
Recommendation: Use $wpdb->prepare() with placeholders
1514. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1422
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field .= "\t\t<input type='checkbox' name='" . esc_attr( $id ) . "' value='" . esc_attr__( 'Yes', 'jetpack-forms' ) . "' " . $class . "/> \n";
Recommendation: Use $wpdb->prepare() with placeholders
1515. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1725
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field = "<fieldset {$fieldset_id} class='grunion-checkbox-multiple-options " . $options_classes . "' style='" . $options_styles . "' " . ( $required ? 'data-required' : '' ) . ' data-wp-bind--aria-invalid="state.fieldHasErrors">';
Recommendation: Use $wpdb->prepare() with placeholders
1516. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1733
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field .= "<div class='grunion-checkbox-multiple-options " . $options_classes . "' style='" . $options_styles . "' " . '>';
Recommendation: Use $wpdb->prepare() with placeholders
1517. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:1836
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field .= "\t\t<option value=''>" . $this->get_attribute( 'togglelabel' ) . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1518. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:2191
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
id='" . $input_id . "'
Recommendation: Use $wpdb->prepare() with placeholders
1519. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:2509
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_class = "class='" . $trimmed_type . ' ' . esc_attr( $class ) . "' ";
Recommendation: Use $wpdb->prepare() with placeholders
1520. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-field.php:2519
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$shell_field_class = "class='" . $field_wrapper_classes . 'grunion-field-' . $trimmed_type . '-wrap ' . esc_attr( $wrap_classes ) . "' ";
Recommendation: Use $wpdb->prepare() with placeholders
1521. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-plugin.php:3207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field = "'" . $field;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1522. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-forms/src/contact-form/class-contact-form-plugin.php:3207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field = "'" . $field;
Recommendation: Use $wpdb->prepare() with placeholders
1523. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-search/src/instant-search/class-instant-search.php:639
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return preg_replace( $column_end_pattern, "\n" . $search_block . "\n$1", $block_content, 1 );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1524. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-search/src/instant-search/class-instant-search.php:645
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return preg_replace( $group_start_pattern, "$1\n" . $search_block . "\n", $block_content, 1 );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1525. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-search/src/instant-search/class-instant-search.php:639
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return preg_replace( $column_end_pattern, "\n" . $search_block . "\n$1", $block_content, 1 );
Recommendation: Use $wpdb->prepare() with placeholders
1526. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-search/src/instant-search/class-instant-search.php:645
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return preg_replace( $group_start_pattern, "$1\n" . $search_block . "\n", $block_content, 1 );
Recommendation: Use $wpdb->prepare() with placeholders
1527. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-backup-helper-script-manager/src/class-helper-script-manager-impl.php:259
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$failure_paths_and_reasons[] = "directory '$directory': " . $url->get_error_message();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1528. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-backup-helper-script-manager/src/class-helper-script-manager-impl.php:279
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$failure_paths_and_reasons[] = "directory '$directory' (URL '$url'): " . $exception->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1529. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-backup-helper-script-manager/src/class-helper-script-manager-impl.php:350
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Unable to delete helper script at '$path': " . $exception->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1530. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-backup-helper-script-manager/src/class-helper-script-manager-impl.php:259
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$failure_paths_and_reasons[] = "directory '$directory': " . $url->get_error_message();
Recommendation: Use $wpdb->prepare() with placeholders
1531. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-backup-helper-script-manager/src/class-helper-script-manager-impl.php:279
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$failure_paths_and_reasons[] = "directory '$directory' (URL '$url'): " . $exception->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
1532. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-backup-helper-script-manager/src/class-helper-script-manager-impl.php:350
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Unable to delete helper script at '$path': " . $exception->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders
1533. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-connection/src/class-tokens.php:335
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
* All tokens look like "{$token_key}.{$private}". $token_key is a public ID for the
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1534. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-connection/src/class-tokens.php:335
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
* All tokens look like "{$token_key}.{$private}". $token_key is a public ID for the
Recommendation: Use $wpdb->prepare() with placeholders
1535. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-waf/src/class-brute-force-protection.php:603
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
public function check_preauth( $user = 'Not Used By Protect', $username = 'Not Used By Protect', $password = 'Not Used By Protect' ) { // phpcs:ignore VariableAnalysis.CodeAnalysis.VariableAnalysis.UnusedVariable
Recommendation: Move credentials to environment variables or secure configuration
1536. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/modules/class-woocommerce.php:367
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "SELECT count(*) FROM $this->order_item_table_name WHERE " . $this->get_where_sql( $config );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1537. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/modules/class-woocommerce.php:367
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "SELECT count(*) FROM $this->order_item_table_name WHERE " . $this->get_where_sql( $config );
Recommendation: Use $wpdb->prepare() with placeholders
1538. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/modules/class-posts.php:272
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "SELECT count(*) FROM $wpdb->posts WHERE " . $this->get_where_sql( $config );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1539. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/modules/class-posts.php:272
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "SELECT count(*) FROM $wpdb->posts WHERE " . $this->get_where_sql( $config );
Recommendation: Use $wpdb->prepare() with placeholders
1540. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/modules/class-full-sync.php:351
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $wpdb->get_results( "SELECT MAX({$id}) as max, MIN({$id}) as min, COUNT({$id}) as count FROM {$table} WHERE {$where_sql}" );
Recommendation: Use $wpdb->prepare() with placeholders
1541. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/modules/class-woocommerce-products.php:231
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "SELECT count(*) FROM {$this->table()} WHERE " . $this->get_where_sql( $config );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1542. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/modules/class-woocommerce-products.php:231
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = "SELECT count(*) FROM {$this->table()} WHERE " . $this->get_where_sql( $config );
Recommendation: Use $wpdb->prepare() with placeholders
1543. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/modules/class-full-sync-immediately.php:317
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $wpdb->get_results( "SELECT MAX({$id}) as max, MIN({$id}) as min, COUNT({$id}) as count FROM {$table} WHERE {$where_sql}" );
Recommendation: Use $wpdb->prepare() with placeholders
1544. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/replicastore/class-table-checksum.php:479
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $wpdb->get_results( "SHOW COLUMNS FROM {$this->table}", ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
1545. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/sync-queue/class-queue-storage-table.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query = $wpdb->query( "SELECT count(`ID`) FROM {$this->table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1546. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/sync-queue/class-queue-storage-table.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return (bool) $wpdb->query( "DROP TABLE {$this->table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1547. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-sync/src/sync-queue/class-queue-storage-table.php:687
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM {$custom_table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1548. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/httpBL.class.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Threat Rating: " . $this->getThreatRating() . " / 255" . $line_end;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1549. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/httpBL.class.php:197
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Recency: ". $this->getRecency() . " / 255" . $line_end;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1550. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/httpBL.class.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Threat Rating: " . $this->getThreatRating() . " / 255" . $line_end;
Recommendation: Use $wpdb->prepare() with placeholders
1551. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/httpBL.class.php:197
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "Recency: ". $this->getRecency() . " / 255" . $line_end;
Recommendation: Use $wpdb->prepare() with placeholders
1552. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1553. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1554. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1555. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1556. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1557. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1558. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1559. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-firewall/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1560. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/cxq-facebot.php:1766
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$url = "http://" . $url;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1561. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/cxq-facebot.php:322
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$locations = $wpdb->get_results("SELECT * FROM `{$this->table_names['locations']}` order by region, city");
Recommendation: Use $wpdb->prepare() with placeholders
1562. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/cxq-facebot.php:1278
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//$facebook_ids = $wpdb->get_results("SELECT `facebook_id` FROM {$this->table_names['archive']};");
Recommendation: Use $wpdb->prepare() with placeholders
1563. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/cxq-facebot.php:1766
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$url = "http://" . $url;
Recommendation: Use $wpdb->prepare() with placeholders
1564. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/show_main_page.php:152
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$locations = $wpdb->get_results("SELECT * FROM `{$this->table_names['locations']}` order by region, city");
Recommendation: Use $wpdb->prepare() with placeholders
1565. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/CxQ_FaceBot_Conditioner.php:549
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//$display_value.="<input type=\"hidden\" name=\"old_status\" value=\"".$this->get_matches('facebot',$place)[0]->status."\">";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1566. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/CxQ_FaceBot_Conditioner.php:86
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_matches[$id]['facebot'] = $wpdb->get_results("SELECT * FROM {$this->table_name} WHERE `{$record_identifier_key}`={$place[$record_identifier_key]}");
Recommendation: Use $wpdb->prepare() with placeholders
1567. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/CxQ_FaceBot_Conditioner.php:549
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//$display_value.="<input type=\"hidden\" name=\"old_status\" value=\"".$this->get_matches('facebot',$place)[0]->status."\">";
Recommendation: Use $wpdb->prepare() with placeholders
1568. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/class-rest-api.php:3557
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ FaceBot SSE: Exception processing item {$item->id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1569. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/class-rest-api.php:3611
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ FaceBot SSE: Loop error for item {$item->id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1570. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/class-rest-api.php:3737
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Playwright retry: Exception - " . $e->getMessage() . "\n" . $e->getTraceAsString());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1571. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/class-rest-api.php:3557
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ FaceBot SSE: Exception processing item {$item->id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
1572. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/class-rest-api.php:3611
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ FaceBot SSE: Loop error for item {$item->id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
1573. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/class-rest-api.php:3737
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Playwright retry: Exception - " . $e->getMessage() . "\n" . $e->getTraceAsString());
Recommendation: Use $wpdb->prepare() with placeholders
1574. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/class-rest-api.php:2063
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
var token = '{$token}';
Recommendation: Move credentials to environment variables or secure configuration
1575. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/tests/extraction-test.php:339
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ EXCEPTION: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1576. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/tests/extraction-test.php:339
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ EXCEPTION: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1577. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/tools/site-discovery.php:1766
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$errors[] = "Failed to insert $domain: " . $stmt->error;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1578. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/tools/site-discovery.php:1766
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$errors[] = "Failed to insert $domain: " . $stmt->error;
Recommendation: Use $wpdb->prepare() with placeholders
1579. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1580. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1581. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1582. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1583. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1584. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1585. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1586. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1587. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/migration/migrate-to-places.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log("Error creating place from record #{$record->id}: " . $place_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1588. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/migration/migrate-to-places.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log("Error creating place from record #{$record->id}: " . $place_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
1589. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:623
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD COLUMN domain VARCHAR(255) AFTER source_url");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1590. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:624
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD INDEX idx_domain (domain)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1591. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:648
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD COLUMN phone_normalized VARCHAR(20) AFTER phone");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1592. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:649
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD INDEX idx_phone_normalized (phone_normalized)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1593. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:675
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD COLUMN parent_source_id BIGINT(20) UNSIGNED AFTER detected_category");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1594. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:676
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD INDEX idx_parent_source_id (parent_source_id)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1595. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:688
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD COLUMN quality_score TINYINT UNSIGNED DEFAULT NULL AFTER status");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1596. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:689
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD INDEX idx_quality_score (quality_score)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1597. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:701
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$sources_table} ADD COLUMN requires_js TINYINT(1) DEFAULT 0 AFTER quality_score");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1598. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:729
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN referrer_url VARCHAR(2048) DEFAULT NULL AFTER discovered_from");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1599. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:741
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN api_token_id BIGINT(20) UNSIGNED DEFAULT NULL AFTER referrer_url");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1600. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:742
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD INDEX idx_api_token_id (api_token_id)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1601. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:754
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN submission_context JSON DEFAULT NULL AFTER api_token_id");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1602. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:766
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN redirect_to VARCHAR(2048) DEFAULT NULL AFTER status");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1603. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:767
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN redirect_chain JSON DEFAULT NULL AFTER redirect_to");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1604. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:768
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN canonical_url_hash CHAR(64) DEFAULT NULL AFTER redirect_chain");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1605. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:769
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD INDEX idx_canonical_url_hash (canonical_url_hash)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1606. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:793
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN use_browser TINYINT(1) DEFAULT 0 AFTER priority");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1607. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:794
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD INDEX idx_use_browser (use_browser)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1608. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:806
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN browser_attempts TINYINT UNSIGNED DEFAULT 0 AFTER use_browser");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1609. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:818
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN last_http_status SMALLINT UNSIGNED DEFAULT NULL AFTER last_error");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1610. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:830
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$queue_table} ADD COLUMN protection_type VARCHAR(50) DEFAULT NULL AFTER last_http_status");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1611. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:852
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$links_table} ADD COLUMN entity_type VARCHAR(20) DEFAULT 'place' AFTER place_id");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1612. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:853
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE {$links_table} ADD INDEX idx_entity_type (entity_type, place_id)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1613. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/includes/database/class-source-tables.php:856
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("UPDATE {$links_table} SET entity_type = 'place' WHERE entity_type IS NULL");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1614. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/src/Services/CrawlQueueService.php:523
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ FaceBot: Could not mark item {$item->id} as failed: " . $markError->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1615. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/src/Services/CrawlQueueService.php:523
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ FaceBot: Could not mark item {$item->id} as failed: " . $markError->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
1616. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-facebot/src/Repositories/DomainBlacklistRepository.php:430
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("TRUNCATE TABLE {$table}");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1617. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-addons/includes/groups/class-wc-product-addons-group-validator.php:101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception( "Invalid value given for '{$data_key}': " . $e->getMessage() );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1618. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-addons/includes/groups/class-wc-product-addons-group-validator.php:101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception( "Invalid value given for '{$data_key}': " . $e->getMessage() );
Recommendation: Use $wpdb->prepare() with placeholders
1619. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-addons/legacy/groups/class-product-addon-group-validator.php:101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception( "Invalid value given for '{$data_key}': " . $e->getMessage() );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1620. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-addons/legacy/groups/class-product-addon-group-validator.php:101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception( "Invalid value given for '{$data_key}': " . $e->getMessage() );
Recommendation: Use $wpdb->prepare() with placeholders
1621. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-addons/legacy/includes/groups/class-product-addon-group-validator.php:101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception( "Invalid value given for '{$data_key}': " . $e->getMessage() );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1622. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/woocommerce-product-addons/legacy/includes/groups/class-product-addon-group-validator.php:101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception( "Invalid value given for '{$data_key}': " . $e->getMessage() );
Recommendation: Use $wpdb->prepare() with placeholders
1623. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/init.php:499
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lastErrorMessage = "\n\nLast error: ".$lastError['message'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1624. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/init.php:499
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lastErrorMessage = "\n\nLast error: ".$lastError['message'];
Recommendation: Use $wpdb->prepare() with placeholders
1625. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/functions.php:151
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$toKeep = $wpdb->get_results("SELECT ID FROM {$wpdb->posts} WHERE post_type = 'revision' AND post_parent = '{$revision->post_parent}' ORDER BY post_date DESC LIMIT ".$num_rev);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1626. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/functions.php:163
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->posts} WHERE post_type = 'revision' AND post_parent = '{$revision->post_parent}' AND ID NOT IN ({$keepQuery})");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1627. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/functions.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->comments} WHERE comment_ID IN ($commentIdsList)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1628. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/functions.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->commentmeta} WHERE comment_id IN ($commentIdsList)");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1629. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/functions.php:144
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$allRevisions = $wpdb->get_results("SELECT post_parent FROM {$wpdb->posts} WHERE post_type = 'revision' AND post_parent != 0 GROUP BY post_parent HAVING COUNT(ID) > {$num_rev}");
Recommendation: Use $wpdb->prepare() with placeholders
1630. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/functions.php:151
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$toKeep = $wpdb->get_results("SELECT ID FROM {$wpdb->posts} WHERE post_type = 'revision' AND post_parent = '{$revision->post_parent}' ORDER BY post_date DESC LIMIT ".$num_rev);
Recommendation: Use $wpdb->prepare() with placeholders
1631. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Stats.php:306
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$timeoutsToDelete[] = "'".$timeoutName.$transient."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1632. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Stats.php:307
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$transient = "'".$name.$transient."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1633. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Stats.php:306
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$timeoutsToDelete[] = "'".$timeoutName.$transient."'";
Recommendation: Use $wpdb->prepare() with placeholders
1634. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Stats.php:307
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$transient = "'".$name.$transient."'";
Recommendation: Use $wpdb->prepare() with placeholders
1635. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Stats.php:483
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$network_blogs = (array)$wpdb->get_results("select `blog_id`, `site_id` from `{$wpdb->blogs}`");
Recommendation: Use $wpdb->prepare() with placeholders
1636. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$comment_array[] = "'".$status_val."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1637. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:40
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql_query = "$wpdb->comments as c, $wpdb->posts as p WHERE c.comment_post_ID = p.ID ".$where;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1638. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:42
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$comments_total = $wpdb->get_results("SELECT count(*) as total_comments FROM ".$sql_query);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1639. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query_comments = $wpdb->get_results("SELECT c.comment_ID, c.comment_post_ID, c.comment_author, c.comment_author_email, c.comment_author_url, c.comment_author_IP, c.comment_date, c.comment_content, c.comment_approved, c.comment_parent, p.post_title, p.post_type, p.guid FROM ".$sql_query." ORDER BY c.comment_date DESC LIMIT 500");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1640. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_parent_author = "SELECT comment_author FROM $wpdb->comments WHERE comment_ID = ".$comments_info->comment_parent;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1641. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$comment_array[] = "'".$status_val."'";
Recommendation: Use $wpdb->prepare() with placeholders
1642. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:40
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql_query = "$wpdb->comments as c, $wpdb->posts as p WHERE c.comment_post_ID = p.ID ".$where;
Recommendation: Use $wpdb->prepare() with placeholders
1643. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:42
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$comments_total = $wpdb->get_results("SELECT count(*) as total_comments FROM ".$sql_query);
Recommendation: Use $wpdb->prepare() with placeholders
1644. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$query_comments = $wpdb->get_results("SELECT c.comment_ID, c.comment_post_ID, c.comment_author, c.comment_author_email, c.comment_author_url, c.comment_author_IP, c.comment_date, c.comment_content, c.comment_approved, c.comment_parent, p.post_title, p.post_type, p.guid FROM ".$sql_query." ORDER BY c.comment_date DESC LIMIT 500");
Recommendation: Use $wpdb->prepare() with placeholders
1645. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Comment.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_parent_author = "SELECT comment_author FROM $wpdb->comments WHERE comment_ID = ".$comments_info->comment_parent;
Recommendation: Use $wpdb->prepare() with placeholders
1646. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Core.php:450
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return apply_filters("site_transient_".$option_name, $transient);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1647. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Core.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$network_blogs = $wpdb->get_results("select `blog_id`, `site_id` from `{$wpdb->blogs}`");
Recommendation: Use $wpdb->prepare() with placeholders
1648. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Core.php:406
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$networkBlogs = $wpdb->get_results("select `blog_id` from `{$wpdb->blogs}`");
Recommendation: Use $wpdb->prepare() with placeholders
1649. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MMB/Core.php:450
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return apply_filters("site_transient_".$option_name, $transient);
Recommendation: Use $wpdb->prepare() with placeholders
1650. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/Monolog/Formatter/HtmlFormatter.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<tr style=\"padding: 4px;spacing: 0;text-align: left;\">\n<th style=\"background: #cccccc\" width=\"100px\">$th:</th>\n<td style=\"padding: 4px;spacing: 0;text-align: left;background: #eeeeee\">".$td."</td>\n</tr>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1651. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/Monolog/Formatter/HtmlFormatter.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<tr style=\"padding: 4px;spacing: 0;text-align: left;\">\n<th style=\"background: #cccccc\" width=\"100px\">$th:</th>\n<td style=\"padding: 4px;spacing: 0;text-align: left;background: #eeeeee\">".$td."</td>\n</tr>";
Recommendation: Use $wpdb->prepare() with placeholders
1652. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/File/ASN1.php:448
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$current['content'] .= ".$valuen";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1653. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/File/ASN1.php:448
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$current['content'] .= ".$valuen";
Recommendation: Use $wpdb->prepare() with placeholders
1654. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/File/X509.php:3712
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->currentCert['signature'] = base64_encode("\0".$key->sign($this->signatureSubject));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1655. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/File/X509.php:3712
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->currentCert['signature'] = base64_encode("\0".$key->sign($this->signatureSubject));
Recommendation: Use $wpdb->prepare() with placeholders
1656. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Net/SSH2.php:3152
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->errors[count($this->errors)] .= "\r\n".$this->_string_shift($response, $length);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1657. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Net/SSH2.php:3152
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->errors[count($this->errors)] .= "\r\n".$this->_string_shift($response, $length);
Recommendation: Use $wpdb->prepare() with placeholders
1658. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Net/SFTP.php:2722
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<pre>\r\n".$this->_format_log(array($data), array($packet_type))."\r\n</pre>\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1659. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Net/SFTP.php:2800
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<pre>\r\n".$this->_format_log(array($packet), array($packet_type))."\r\n</pre>\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1660. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Net/SFTP.php:2722
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<pre>\r\n".$this->_format_log(array($data), array($packet_type))."\r\n</pre>\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1661. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Net/SFTP.php:2800
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<pre>\r\n".$this->_format_log(array($packet), array($packet_type))."\r\n</pre>\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1662. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Net/SSH1.php:1671
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<pre>\r\n".$this->_format_log(array($message), array($protocol_flags))."\r\n</pre>\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1663. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Net/SSH1.php:1671
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<pre>\r\n".$this->_format_log(array($message), array($protocol_flags))."\r\n</pre>\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1664. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Crypt/RSA.php:788
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$key .= "\r\nComment: ".$this->comment."\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1665. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Crypt/RSA.php:2631
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$m2 = "\0\0\0\0\0\0\0\0".$mHash.$salt;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1666. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Crypt/RSA.php:2687
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$m2 = "\0\0\0\0\0\0\0\0".$mHash.$salt;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1667. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Crypt/RSA.php:788
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$key .= "\r\nComment: ".$this->comment."\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1668. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Crypt/RSA.php:2631
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$m2 = "\0\0\0\0\0\0\0\0".$mHash.$salt;
Recommendation: Use $wpdb->prepare() with placeholders
1669. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/PHPSecLib/Crypt/RSA.php:2687
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$m2 = "\0\0\0\0\0\0\0\0".$mHash.$salt;
Recommendation: Use $wpdb->prepare() with placeholders
1670. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Migration/Migration.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$locked = $wpdb->query("INSERT INTO {$wpdb->prefix}options SET option_name = '$lockName', option_value = '$currentTimestamp'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1671. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Migration/Migration.php:67
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$released = $wpdb->query("DELETE FROM {$wpdb->prefix}options WHERE option_name = '$lockName'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1672. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Migration/Migration.php:91
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("INSERT INTO {$wpdb->prefix}options SET option_name = 'worker_migration_version', option_value = '$migrationVersion' ON DUPLICATE KEY UPDATE option_value = '$migrationVersion'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1673. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/JsonResponse.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $content;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1674. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/JsonResponse.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\n" . $content;
Recommendation: Use $wpdb->prepare() with placeholders
1675. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/MultipartResponse.php:27
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers["content-type"] = "multipart/mixed; boundary=".$this->boundary;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1676. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/MultipartResponse.php:45
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "\r\n".$this->getMultipartBoundary()."\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1677. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/MultipartResponse.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$stream->addStream(MWP_Stream_Stream::factory("\r\n".$this->getMultipartBoundary()));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1678. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/MultipartResponse.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$stream->addStream(MWP_Stream_Stream::factory("\r\n".$this->getMultipartBoundary()));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1679. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/MultipartResponse.php:27
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers["content-type"] = "multipart/mixed; boundary=".$this->boundary;
Recommendation: Use $wpdb->prepare() with placeholders
1680. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/MultipartResponse.php:45
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "\r\n".$this->getMultipartBoundary()."\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1681. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/MultipartResponse.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$stream->addStream(MWP_Stream_Stream::factory("\r\n".$this->getMultipartBoundary()));
Recommendation: Use $wpdb->prepare() with placeholders
1682. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Http/MultipartResponse.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$stream->addStream(MWP_Stream_Stream::factory("\r\n".$this->getMultipartBoundary()));
Recommendation: Use $wpdb->prepare() with placeholders
1683. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Signer/OpenSslSigner.php:29
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error = $errorRow."\n".$error;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1684. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Signer/OpenSslSigner.php:29
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error = $errorRow."\n".$error;
Recommendation: Use $wpdb->prepare() with placeholders
1685. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Action/DownloadFile.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$zip->addFile($file->getRealPath(), $file->getPath()."/".$file->getFilename());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1686. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Action/DownloadFile.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$zip->addFile($file->getRealPath(), $file->getPath()."/".$file->getFilename());
Recommendation: Use $wpdb->prepare() with placeholders
1687. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Action/ClearTransient.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$timeoutsToDelete[] = "'".$timeoutName.$transient."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1688. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Action/ClearTransient.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$transient = "'".$transientType.$transient."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1689. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Action/ClearTransient.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$timeoutsToDelete[] = "'".$timeoutName.$transient."'";
Recommendation: Use $wpdb->prepare() with placeholders
1690. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Action/ClearTransient.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$transient = "'".$transientType.$transient."'";
Recommendation: Use $wpdb->prepare() with placeholders
1691. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Crypter/OpenSslCrypter.php:26
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error = $errorRow."\n".$error;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1692. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Crypter/OpenSslCrypter.php:51
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error = $errorRow."\n".$error;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1693. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Crypter/OpenSslCrypter.php:26
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error = $errorRow."\n".$error;
Recommendation: Use $wpdb->prepare() with placeholders
1694. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/Crypter/OpenSslCrypter.php:51
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error = $errorRow."\n".$error;
Recommendation: Use $wpdb->prepare() with placeholders
1695. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/EventListener/PublicRequest/AddConnectionKeyInfo.php:72
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "DELETE FROM `". $wpdb->prefix ."options` WHERE `option_name` LIKE 'mwp_%';";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1696. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/EventListener/PublicRequest/AddConnectionKeyInfo.php:72
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "DELETE FROM `". $wpdb->prefix ."options` WHERE `option_name` LIKE 'mwp_%';";
Recommendation: Use $wpdb->prepare() with placeholders
1697. Deprecated mysql_query() with user input
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/IncrementalBackup/Database/MysqlConnection.php:63
CWE: CWE-89
Confidence: HIGH
Description: Deprecated mysql_query() with user input
Code:
$result = mysql_query($query, $this->connection);
Recommendation: Use PDO or mysqli with prepared statements
1698. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/IncrementalBackup/Database/MysqliConnection.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$this->connection->real_escape_string($value)."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1699. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/worker/src/MWP/IncrementalBackup/Database/MysqliConnection.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "'".$this->connection->real_escape_string($value)."'";
Recommendation: Use $wpdb->prepare() with placeholders
1700. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mphb-request-payment/classes/Plugin.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("UPDATE {$wpdb->options} SET autoload = 'yes' WHERE option_name IN ('mphbrp_configured', 'mphbrp_license_key')");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1701. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/mphb-request-payment/classes/Plugin.php:278
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("UPDATE {$wpdb->options} SET autoload = 'no' WHERE option_name LIKE 'mphbrp_%'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1702. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/cxq-event-calendar.php:1485
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->options} WHERE option_name LIKE 'cxq_event_calendar_%'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1703. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/cxq-event-calendar.php:1486
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->options} WHERE option_name LIKE 'external_event_%'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1704. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/fix-namespaces.php:23
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Failed to read: " . $file->getPathname() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1705. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/fix-namespaces.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Failed to write: " . $file->getPathname() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1706. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/fix-namespaces.php:23
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Failed to read: " . $file->getPathname() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1707. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/fix-namespaces.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Failed to write: " . $file->getPathname() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1708. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:153
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "UID:" . $uid . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1709. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "DTSTAMP:" . $dtstamp . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1710. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:162
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "DTSTART:" . $dtstart . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1711. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "DTEND:" . $dtend . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1712. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:179
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "DESCRIPTION:" . $description . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1713. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "LAST-MODIFIED:" . $last_modified . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1714. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:203
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "IMAGE;VALUE=URI:" . $event->cover_image_url . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1715. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:153
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "UID:" . $uid . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1716. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "DTSTAMP:" . $dtstamp . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1717. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:162
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "DTSTART:" . $dtstart . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1718. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "DTEND:" . $dtend . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1719. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:179
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "DESCRIPTION:" . $description . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1720. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "LAST-MODIFIED:" . $last_modified . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1721. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/public/class-ical-feed.php:203
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ical .= "IMAGE;VALUE=URI:" . $event->cover_image_url . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1722. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/includes/class-ical-export.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "X-WR-TIMEZONE:" . $timezone . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1723. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/includes/class-ical-export.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "UID:" . $event->id . "@" . get_bloginfo('url') . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1724. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/includes/class-ical-export.php:184
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "URL:" . $event->source_url . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1725. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/includes/class-ical-export.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "X-WR-TIMEZONE:" . $timezone . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1726. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/includes/class-ical-export.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "UID:" . $event->id . "@" . get_bloginfo('url') . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1727. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/includes/class-ical-export.php:184
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "URL:" . $event->source_url . "\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
1728. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1729. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1730. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1731. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1732. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1733. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1734. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1735. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-event-calendar/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
1736. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-spec-auditor/cxq-auditor.php:100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
// $wpdb->query("DROP TABLE IF EXISTS {$wpdb->prefix}cxq_audit_requirement_check_items");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1737. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-enhance-wpforms/includes/admin/entries-page.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
esc_html_e( " for " . $entries_table->default_form_title );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1738. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-enhance-wpforms/includes/admin/entries-page.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
esc_html_e( " for " . $entries_table->default_form_title );
Recommendation: Use $wpdb->prepare() with placeholders
1739. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-doc-builder/migrate-from-cxq-documents.php:184
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->stats['errors'][] = "Failed to migrate taxonomy term: {$term->name} - " . $result->get_error_message();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1740. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-doc-builder/migrate-from-cxq-documents.php:277
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error_msg = "Failed to create document: {$source_post->post_title} - " . $new_post_id->get_error_message();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1741. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-doc-builder/migrate-from-cxq-documents.php:184
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->stats['errors'][] = "Failed to migrate taxonomy term: {$term->name} - " . $result->get_error_message();
Recommendation: Use $wpdb->prepare() with placeholders
1742. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-doc-builder/migrate-from-cxq-documents.php:277
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error_msg = "Failed to create document: {$source_post->post_title} - " . $new_post_id->get_error_message();
Recommendation: Use $wpdb->prepare() with placeholders
1743. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-submission-debug.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . get_class($callback['function'][0]) . "::" . $callback['function'][1] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1744. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-submission-debug.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . get_class($callback['function'][0]) . "::" . $callback['function'][1] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1745. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-phase2-integration.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Plugin version: " . $plugin->getVersion() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1746. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-phase2-integration.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Migration version: " . $status['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1747. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-phase2-integration.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Organization type: " . $status['organization_type'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1748. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-phase2-integration.php:100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1749. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-phase2-integration.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Plugin version: " . $plugin->getVersion() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1750. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-phase2-integration.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Migration version: " . $status['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1751. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-phase2-integration.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Organization type: " . $status['organization_type'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1752. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-phase2-integration.php:100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1753. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Using existing place (ID: $place_id) - " . $places[0]->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1754. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:88
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Claim code: " . $claim_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1755. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:98
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - ID: " . $orphan->ID . " | " . $orphan->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1756. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Email: " . $test_username . "@example.com\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1757. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1758. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Method: " . $claim->verification_method . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1759. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:131
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Code: " . $claim->verification_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1760. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $claim->claim_date . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1761. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1762. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - Claim #" . $pending->id . " | Place: " . $pending->place_name . " | User: " . $pending->display_name . " | Status: " . $pending->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1763. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total claims: " . $stats['total'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1764. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Pending: " . $stats['pending'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1765. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Verified: " . $stats['verified'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1766. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:167
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Approved: " . $stats['approved'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1767. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejected: " . $stats['rejected'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1768. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Orphan places: " . $stats['orphan_places'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1769. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $manager->display_name . " (" . $manager->role . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1770. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Final status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1771. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:195
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Reviewed by: User ID " . $claim->reviewed_by . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1772. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Notes: " . $claim->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1773. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:204
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Place URL: " . $place_url . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1774. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:219
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\nNext: Test frontend at: " . $place_url . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1775. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Using existing place (ID: $place_id) - " . $places[0]->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1776. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:88
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Claim code: " . $claim_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1777. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:98
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - ID: " . $orphan->ID . " | " . $orphan->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1778. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Email: " . $test_username . "@example.com\n";
Recommendation: Use $wpdb->prepare() with placeholders
1779. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1780. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Method: " . $claim->verification_method . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1781. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:131
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Code: " . $claim->verification_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1782. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $claim->claim_date . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1783. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1784. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - Claim #" . $pending->id . " | Place: " . $pending->place_name . " | User: " . $pending->display_name . " | Status: " . $pending->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1785. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total claims: " . $stats['total'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1786. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Pending: " . $stats['pending'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1787. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Verified: " . $stats['verified'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1788. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:167
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Approved: " . $stats['approved'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1789. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejected: " . $stats['rejected'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1790. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Orphan places: " . $stats['orphan_places'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1791. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $manager->display_name . " (" . $manager->role . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders
1792. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Final status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1793. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:195
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Reviewed by: User ID " . $claim->reviewed_by . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1794. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Notes: " . $claim->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1795. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:204
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Place URL: " . $place_url . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1796. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-workflow.php:219
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "\nNext: Test frontend at: " . $place_url . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1797. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Database error: " . $wpdb->last_error . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1798. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ID: " . $manager->id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1799. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Role: " . $manager->role . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1800. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $manager->date_added . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1801. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $mgr->display_name . " (" . $mgr->role . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1802. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Database error: " . $wpdb->last_error . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1803. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ID: " . $manager->id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1804. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Role: " . $manager->role . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1805. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $manager->date_added . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1806. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $mgr->display_name . " (" . $mgr->role . ")\n";
Recommendation: Use $wpdb->prepare() with placeholders
1807. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/debug-frontend.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Found Places hook: $class::" . $callback['function'][1] . " at priority $priority\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1808. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/debug-frontend.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Found Places hook: $class::" . $callback['function'][1] . " at priority $priority\n";
Recommendation: Use $wpdb->prepare() with placeholders
1809. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/check-admin-status.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - {$id}: " . $module->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1810. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/check-admin-status.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✓ Active Module: " . $active->getName() . " ({$active->getId()})\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1811. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/check-admin-status.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error loading modules: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1812. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/check-admin-status.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - {$id}: " . $module->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1813. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/check-admin-status.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✓ Active Module: " . $active->getName() . " ({$active->getId()})\n";
Recommendation: Use $wpdb->prepare() with placeholders
1814. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/check-admin-status.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error loading modules: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1815. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/check-admin-status.php:89
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$all_org_options = $wpdb->get_results("SELECT option_name, option_value FROM {$wpdb->options} WHERE option_name LIKE 'cxq_mm_%' ORDER BY option_name");
Recommendation: Use $wpdb->prepare() with placeholders
1816. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ID: " . $instance->getId() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1817. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $instance->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1818. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Description: " . $instance->getDescription() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1819. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Icon: " . $instance->getIcon() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1820. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1821. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✓ Active module: " . $active->getName() . " ({$active->getId()})\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1822. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1823. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ID: " . $instance->getId() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1824. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $instance->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1825. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Description: " . $instance->getDescription() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1826. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Icon: " . $instance->getIcon() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1827. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1828. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✓ Active module: " . $active->getName() . " ({$active->getId()})\n";
Recommendation: Use $wpdb->prepare() with placeholders
1829. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-org-types.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1830. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-libraries.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "❌ <strong>{$service_name}</strong>: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1831. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-libraries.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "❌ <strong>{$service_name}</strong>: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1832. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Query failed: " . $e->getMessage() . " ✗\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1833. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:91
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Failed to create test user: " . $test_user_id->get_error_message() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1834. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Place ID: " . $claim->place_id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1835. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " User ID: " . $claim->user_id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1836. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1837. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Method: " . $claim->verification_method . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1838. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:121
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Code: " . $claim->verification_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1839. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $claim->claim_date . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1840. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New status: " . $claim_obj->status . " (should be 'verified')\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1841. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " First claim ID: " . $pending[0]->id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1842. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:173
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Place name: " . $pending[0]->place_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1843. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " User: " . $pending[0]->display_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1844. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total: " . $stats['total'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1845. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:186
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Pending: " . $stats['pending'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1846. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:187
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Verified: " . $stats['verified'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1847. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Approved: " . $stats['approved'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1848. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejected: " . $stats['rejected'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1849. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Orphan places: " . $stats['orphan_places'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1850. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:211
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Final status: " . $claim_obj->status . " (should be 'approved')\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1851. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Reviewed by: " . $claim_obj->reviewed_by . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1852. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:213
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Notes: " . $claim_obj->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1853. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:249
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim_obj_2->status . " (should be 'rejected')\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1854. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:250
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejection reason: " . $claim_obj_2->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1855. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Query failed: " . $e->getMessage() . " ✗\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1856. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:91
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Failed to create test user: " . $test_user_id->get_error_message() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1857. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Place ID: " . $claim->place_id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1858. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " User ID: " . $claim->user_id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1859. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim->status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1860. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Method: " . $claim->verification_method . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1861. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:121
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Code: " . $claim->verification_code . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1862. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Date: " . $claim->claim_date . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1863. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New status: " . $claim_obj->status . " (should be 'verified')\n";
Recommendation: Use $wpdb->prepare() with placeholders
1864. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " First claim ID: " . $pending[0]->id . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1865. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:173
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Place name: " . $pending[0]->place_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1866. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " User: " . $pending[0]->display_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1867. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total: " . $stats['total'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1868. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:186
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Pending: " . $stats['pending'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1869. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:187
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Verified: " . $stats['verified'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1870. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Approved: " . $stats['approved'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1871. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejected: " . $stats['rejected'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1872. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Orphan places: " . $stats['orphan_places'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1873. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:211
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Final status: " . $claim_obj->status . " (should be 'approved')\n";
Recommendation: Use $wpdb->prepare() with placeholders
1874. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Reviewed by: " . $claim_obj->reviewed_by . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1875. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:213
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Notes: " . $claim_obj->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1876. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:249
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Status: " . $claim_obj_2->status . " (should be 'rejected')\n";
Recommendation: Use $wpdb->prepare() with placeholders
1877. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-claims-service-only.php:250
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Rejection reason: " . $claim_obj_2->notes . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1878. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1879. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active Module: " . $active_module->getName() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1880. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1881. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1882. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:89
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1883. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1884. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active Module: " . $active_module->getName() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1885. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1886. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1887. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard.php:89
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1888. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-asset-manager.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error registering stylesheet: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1889. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-asset-manager.php:72
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error registering script: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1890. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-asset-manager.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error registering stylesheet: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1891. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-asset-manager.php:72
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Error registering script: " . $e->getMessage() . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
1892. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:666
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1893. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_event($user->ID,'Registration',"Failed to change username from `{$user->user_login}` to `{$new_username}`: ".$wpdb->show_errors(false));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1894. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2332
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1895. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2391
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1896. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2458
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "<select name='" . esc_attr( $parsed_args['name'] ) . "'" . $class . " id='" . esc_attr( $parsed_args['id'] ) . "'>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1897. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2460
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1898. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2510
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "<select name='" . esc_attr( $parsed_args['name'] ) . "'" . $class . " id='" . esc_attr( $parsed_args['id'] ) . "'>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1899. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2512
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1900. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2519
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"" . esc_attr( $parsed_args['option_now_value'] ) . "\"{$selected}>" . $parsed_args['show_option_now'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1901. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2523
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"" . esc_attr( $parsed_args['option_custom_default_value'] ) . "\"{$selected}>" . $parsed_args['show_option_custom_default'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1902. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:666
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1903. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->log_event($user->ID,'Registration',"Failed to change username from `{$user->user_login}` to `{$new_username}`: ".$wpdb->show_errors(false));
Recommendation: Use $wpdb->prepare() with placeholders
1904. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2332
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1905. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2391
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1906. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2458
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "<select name='" . esc_attr( $parsed_args['name'] ) . "'" . $class . " id='" . esc_attr( $parsed_args['id'] ) . "'>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1907. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2460
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1908. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2510
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output = "<select name='" . esc_attr( $parsed_args['name'] ) . "'" . $class . " id='" . esc_attr( $parsed_args['id'] ) . "'>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1909. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2512
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"-1\">" . $parsed_args['show_option_no_change'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1910. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2519
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"" . esc_attr( $parsed_args['option_now_value'] ) . "\"{$selected}>" . $parsed_args['show_option_now'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1911. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/cxq-membership.php:2523
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "\t<option value=\"" . esc_attr( $parsed_args['option_custom_default_value'] ) . "\"{$selected}>" . $parsed_args['show_option_custom_default'] . "</option>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1912. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-features-comprehensive.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $org_instance->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1913. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-features-comprehensive.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Description: " . $org_instance->getDescription() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1914. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-features-comprehensive.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Icon: " . $org_instance->getIcon() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1915. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-features-comprehensive.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $org_instance->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1916. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-features-comprehensive.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Description: " . $org_instance->getDescription() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1917. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-features-comprehensive.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Icon: " . $org_instance->getIcon() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1918. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-features-integration.php:69
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✓ Active module loaded: " . $active_module->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1919. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-features-integration.php:69
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✓ Active module loaded: " . $active_module->getName() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1920. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard-simulation.php:405
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $result['name'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1921. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard-simulation.php:407
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " " . $result['details'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1922. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard-simulation.php:405
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " - " . $result['name'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1923. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-setup-wizard-simulation.php:407
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " " . $result['details'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1924. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/simple-test.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ ServiceContainer instantiation failed: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1925. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/simple-test.php:73
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Service test failed: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1926. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/simple-test.php:58
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ ServiceContainer instantiation failed: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1927. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/simple-test.php:73
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✗ Service test failed: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1928. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Post type: " . $place->post_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1929. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:18
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Post title: " . $place->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1930. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Wrong post type! Expected 'cxq_mm_member', got '" . $place->post_type . "'\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1931. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Username: " . $user->user_login . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1932. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Email: " . $user->user_email . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1933. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:17
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Post type: " . $place->post_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1934. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:18
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Post title: " . $place->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1935. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Wrong post type! Expected 'cxq_mm_member', got '" . $place->post_type . "'\n";
Recommendation: Use $wpdb->prepare() with placeholders
1936. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Username: " . $user->user_login . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1937. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/test-permissions-debug.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Email: " . $user->user_email . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1938. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/migration-phase2.php:194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->usermeta} WHERE meta_key = '_org_positions'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1939. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/migration-phase2.php:195
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->usermeta} WHERE meta_key = '_primary_position'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1940. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/migration-phase2.php:196
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->usermeta} WHERE meta_key = '_credentials'");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1941. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/register-deregister-post-status.class.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
jQuery( 'select[name=\"post_status\"]' ).append( '<option value=\"{$status}\">{$label}</option>' );".$jq_status;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1942. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/register-deregister-post-status.class.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
jQuery( 'select[name=\"post_status\"]' ).append( '<option value=\"{$status}\">{$label}</option>' );".$jq_status;
Recommendation: Use $wpdb->prepare() with placeholders
1943. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/tests/simple-integration-test.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Migration Version: " . $status['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1944. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/tests/simple-integration-test.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Migration Version: " . $status['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
1945. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/build/build.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (is_dir($dir . "/" . $object)) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1946. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/build/build.php:170
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rrmdir($dir . "/" . $object);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1947. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/build/build.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
unlink($dir . "/" . $object);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1948. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/build/build.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if (is_dir($dir . "/" . $object)) {
Recommendation: Use $wpdb->prepare() with placeholders
1949. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/build/build.php:170
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rrmdir($dir . "/" . $object);
Recommendation: Use $wpdb->prepare() with placeholders
1950. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/build/build.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
unlink($dir . "/" . $object);
Recommendation: Use $wpdb->prepare() with placeholders
1951. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1952. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1953. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1954. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1955. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1956. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1957. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1958. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1959. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1960. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1961. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1962. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1963. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1964. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1965. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
1966. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
1967. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
1968. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
1969. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
1970. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
1971. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1972. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
1973. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
1974. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
1975. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
1976. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
1977. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
1978. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/dev/dBug.class.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
1979. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/core/cxq-membership-profiles.php:1236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html.="<td class=\"{$column_name}\">".$this->return_column_value( $column_name, $user).'</td>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1980. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/core/cxq-membership-profiles.php:1236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html.="<td class=\"{$column_name}\">".$this->return_column_value( $column_name, $user).'</td>';
Recommendation: Use $wpdb->prepare() with placeholders
1981. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/custom/cxq-membership-cust-ems.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT meta_key,meta_value as member_id, count(meta_key) as count FROM `".$wpdb->usermeta."` WHERE meta_key = 'cxq_member_id_number' and meta_value<>'' group by meta_key,meta_value;";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1982. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/custom/cxq-membership-cust-ems.php:78
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT meta_key,meta_value as member_id, count(meta_key) as count FROM `".$wpdb->usermeta."` WHERE meta_key = 'cxq_member_id_number' and meta_value<>'' group by meta_key,meta_value;";
Recommendation: Use $wpdb->prepare() with placeholders
1983. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/custom/cxq-membership-cust-nsp.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT meta_key,meta_value as member_id, count(meta_key) as count FROM `".$wpdb->usermeta."` WHERE meta_key = 'cxq_member_id_number' and meta_value<>'' group by meta_key,meta_value;";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1984. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/custom/cxq-membership-cust-nsp.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT meta_key,meta_value as member_id, count(meta_key) as count FROM `".$wpdb->usermeta."` WHERE meta_key = 'cxq_member_id_number' and meta_value<>'' group by meta_key,meta_value;";
Recommendation: Use $wpdb->prepare() with placeholders
1985. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/core/optional/cxq-membership-attachments.php:613
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exif[] = exif_read_data("data://{$mime_type};base64," . $file,$sections );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1986. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/includes/core/optional/cxq-membership-attachments.php:613
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exif[] = exif_read_data("data://{$mime_type};base64," . $file,$sections );
Recommendation: Use $wpdb->prepare() with placeholders
1987. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/src/Core/ErrorHandler.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$context_str ? "\nContext: " . $context_str : ''
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1988. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/src/Core/ErrorHandler.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$context_str ? "\nContext: " . $context_str : ''
Recommendation: Use $wpdb->prepare() with placeholders
1989. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/src/Services/UserProfileService.php:305
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Failed to change username from `{$user->user_login}` to `{$new_username}`: " . $wpdb->show_errors(false)
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1990. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/src/Services/UserProfileService.php:305
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Failed to change username from `{$user->user_login}` to `{$new_username}`: " . $wpdb->show_errors(false)
Recommendation: Use $wpdb->prepare() with placeholders
1991. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/src/Services/WorkflowExecutionService.php:201
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Failed to update user: " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1992. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/src/Services/WorkflowExecutionService.php:224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Failed to create user: " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1993. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/src/Services/WorkflowExecutionService.php:201
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Failed to update user: " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
1994. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-membership.backup-20260115/src/Services/WorkflowExecutionService.php:224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Failed to create user: " . $user_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
1995. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1996. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1997. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1998. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
1999. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2000. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2001. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2002. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:209
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2003. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2004. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2005. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2006. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2007. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2008. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2009. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
2010. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
2011. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2012. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
2013. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2014. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
2015. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2016. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:209
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2017. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2018. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2019. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
2020. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2021. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2022. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/dBug.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
2023. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:221
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd = "array('Ascent'=>".$info['Ascender'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2024. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:223
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'Descent'=>".$info['Descender'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2025. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:226
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'CapHeight'=>".$info['CapHeight'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2026. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:228
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'CapHeight'=>".$info['Ascender'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2027. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'Flags'=>".$flags;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2028. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:239
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'FontBBox'=>'[".$fbb[0].' '.$fbb[1].' '.$fbb[2].' '.$fbb[3]."]'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2029. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'ItalicAngle'=>".$info['ItalicAngle'];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2030. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:249
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'StemV'=>".$stemv;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2031. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:251
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'MissingWidth'=>".$info['MissingWidth'].')';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2032. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:221
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd = "array('Ascent'=>".$info['Ascender'];
Recommendation: Use $wpdb->prepare() with placeholders
2033. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:223
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'Descent'=>".$info['Descender'];
Recommendation: Use $wpdb->prepare() with placeholders
2034. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:226
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'CapHeight'=>".$info['CapHeight'];
Recommendation: Use $wpdb->prepare() with placeholders
2035. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:228
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'CapHeight'=>".$info['Ascender'];
Recommendation: Use $wpdb->prepare() with placeholders
2036. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'Flags'=>".$flags;
Recommendation: Use $wpdb->prepare() with placeholders
2037. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:239
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'FontBBox'=>'[".$fbb[0].' '.$fbb[1].' '.$fbb[2].' '.$fbb[3]."]'";
Recommendation: Use $wpdb->prepare() with placeholders
2038. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'ItalicAngle'=>".$info['ItalicAngle'];
Recommendation: Use $wpdb->prepare() with placeholders
2039. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:249
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'StemV'=>".$stemv;
Recommendation: Use $wpdb->prepare() with placeholders
2040. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdf/makefont/makefont.php:251
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$fd .= ",'MissingWidth'=>".$info['MissingWidth'].')';
Recommendation: Use $wpdb->prepare() with placeholders
2041. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdi2/src/PdfParser/Filter/Flate.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
fwrite($fh, "\x1f\x8b\x08\x00\x00\x00\x00\x00" . $oData);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2042. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-autocomplete-awsc-form/fpdi2/src/PdfParser/Filter/Flate.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
fwrite($fh, "\x1f\x8b\x08\x00\x00\x00\x00\x00" . $oData);
Recommendation: Use $wpdb->prepare() with placeholders
2043. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2044. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2045. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2046. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2047. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2048. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2049. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2050. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:209
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2051. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2052. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2053. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2054. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2055. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2056. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2057. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
2058. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
2059. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2060. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
2061. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2062. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
2063. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2064. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:209
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2065. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2066. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2067. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
2068. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2069. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2070. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/dBug.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
2071. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:325
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "<td>".$lpar.($row[$column]??0).$rpar."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2072. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:329
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "<td>".$other_total."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2073. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:331
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "<td>".$lpar.($row['total']??0).$rpar."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2074. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:376
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$phone_number = "-" . $phone_number;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2075. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:382
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$phone_number = ") " . $phone_number;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2076. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$phone_number = "(" . $phone_number;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2077. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:325
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "<td>".$lpar.($row[$column]??0).$rpar."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2078. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:329
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "<td>".$other_total."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2079. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:331
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$output .= "<td>".$lpar.($row['total']??0).$rpar."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2080. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:376
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$phone_number = "-" . $phone_number;
Recommendation: Use $wpdb->prepare() with placeholders
2081. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:382
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$phone_number = ") " . $phone_number;
Recommendation: Use $wpdb->prepare() with placeholders
2082. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-listx/cxq-woocommerce-sales-list.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$phone_number = "(" . $phone_number;
Recommendation: Use $wpdb->prepare() with placeholders
2083. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/pta-sus-global-functions.php:453
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
file_put_contents($log_file, date('Y-m-d H:i:s') . ": " . $msg . "\n", FILE_APPEND);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2084. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/pta-sus-global-functions.php:453
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
file_put_contents($log_file, date('Y-m-d H:i:s') . ": " . $msg . "\n", FILE_APPEND);
Recommendation: Use $wpdb->prepare() with placeholders
2085. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_admin.php:1771
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "From: " . $from_name . " <" . $from_email . ">";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2086. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_admin.php:1772
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "Reply-To: " . $reply_to;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2087. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_admin.php:1771
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "From: " . $from_name . " <" . $from_email . ">";
Recommendation: Use $wpdb->prepare() with placeholders
2088. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_admin.php:1772
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "Reply-To: " . $reply_to;
Recommendation: Use $wpdb->prepare() with placeholders
2089. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_emails.php:28
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "From: " . get_bloginfo('name') . " <" . $from . ">";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2090. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_emails.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "Reply-To: <" . $reply . ">";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2091. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_emails.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "Reply-To: <" . $replyto . ">";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2092. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_emails.php:228
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->last_reminder = "To: " . $to . "\r\n\r\n" . $message . "\r\n\r\n\r\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2093. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_emails.php:28
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "From: " . get_bloginfo('name') . " <" . $from . ">";
Recommendation: Use $wpdb->prepare() with placeholders
2094. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_emails.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "Reply-To: <" . $reply . ">";
Recommendation: Use $wpdb->prepare() with placeholders
2095. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_emails.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[] = "Reply-To: <" . $replyto . ">";
Recommendation: Use $wpdb->prepare() with placeholders
2096. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_emails.php:228
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->last_reminder = "To: " . $to . "\r\n\r\n" . $message . "\r\n\r\n\r\n";
Recommendation: Use $wpdb->prepare() with placeholders
2097. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:115
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
FROM ".$this->tables['sheet']['name']."
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2098. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row = $this->wpdb->get_row($this->wpdb->prepare("SELECT * FROM ".$this->tables['sheet']['name']." WHERE id = %d" , $id));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2099. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT COUNT(*) FROM ".$this->tables['sheet']['name']." WHERE trash = %d", $trash));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2100. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:205
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT COUNT(*) FROM ".$this->tables['sheet']['name']." WHERE title = %s AND trash = 0", $title));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2101. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:225
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT COUNT(*) FROM ".$this->tables['signup']['name']."
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2102. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:296
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "UPDATE ".$this->tables['sheet']['name']."
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2103. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:311
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT * FROM ".$this->tables['task']['name']." WHERE sheet_id = %d ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2104. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:332
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT id FROM ".$this->tables['task']['name']." WHERE sheet_id = %d ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2105. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:359
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$task = $this->wpdb->get_row($this->wpdb->prepare("SELECT * FROM ".$this->tables['task']['name']." WHERE id = %d" , $id));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2106. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:368
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT DISTINCT dates FROM ".$this->tables['task']['name']." WHERE sheet_id = %d";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2107. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:398
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "UPDATE ".$this->tables['task']['name']." SET sheet_id = %d WHERE sheet_id = %d";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2108. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT * FROM ".$this->tables['signup']['name']." WHERE task_id = %d ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2109. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:431
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT * FROM ".$this->tables['signup']['name']." WHERE lastname like '%s' OR firstname like '%s' GROUP BY firstname, lastname";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2110. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:467
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT DISTINCT email FROM ".$this->tables['signup']['name']." ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2111. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:469
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$TASKSQL = "SELECT id FROM ".$this->tables['task']['name']." WHERE sheet_id = %d";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2112. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:486
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $this->wpdb->get_row($this->wpdb->prepare("SELECT * FROM ".$this->tables['signup']['name']." WHERE id = %d" , $id));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2113. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:577
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
FROM ".$this->tables['sheet']['name']." sheet
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2114. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:578
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
INNER JOIN ".$this->tables['task']['name']." task ON sheet.id = task.sheet_id
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2115. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:579
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
INNER JOIN ".$this->tables['signup']['name']." signup ON task.id = signup.task_id
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2116. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:1209
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "DELETE FROM ".$this->tables['signup']['name']." WHERE %s > ADDDATE(date, %d)";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2117. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:1226
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT id FROM ".$this->tables['sheet']['name']." WHERE %s > ADDDATE(last_date, %d)";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2118. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:1724
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $firstname." ".$this->initials_arr($nwords);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2119. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:115
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
FROM ".$this->tables['sheet']['name']."
Recommendation: Use $wpdb->prepare() with placeholders
2120. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row = $this->wpdb->get_row($this->wpdb->prepare("SELECT * FROM ".$this->tables['sheet']['name']." WHERE id = %d" , $id));
Recommendation: Use $wpdb->prepare() with placeholders
2121. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT COUNT(*) FROM ".$this->tables['sheet']['name']." WHERE trash = %d", $trash));
Recommendation: Use $wpdb->prepare() with placeholders
2122. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:205
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT COUNT(*) FROM ".$this->tables['sheet']['name']." WHERE title = %s AND trash = 0", $title));
Recommendation: Use $wpdb->prepare() with placeholders
2123. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:225
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT COUNT(*) FROM ".$this->tables['signup']['name']."
Recommendation: Use $wpdb->prepare() with placeholders
2124. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:296
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "UPDATE ".$this->tables['sheet']['name']."
Recommendation: Use $wpdb->prepare() with placeholders
2125. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:311
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT * FROM ".$this->tables['task']['name']." WHERE sheet_id = %d ";
Recommendation: Use $wpdb->prepare() with placeholders
2126. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:332
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT id FROM ".$this->tables['task']['name']." WHERE sheet_id = %d ";
Recommendation: Use $wpdb->prepare() with placeholders
2127. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:359
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$task = $this->wpdb->get_row($this->wpdb->prepare("SELECT * FROM ".$this->tables['task']['name']." WHERE id = %d" , $id));
Recommendation: Use $wpdb->prepare() with placeholders
2128. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:368
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT DISTINCT dates FROM ".$this->tables['task']['name']." WHERE sheet_id = %d";
Recommendation: Use $wpdb->prepare() with placeholders
2129. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:398
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "UPDATE ".$this->tables['task']['name']." SET sheet_id = %d WHERE sheet_id = %d";
Recommendation: Use $wpdb->prepare() with placeholders
2130. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT * FROM ".$this->tables['signup']['name']." WHERE task_id = %d ";
Recommendation: Use $wpdb->prepare() with placeholders
2131. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:431
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT * FROM ".$this->tables['signup']['name']." WHERE lastname like '%s' OR firstname like '%s' GROUP BY firstname, lastname";
Recommendation: Use $wpdb->prepare() with placeholders
2132. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:467
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$SQL = "SELECT DISTINCT email FROM ".$this->tables['signup']['name']." ";
Recommendation: Use $wpdb->prepare() with placeholders
2133. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:469
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$TASKSQL = "SELECT id FROM ".$this->tables['task']['name']." WHERE sheet_id = %d";
Recommendation: Use $wpdb->prepare() with placeholders
2134. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:486
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $this->wpdb->get_row($this->wpdb->prepare("SELECT * FROM ".$this->tables['signup']['name']." WHERE id = %d" , $id));
Recommendation: Use $wpdb->prepare() with placeholders
2135. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:577
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
FROM ".$this->tables['sheet']['name']." sheet
Recommendation: Use $wpdb->prepare() with placeholders
2136. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:578
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
INNER JOIN ".$this->tables['task']['name']." task ON sheet.id = task.sheet_id
Recommendation: Use $wpdb->prepare() with placeholders
2137. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:579
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
INNER JOIN ".$this->tables['signup']['name']." signup ON task.id = signup.task_id
Recommendation: Use $wpdb->prepare() with placeholders
2138. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:1209
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "DELETE FROM ".$this->tables['signup']['name']." WHERE %s > ADDDATE(date, %d)";
Recommendation: Use $wpdb->prepare() with placeholders
2139. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:1226
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql = "SELECT id FROM ".$this->tables['sheet']['name']." WHERE %s > ADDDATE(last_date, %d)";
Recommendation: Use $wpdb->prepare() with placeholders
2140. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/data.php:1724
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $firstname." ".$this->initials_arr($nwords);
Recommendation: Use $wpdb->prepare() with placeholders
2141. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_signup_functions.php:39
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $wpdb->get_row($wpdb->prepare("SELECT * FROM ".$signup_table." WHERE id = %d" , $signup_id));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2142. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/pta-volunteer-sign-up-sheets/classes/class-pta_sus_signup_functions.php:39
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $wpdb->get_row($wpdb->prepare("SELECT * FROM ".$signup_table." WHERE id = %d" , $signup_id));
Recommendation: Use $wpdb->prepare() with placeholders
2143. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/x_aurora.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = '306bfb022724a25c7d795719358609b1'; //bquig
Recommendation: Move credentials to environment variables or secure configuration
2144. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/x_aurora.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//$api_key = 'e8d268dbf5ed7bfa6d01ec9377e1d415'; //lost768
Recommendation: Move credentials to environment variables or secure configuration
2145. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/drink_list.php:300
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this_list_content = "<h2>{$subtype}</h2>".$this_list_content;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2146. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/drink_list.php:300
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this_list_content = "<h2>{$subtype}</h2>".$this_list_content;
Recommendation: Use $wpdb->prepare() with placeholders
2147. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/weather-new.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = '306bfb022724a25c7d795719358609b1'; //bquig
Recommendation: Move credentials to environment variables or secure configuration
2148. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/weather-new.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//$api_key = 'e8d268dbf5ed7bfa6d01ec9377e1d415'; //lost768
Recommendation: Move credentials to environment variables or secure configuration
2149. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/cache.php:179
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
new dBug2("HTTP request failed. Error was: " . $error['message']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2150. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/cache.php:179
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
new dBug2("HTTP request failed. Error was: " . $error['message']);
Recommendation: Use $wpdb->prepare() with placeholders
2151. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/drink_list_template_default.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this_list_content = "<h2>{$subtype}</h2>".$this_list_content;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2152. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/drink_list_template_default.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this_list_content = "<h2>{$subtype}</h2>".$this_list_content;
Recommendation: Use $wpdb->prepare() with placeholders
2153. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/weather.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = '306bfb022724a25c7d795719358609b1'; //bquig
Recommendation: Move credentials to environment variables or secure configuration
2154. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/weather.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//$api_key = 'e8d268dbf5ed7bfa6d01ec9377e1d415'; //lost768
Recommendation: Move credentials to environment variables or secure configuration
2155. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/events.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
exec("ping -c 1 " . $domain, $output, $result);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2156. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/events.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//new dBug2($age."/".$max_refresh_interval);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2157. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/events.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
exec("ping -c 1 " . $domain, $output, $result);
Recommendation: Use $wpdb->prepare() with placeholders
2158. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/events.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//new dBug2($age."/".$max_refresh_interval);
Recommendation: Use $wpdb->prepare() with placeholders
2159. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2160. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2161. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2162. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2163. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2164. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2165. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2166. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2167. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2168. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2169. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2170. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2171. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:313
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2172. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2173. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
2174. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
2175. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2176. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
2177. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2178. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
2179. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2180. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2181. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2182. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2183. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
2184. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2185. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:313
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2186. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/dBug.class.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
2187. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/sports.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = 'd3be6efcb12a449c497d671557bbeb1e'; // limit hit for May 2022
Recommendation: Move credentials to environment variables or secure configuration
2188. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/sports.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = 'f837a07ab0344f6ec917fafdb0276ffa';
Recommendation: Move credentials to environment variables or secure configuration
2189. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/styles/weather-new.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = '306bfb022724a25c7d795719358609b1'; //bquig
Recommendation: Move credentials to environment variables or secure configuration
2190. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/styles/weather-new.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//$api_key = 'e8d268dbf5ed7bfa6d01ec9377e1d415'; //lost768
Recommendation: Move credentials to environment variables or secure configuration
2191. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/weather-new.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = '306bfb022724a25c7d795719358609b1'; //bquig
Recommendation: Move credentials to environment variables or secure configuration
2192. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/weather-new.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//$api_key = 'e8d268dbf5ed7bfa6d01ec9377e1d415'; //lost768
Recommendation: Move credentials to environment variables or secure configuration
2193. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/cache.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
new dBug2("HTTP request failed. Error was: " . $error['message']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2194. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/cache.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
new dBug2("HTTP request failed. Error was: " . $error['message']);
Recommendation: Use $wpdb->prepare() with placeholders
2195. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/drink_list_template_default.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this_list_content = "<h2>{$subtype}</h2>".$this_list_content;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2196. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/drink_list_template_default.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this_list_content = "<h2>{$subtype}</h2>".$this_list_content;
Recommendation: Use $wpdb->prepare() with placeholders
2197. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/Xweather-new.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = '306bfb022724a25c7d795719358609b1'; //bquig
Recommendation: Move credentials to environment variables or secure configuration
2198. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/Xweather-new.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//$api_key = 'e8d268dbf5ed7bfa6d01ec9377e1d415'; //lost768
Recommendation: Move credentials to environment variables or secure configuration
2199. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/weather.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = '306bfb022724a25c7d795719358609b1'; //bquig
Recommendation: Move credentials to environment variables or secure configuration
2200. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/weather.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//$api_key = 'e8d268dbf5ed7bfa6d01ec9377e1d415'; //lost768
Recommendation: Move credentials to environment variables or secure configuration
2201. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/events.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
exec("ping -c 1 " . $domain, $output, $result);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2202. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/events.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
exec("ping -c 1 " . $domain, $output, $result);
Recommendation: Use $wpdb->prepare() with placeholders
2203. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2204. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2205. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2206. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2207. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2208. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2209. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2210. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2211. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2212. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2213. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2214. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2215. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:313
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2216. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2217. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
2218. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
2219. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2220. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
2221. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2222. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
2223. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2224. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2225. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2226. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2227. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
2228. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2229. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:313
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2230. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/dBug.class.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
2231. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/sports.php:5
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = 'd3be6efcb12a449c497d671557bbeb1e'; // limit hit for May 2022
Recommendation: Move credentials to environment variables or secure configuration
2232. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-signage/templates/sports.php:6
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$api_key = 'f837a07ab0344f6ec917fafdb0276ffa';
Recommendation: Move credentials to environment variables or secure configuration
2233. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/common.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "<option value='" . $field->id . "' " . $selected . '>' . $field_label . '</option>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2234. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/common.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "<option value='" . $field->id . "' " . $selected . '>' . $field_label . '</option>';
Recommendation: Use $wpdb->prepare() with placeholders
2235. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/xml.php:44
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\r\n" . $indent;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2236. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/xml.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return strlen( $data ) == 0 && ! rgar( $option, "allow_empty" ) ? "" : "$padding<$parent_node_name>" . $this->xml_value( $parent_node_name, $data ) . "</$parent_node_name>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2237. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/xml.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$version = $path == $parent_node_name && isset( $this->options["version"] ) ? " version=\"" . $this->options["version"] . "\"" : "";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2238. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/xml.php:44
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "\r\n" . $indent;
Recommendation: Use $wpdb->prepare() with placeholders
2239. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/xml.php:77
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return strlen( $data ) == 0 && ! rgar( $option, "allow_empty" ) ? "" : "$padding<$parent_node_name>" . $this->xml_value( $parent_node_name, $data ) . "</$parent_node_name>";
Recommendation: Use $wpdb->prepare() with placeholders
2240. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/xml.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$version = $path == $parent_node_name && isset( $this->options["version"] ) ? " version=\"" . $this->options["version"] . "\"" : "";
Recommendation: Use $wpdb->prepare() with placeholders
2241. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/export.php:344
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
GFCommon::add_message( sprintf( esc_html__( 'Gravity Forms imported %d %s successfully', 'gravityforms' ), $count, $form_text ) . ". $edit_link" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2242. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/export.php:908
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value = "'" . $value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2243. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/export.php:1071
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row_str = "'" . $row_str;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2244. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/export.php:1101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value = "'" . $value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2245. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/export.php:344
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
GFCommon::add_message( sprintf( esc_html__( 'Gravity Forms imported %d %s successfully', 'gravityforms' ), $count, $form_text ) . ". $edit_link" );
Recommendation: Use $wpdb->prepare() with placeholders
2246. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/export.php:908
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value = "'" . $value;
Recommendation: Use $wpdb->prepare() with placeholders
2247. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/export.php:1071
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row_str = "'" . $row_str;
Recommendation: Use $wpdb->prepare() with placeholders
2248. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/export.php:1101
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value = "'" . $value;
Recommendation: Use $wpdb->prepare() with placeholders
2249. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_detail.php:1556
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$modal = json_encode( "<div class='tb-title'><div class='tb-title__logo'></div><div class='tb-title__text'><div class='tb-title__main'>" . $window_title . "</div><div class='tb-title__sub'>" . esc_html__( 'Select a category and customize the predefined choices or paste your own list to bulk add choices.', 'gravityforms' ) . "</div></div></div>" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2250. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_detail.php:3014
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
die( "EndAddField($field_json, " . $field_html_json . ", $index);" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2251. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_detail.php:1556
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$modal = json_encode( "<div class='tb-title'><div class='tb-title__logo'></div><div class='tb-title__text'><div class='tb-title__main'>" . $window_title . "</div><div class='tb-title__sub'>" . esc_html__( 'Select a category and customize the predefined choices or paste your own list to bulk add choices.', 'gravityforms' ) . "</div></div></div>" );
Recommendation: Use $wpdb->prepare() with placeholders
2252. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_detail.php:3014
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
die( "EndAddField($field_json, " . $field_html_json . ", $index);" );
Recommendation: Use $wpdb->prepare() with placeholders
2253. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/forms_model.php:5636
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
if ( move_uploaded_file( $file['tmp_name'], $target['path'] ) ) {
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
2254. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/forms_model.php:5733
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$target_path = $target_root . $file_name . "$counter" . $extension;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2255. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/forms_model.php:5733
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$target_path = $target_root . $file_name . "$counter" . $extension;
Recommendation: Use $wpdb->prepare() with placeholders
2256. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/gravityforms.php:5273
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$link = "<a class='{$link_class}' onclick='{$onclick}' onkeypress='{$onclick}' {$aria_label} href='{$url}' target='{$target}'>{$label}</a>" . $sub_menu_str;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2257. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/gravityforms.php:5273
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$link = "<a class='{$link_class}' onclick='{$onclick}' onkeypress='{$onclick}' {$aria_label} href='{$url}' target='{$target}'>{$label}</a>" . $sub_menu_str;
Recommendation: Use $wpdb->prepare() with placeholders
2258. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:460
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
if ( $file_info && move_uploaded_file( $_FILES[ $input_name ]['tmp_name'], $target_path . $file_info['temp_filename'] ) ) {
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
2259. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:465
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
GFCommon::log_error( "GFFormDisplay::upload_files(): File could not be uploaded: tmp_name: {$_FILES[ $input_name ]['tmp_name']} - target location: " . $target_path . $file_info['temp_filename'] );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2260. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:1123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<div class='{$wrapper_css_class}{$custom_wrapper_css_class}' {$form_theme} {$page_instance} id='gform_wrapper_$form_id' " . $style . '>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2261. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:1413
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<iframe style='{$iframe_style}' src='about:blank' name='gform_ajax_frame_{$form_id}' id='gform_ajax_frame_{$form_id}'" . $iframe_title . ">" . $iframe_content . "</iframe>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2262. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:2148
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = empty( $confirmation['message'] ) ? "{$anchor} " : "{$anchor}<div id='gform_confirmation_wrapper_{$form['id']}' class='gform_confirmation_wrapper {$css_class}'><div id='gform_confirmation_message_{$form['id']}' class='gform_confirmation_message_{$form['id']} gform_confirmation_message'>" . $message . '</div></div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2263. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:3406
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"window['gf_number_format'] = '" . $number_format . "';" .
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2264. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:4138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$product_suffix = "_{$form_id}_" . $field->productField;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2265. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:4779
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$confirmation_message = "<div class='form_saved_message'>" . $confirmation_message . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2266. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:4943
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ajax_iframe_content = "<!DOCTYPE html><html><head><meta charset='UTF-8' /></head><body class='GF_AJAX_POSTBACK'>" . $body_content . '</body></html>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2267. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:465
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
GFCommon::log_error( "GFFormDisplay::upload_files(): File could not be uploaded: tmp_name: {$_FILES[ $input_name ]['tmp_name']} - target location: " . $target_path . $file_info['temp_filename'] );
Recommendation: Use $wpdb->prepare() with placeholders
2268. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:1123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<div class='{$wrapper_css_class}{$custom_wrapper_css_class}' {$form_theme} {$page_instance} id='gform_wrapper_$form_id' " . $style . '>';
Recommendation: Use $wpdb->prepare() with placeholders
2269. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:1413
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<iframe style='{$iframe_style}' src='about:blank' name='gform_ajax_frame_{$form_id}' id='gform_ajax_frame_{$form_id}'" . $iframe_title . ">" . $iframe_content . "</iframe>
Recommendation: Use $wpdb->prepare() with placeholders
2270. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:2148
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message = empty( $confirmation['message'] ) ? "{$anchor} " : "{$anchor}<div id='gform_confirmation_wrapper_{$form['id']}' class='gform_confirmation_wrapper {$css_class}'><div id='gform_confirmation_message_{$form['id']}' class='gform_confirmation_message_{$form['id']} gform_confirmation_message'>" . $message . '</div></div>';
Recommendation: Use $wpdb->prepare() with placeholders
2271. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:3406
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"window['gf_number_format'] = '" . $number_format . "';" .
Recommendation: Use $wpdb->prepare() with placeholders
2272. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:4138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$product_suffix = "_{$form_id}_" . $field->productField;
Recommendation: Use $wpdb->prepare() with placeholders
2273. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:4779
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$confirmation_message = "<div class='form_saved_message'>" . $confirmation_message . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2274. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/form_display.php:4943
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$ajax_iframe_content = "<!DOCTYPE html><html><head><meta charset='UTF-8' /></head><body class='GF_AJAX_POSTBACK'>" . $body_content . '</body></html>';
Recommendation: Use $wpdb->prepare() with placeholders
2275. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/upload.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
GFCommon::log_debug( "GFAsyncUpload::upload(): Couldn't create the tmp folder: " . $target_dir );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2276. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/upload.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
GFCommon::log_debug( "GFAsyncUpload::upload(): Couldn't create the tmp folder: " . $target_dir );
Recommendation: Use $wpdb->prepare() with placeholders
2277. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/class-gf-upgrade.php:474
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$max = $wpdb->query( "select id from {$table_name} order by id desc" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2278. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/class-gf-upgrade.php:1478
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $wpdb->query( "UPDATE {$lead_details_table} SET value = TRIM(value)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2279. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/class-gf-upgrade.php:1582
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DROP INDEX {$index} ON {$table}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2280. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/class-gf-upgrade.php:1733
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$result = $wpdb->query( "ALTER TABLE {$lead_detail_table} MODIFY `value` LONGTEXT;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2281. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/class-gf-upgrade.php:1480
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $wpdb->get_results( "SELECT form_id, display_meta, confirmations, notifications FROM {$meta_table_name}", ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
2282. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-results.php:571
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_results .= "<td class='gsurvey-likert-choice-label'>" . $choice['text'] . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2283. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-results.php:598
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_results .= "<td class='gsurvey-likert-row-label'>" . $row_text . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2284. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-results.php:608
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_results .= "<td class='gsurvey-likert-results' style='background-color:{$clr}'>" . $val . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2285. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-results.php:614
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_results .= "<td class='gsurvey-likert-results'>" . $average_row_score . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2286. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-results.php:571
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_results .= "<td class='gsurvey-likert-choice-label'>" . $choice['text'] . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders
2287. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-results.php:598
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_results .= "<td class='gsurvey-likert-row-label'>" . $row_text . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders
2288. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-results.php:608
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_results .= "<td class='gsurvey-likert-results' style='background-color:{$clr}'>" . $val . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders
2289. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-results.php:614
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_results .= "<td class='gsurvey-likert-results'>" . $average_row_score . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders
2290. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-addon.php:5427
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
die( esc_html__( "You don't have adequate permission to uninstall this add-on: " . $this->_title, 'gravityforms' ) );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2291. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-addon.php:5427
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
die( esc_html__( "You don't have adequate permission to uninstall this add-on: " . $this->_title, 'gravityforms' ) );
Recommendation: Use $wpdb->prepare() with placeholders
2292. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2574
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html .= "<script type='text/javascript'>var " . $field['name'] . '_intervals = ' . json_encode( $intervals ) . ';</script>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2293. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2966
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner1 = "yearweek(CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "')) week";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2294. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2967
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner2 = "yearweek(CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "')) week";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2295. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2984
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner1 = "date_format(CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "'), '%%Y-%%m-01') inner_month";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2296. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2985
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner2 = "date_format(CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "'), '%%Y-%%m-01') inner_month";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2297. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3002
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner1 = "date(CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "')) as date";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2298. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3003
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner2 = "date(CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "')) as date";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2299. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3025
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lead_date_filter = $wpdb->prepare( " AND timestampdiff(SECOND, %s, CONVERT_TZ(l.payment_date, '+00:00', '" . $tz_offset . "')) >= 0", $search['start_date'] );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2300. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3026
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$transaction_date_filter = $wpdb->prepare( " AND timestampdiff(SECOND, %s, CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "')) >= 0", $search['start_date'] );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2301. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3031
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lead_date_filter .= $wpdb->prepare( " AND timestampdiff(SECOND, %s, CONVERT_TZ(l.payment_date, '+00:00', '" . $tz_offset . "')) <= 0", $search['end_date'] );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2302. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3032
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$transaction_date_filter .= $wpdb->prepare( " AND timestampdiff(SECOND, %s, CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "')) <= 0", $search['end_date'] );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2303. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT date( CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "') ) as date,
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2304. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
WHERE status='active' AND form_id = %d AND datediff(now(), CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "') ) <= 30
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2305. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3199
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT date( CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "') ) as date,
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2306. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2574
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html .= "<script type='text/javascript'>var " . $field['name'] . '_intervals = ' . json_encode( $intervals ) . ';</script>';
Recommendation: Use $wpdb->prepare() with placeholders
2307. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2966
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner1 = "yearweek(CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "')) week";
Recommendation: Use $wpdb->prepare() with placeholders
2308. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2967
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner2 = "yearweek(CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "')) week";
Recommendation: Use $wpdb->prepare() with placeholders
2309. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2984
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner1 = "date_format(CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "'), '%%Y-%%m-01') inner_month";
Recommendation: Use $wpdb->prepare() with placeholders
2310. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:2985
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner2 = "date_format(CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "'), '%%Y-%%m-01') inner_month";
Recommendation: Use $wpdb->prepare() with placeholders
2311. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3002
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner1 = "date(CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "')) as date";
Recommendation: Use $wpdb->prepare() with placeholders
2312. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3003
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$select_inner2 = "date(CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "')) as date";
Recommendation: Use $wpdb->prepare() with placeholders
2313. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3025
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lead_date_filter = $wpdb->prepare( " AND timestampdiff(SECOND, %s, CONVERT_TZ(l.payment_date, '+00:00', '" . $tz_offset . "')) >= 0", $search['start_date'] );
Recommendation: Use $wpdb->prepare() with placeholders
2314. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3026
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$transaction_date_filter = $wpdb->prepare( " AND timestampdiff(SECOND, %s, CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "')) >= 0", $search['start_date'] );
Recommendation: Use $wpdb->prepare() with placeholders
2315. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3031
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$lead_date_filter .= $wpdb->prepare( " AND timestampdiff(SECOND, %s, CONVERT_TZ(l.payment_date, '+00:00', '" . $tz_offset . "')) <= 0", $search['end_date'] );
Recommendation: Use $wpdb->prepare() with placeholders
2316. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3032
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$transaction_date_filter .= $wpdb->prepare( " AND timestampdiff(SECOND, %s, CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "')) <= 0", $search['end_date'] );
Recommendation: Use $wpdb->prepare() with placeholders
2317. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT date( CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "') ) as date,
Recommendation: Use $wpdb->prepare() with placeholders
2318. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3194
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
WHERE status='active' AND form_id = %d AND datediff(now(), CONVERT_TZ(payment_date, '+00:00', '" . $tz_offset . "') ) <= 30
Recommendation: Use $wpdb->prepare() with placeholders
2319. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-payment-addon.php:3199
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
SELECT date( CONVERT_TZ(t.date_created, '+00:00', '" . $tz_offset . "') ) as date,
Recommendation: Use $wpdb->prepare() with placeholders
2320. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-feed-processor.php:149
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
), __METHOD__ . "(): Starting to process feed (#{$feed['id']} - {$feed_name}) for entry #{$entry['id']} for {$addon->get_slug()}. Attempt number: " . $item['attempts'] );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2321. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/addon/class-gf-feed-processor.php:149
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
), __METHOD__ . "(): Starting to process feed (#{$feed['id']} - {$feed_name}) for entry #{$entry['id']} for {$addon->get_slug()}. Attempt number: " . $item['attempts'] );
Recommendation: Use $wpdb->prepare() with placeholders
2322. File upload without malware scanning detected
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-fileupload.php:731
CWE: CWE-434
Confidence: HIGH
Description: File upload without malware scanning detected
Code:
if ( move_uploaded_file( $file['tmp_name'], $target['path'] ) ) {
Recommendation: Scan uploaded files with ClamAV or similar before moving to permanent location
2323. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-fileupload.php:462
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<div class='ginput_container ginput_container_fileupload'>" . $upload . " {$preview}</div>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2324. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-fileupload.php:467
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<div class='ginput_container ginput_container_fileupload'>$upload</div>" . $preview;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2325. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-fileupload.php:462
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<div class='ginput_container ginput_container_fileupload'>" . $upload . " {$preview}</div>";
Recommendation: Use $wpdb->prepare() with placeholders
2326. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-fileupload.php:467
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<div class='ginput_container ginput_container_fileupload'>$upload</div>" . $preview;
Recommendation: Use $wpdb->prepare() with placeholders
2327. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-creditcard.php:433
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<div class='ginput_complex{$class_suffix} ginput_container ginput_container_creditcard gform-grid-row' id='{$field_id}'>" . $card_field . $expiration_field . $security_field . $card_name_field . ' </div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2328. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-creditcard.php:433
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<div class='ginput_complex{$class_suffix} ginput_container ginput_container_creditcard gform-grid-row' id='{$field_id}'>" . $card_field . $expiration_field . $security_field . $card_name_field . ' </div>';
Recommendation: Use $wpdb->prepare() with placeholders
2329. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-checkbox.php:740
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<label for='{$id}' id='label_" . $this->id . "_select_all' class='gform-field-label gform-field-label--type-inline' data-label-select='{$select_label}' data-label-deselect='{$deselect_label}'>{$toggle_label}</label>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2330. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-checkbox.php:740
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<label for='{$id}' id='label_" . $this->id . "_select_all' class='gform-field-label gform-field-label--type-inline' data-label-select='{$select_label}' data-label-deselect='{$deselect_label}'>{$toggle_label}</label>
Recommendation: Use $wpdb->prepare() with placeholders
2331. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-number.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$instruction = "<div class='gfield_description instruction $validation_class' id='gfield_instruction_{$this->formId}_{$this->id}'>" . $message . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2332. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-number.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$instruction = "<div class='gfield_description instruction $validation_class' id='gfield_instruction_{$this->formId}_{$this->id}'>" . $message . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2333. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-name.php:412
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<label for='{$field_id}_6' class='gform-field-label gform-field-label--type-sub {$sub_label_class}'>" . $last_name_sub_label . "</label>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2334. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-name.php:412
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<label for='{$field_id}_6' class='gform-field-label gform-field-label--type-sub {$sub_label_class}'>" . $last_name_sub_label . "</label>
Recommendation: Use $wpdb->prepare() with placeholders
2335. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-address.php:561
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$state_field_id = "id='" . $field_id . "_4'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2336. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-address.php:561
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$state_field_id = "id='" . $field_id . "_4'";
Recommendation: Use $wpdb->prepare() with placeholders
2337. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<div class='ginput_complex$class_suffix ginput_container ginput_container_post_image gform-grid-row'>" . $upload . $alt_field . $title_field . $caption_field . $description_field . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2338. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:223
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value .= ! empty( $alt ) ? "\n\n" . $this->label . ' (' . __( 'Alternative Text', 'gravityforms' ) . '): ' . $description : '';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2339. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value .= ! empty( $title ) ? "\n\n" . $this->label . ' (' . __( 'Title', 'gravityforms' ) . '): ' . $title : '';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2340. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:225
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value .= ! empty( $caption ) ? "\n\n" . $this->label . ' (' . __( 'Caption', 'gravityforms' ) . '): ' . $caption : '';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2341. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:226
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value .= ! empty( $description ) ? "\n\n" . $this->label . ' (' . __( 'Description', 'gravityforms' ) . '): ' . $description : '';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2342. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "<div class='ginput_complex$class_suffix ginput_container ginput_container_post_image gform-grid-row'>" . $upload . $alt_field . $title_field . $caption_field . $description_field . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2343. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:223
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value .= ! empty( $alt ) ? "\n\n" . $this->label . ' (' . __( 'Alternative Text', 'gravityforms' ) . '): ' . $description : '';
Recommendation: Use $wpdb->prepare() with placeholders
2344. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value .= ! empty( $title ) ? "\n\n" . $this->label . ' (' . __( 'Title', 'gravityforms' ) . '): ' . $title : '';
Recommendation: Use $wpdb->prepare() with placeholders
2345. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:225
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value .= ! empty( $caption ) ? "\n\n" . $this->label . ' (' . __( 'Caption', 'gravityforms' ) . '): ' . $caption : '';
Recommendation: Use $wpdb->prepare() with placeholders
2346. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-post-image.php:226
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value .= ! empty( $description ) ? "\n\n" . $this->label . ' (' . __( 'Description', 'gravityforms' ) . '): ' . $description : '';
Recommendation: Use $wpdb->prepare() with placeholders
2347. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-list.php:218
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$list .= "<div class='gfield_list_group_item gfield_list_cell gfield_list_{$this->id}_cell{$colnum} gform-grid-col' {$data_label}>" . $this->get_list_input( $has_columns, $column, $val, $form_id, $rownum ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2348. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-list.php:401
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$list .= "<td class='gfield_list_cell gfield_list_{$this->id}_cell{$colnum}' {$data_label}>" . $this->get_list_input( $has_columns, $column, $val, $form_id, null ) . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2349. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-list.php:706
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$list .= "\n\n" . $this->label . ': ';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2350. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-list.php:218
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$list .= "<div class='gfield_list_group_item gfield_list_cell gfield_list_{$this->id}_cell{$colnum} gform-grid-col' {$data_label}>" . $this->get_list_input( $has_columns, $column, $val, $form_id, $rownum ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2351. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-list.php:401
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$list .= "<td class='gfield_list_cell gfield_list_{$this->id}_cell{$colnum}' {$data_label}>" . $this->get_list_input( $has_columns, $column, $val, $form_id, null ) . '</td>';
Recommendation: Use $wpdb->prepare() with placeholders
2352. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-list.php:706
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$list .= "\n\n" . $this->label . ': ';
Recommendation: Use $wpdb->prepare() with placeholders
2353. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:328
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$month_dropdown = "<div class='gfield_date_dropdown_month ginput_date_dropdown ginput_container ginput_container_date gform-grid-col' id='gfield_dropdown_date_month' style='display:$dropdown_display'>" . $this->get_month_dropdown( '', "{$field_id}_1", rgar( $date_info, 'month' ), '', $disabled_text, $month_placeholder_value ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2354. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:329
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$day_dropdown = "<div class='gfield_date_dropdown_day ginput_date_dropdown ginput_container ginput_container_date gform-grid-col' id='gfield_dropdown_date_day' style='display:$dropdown_display'>" . $this->get_day_dropdown( '', "{$field_id}_2", rgar( $date_info, 'day' ), '', $disabled_text, $day_placeholder_value ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2355. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:330
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$year_dropdown = "<div class='gfield_date_dropdown_year ginput_date_dropdown ginput_container ginput_container_date gform-grid-col' id='gfield_dropdown_date_year' style='display:$dropdown_display'>" . $this->get_year_dropdown( '', "{$field_id}_3", rgar( $date_info, 'year' ), '', $disabled_text, $year_placeholder_value, $form ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2356. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:374
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str = "{$clear_multi_div_open}<div class='gfield_date_dropdown_day ginput_container ginput_container_date gform-grid-col' id='{$field_id}_2_container'>" . $this->get_day_dropdown( "input_{$id}[]", "{$field_id}_2", rgar( $date_info, 'day' ), $tabindex, $disabled_text, $day_placeholder_value, $day_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2357. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:377
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_month ginput_container ginput_container_date gform-grid-col' id='{$field_id}_1_container'>" . $this->get_month_dropdown( "input_{$id}[]", "{$field_id}_1", rgar( $date_info, 'month' ), $tabindex, $disabled_text, $month_placeholder_value, $month_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2358. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:381
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_year ginput_container ginput_container_date gform-grid-col' id='{$field_id}_3_container'>" . $this->get_year_dropdown( "input_{$id}[]", "{$field_id}_3", rgar( $date_info, 'year' ), $tabindex, $disabled_text, $year_placeholder_value, $form, $year_aria_attributes ) ."</div>{$clear_multi_div_close}";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2359. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:432
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str = "{$clear_multi_div_open}<div class='gfield_date_dropdown_year ginput_container ginput_container_date gform-grid-col' id='{$field_id}_3_container'>" . $this->get_year_dropdown( "input_{$id}[]", "{$field_id}_3", rgar( $date_info, 'year' ), $tabindex, $disabled_text, $year_placeholder_value, $form, $year_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2360. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:436
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_month ginput_container ginput_container_date gform-grid-col' id='{$field_id}_1_container'>" . $this->get_month_dropdown( "input_{$id}[]", "{$field_id}_1", rgar( $date_info, 'month' ), $tabindex, $disabled_text, $month_placeholder_value, $month_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2361. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:440
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_day ginput_container ginput_container_date gform-grid-col' id='{$field_id}_2_container'>" . $this->get_day_dropdown( "input_{$id}[]", "{$field_id}_2", rgar( $date_info, 'day' ), $tabindex, $disabled_text, $day_placeholder_value, $day_aria_attributes ) . "</div>{$clear_multi_div_close}";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2362. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:489
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str = "{$clear_multi_div_open}<div class='gfield_date_dropdown_month ginput_container ginput_container_date gform-grid-col' id='{$field_id}_1_container'>" . $this->get_month_dropdown( "input_{$id}[]", "{$field_id}_1", rgar( $date_info, 'month' ), $tabindex, $disabled_text, $month_placeholder_value, $month_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2363. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:493
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_day ginput_container ginput_container_date gform-grid-col' id='{$field_id}_2_container'>" . $this->get_day_dropdown( "input_{$id}[]", "{$field_id}_2", rgar( $date_info, 'day' ), $tabindex, $disabled_text, $day_placeholder_value, $day_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2364. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:497
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_year ginput_container ginput_container_date gform-grid-col' id='{$field_id}_3_container'>" . $this->get_year_dropdown( "input_{$id}[]", "{$field_id}_3", rgar( $date_info, 'year' ), $tabindex, $disabled_text, $year_placeholder_value, $form, $year_aria_attributes ) . "</div>{$clear_multi_div_close}";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2365. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:328
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$month_dropdown = "<div class='gfield_date_dropdown_month ginput_date_dropdown ginput_container ginput_container_date gform-grid-col' id='gfield_dropdown_date_month' style='display:$dropdown_display'>" . $this->get_month_dropdown( '', "{$field_id}_1", rgar( $date_info, 'month' ), '', $disabled_text, $month_placeholder_value ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2366. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:329
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$day_dropdown = "<div class='gfield_date_dropdown_day ginput_date_dropdown ginput_container ginput_container_date gform-grid-col' id='gfield_dropdown_date_day' style='display:$dropdown_display'>" . $this->get_day_dropdown( '', "{$field_id}_2", rgar( $date_info, 'day' ), '', $disabled_text, $day_placeholder_value ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2367. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:330
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$year_dropdown = "<div class='gfield_date_dropdown_year ginput_date_dropdown ginput_container ginput_container_date gform-grid-col' id='gfield_dropdown_date_year' style='display:$dropdown_display'>" . $this->get_year_dropdown( '', "{$field_id}_3", rgar( $date_info, 'year' ), '', $disabled_text, $year_placeholder_value, $form ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2368. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:374
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str = "{$clear_multi_div_open}<div class='gfield_date_dropdown_day ginput_container ginput_container_date gform-grid-col' id='{$field_id}_2_container'>" . $this->get_day_dropdown( "input_{$id}[]", "{$field_id}_2", rgar( $date_info, 'day' ), $tabindex, $disabled_text, $day_placeholder_value, $day_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2369. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:377
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_month ginput_container ginput_container_date gform-grid-col' id='{$field_id}_1_container'>" . $this->get_month_dropdown( "input_{$id}[]", "{$field_id}_1", rgar( $date_info, 'month' ), $tabindex, $disabled_text, $month_placeholder_value, $month_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2370. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:381
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_year ginput_container ginput_container_date gform-grid-col' id='{$field_id}_3_container'>" . $this->get_year_dropdown( "input_{$id}[]", "{$field_id}_3", rgar( $date_info, 'year' ), $tabindex, $disabled_text, $year_placeholder_value, $form, $year_aria_attributes ) ."</div>{$clear_multi_div_close}";
Recommendation: Use $wpdb->prepare() with placeholders
2371. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:432
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str = "{$clear_multi_div_open}<div class='gfield_date_dropdown_year ginput_container ginput_container_date gform-grid-col' id='{$field_id}_3_container'>" . $this->get_year_dropdown( "input_{$id}[]", "{$field_id}_3", rgar( $date_info, 'year' ), $tabindex, $disabled_text, $year_placeholder_value, $form, $year_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2372. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:436
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_month ginput_container ginput_container_date gform-grid-col' id='{$field_id}_1_container'>" . $this->get_month_dropdown( "input_{$id}[]", "{$field_id}_1", rgar( $date_info, 'month' ), $tabindex, $disabled_text, $month_placeholder_value, $month_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2373. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:440
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_day ginput_container ginput_container_date gform-grid-col' id='{$field_id}_2_container'>" . $this->get_day_dropdown( "input_{$id}[]", "{$field_id}_2", rgar( $date_info, 'day' ), $tabindex, $disabled_text, $day_placeholder_value, $day_aria_attributes ) . "</div>{$clear_multi_div_close}";
Recommendation: Use $wpdb->prepare() with placeholders
2374. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:489
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str = "{$clear_multi_div_open}<div class='gfield_date_dropdown_month ginput_container ginput_container_date gform-grid-col' id='{$field_id}_1_container'>" . $this->get_month_dropdown( "input_{$id}[]", "{$field_id}_1", rgar( $date_info, 'month' ), $tabindex, $disabled_text, $month_placeholder_value, $month_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2375. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:493
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_day ginput_container ginput_container_date gform-grid-col' id='{$field_id}_2_container'>" . $this->get_day_dropdown( "input_{$id}[]", "{$field_id}_2", rgar( $date_info, 'day' ), $tabindex, $disabled_text, $day_placeholder_value, $day_aria_attributes ) . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2376. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-date.php:497
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$field_str .= "<div class='gfield_date_dropdown_year ginput_container ginput_container_date gform-grid-col' id='{$field_id}_3_container'>" . $this->get_year_dropdown( "input_{$id}[]", "{$field_id}_3", rgar( $date_info, 'year' ), $tabindex, $disabled_text, $year_placeholder_value, $form, $year_aria_attributes ) . "</div>{$clear_multi_div_close}";
Recommendation: Use $wpdb->prepare() with placeholders
2377. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-calculation.php:93
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$quantity_field .= " <span class='ginput_quantity_label gform-field-label' aria-hidden='true'>" . $product_quantity_sub_label . "</span> <input type='{$qty_input_type}' name='input_{$id}.3' value='{$quantity}' id='input_{$form_id}_{$this->id}_1' class='ginput_quantity' size='10' {$qty_min_attr} {$tabindex} {$disabled_text} {$quantity_aria_describedby} />";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2378. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-calculation.php:93
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$quantity_field .= " <span class='ginput_quantity_label gform-field-label' aria-hidden='true'>" . $product_quantity_sub_label . "</span> <input type='{$qty_input_type}' name='input_{$id}.3' value='{$quantity}' id='input_{$form_id}_{$this->id}_1' class='ginput_quantity' size='10' {$qty_min_attr} {$tabindex} {$disabled_text} {$quantity_aria_describedby} />";
Recommendation: Use $wpdb->prepare() with placeholders
2379. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:322
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row .= "<div class='gfield_repeater_cell'>" . $field_input . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2380. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html = "<button type='button' class='add_repeater_item gform-theme-button gform-theme-button--secondary gform-theme-button--size-sm {$disabled_icon_class} {$add_button_class}' {$add_events}>" . $add_button_text . "</button>" .
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2381. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:389
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"<button type='button' class='remove_repeater_item gform-theme-button gform-theme-button--secondary gform-theme-button--size-sm {$remove_button_class}' {$delete_events} style='{$delete_display}'>" . $remove_button_text . "</button>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2382. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:963
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$line = $label . "\n" . $field->get_value_export_recursive( $field_value, $field->id, $use_text, $is_csv, $new_depth, $padding );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2383. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:982
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row_value = "'" . $row_value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2384. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:992
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value = "'" . $value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2385. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:322
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row .= "<div class='gfield_repeater_cell'>" . $field_input . '</div>';
Recommendation: Use $wpdb->prepare() with placeholders
2386. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html = "<button type='button' class='add_repeater_item gform-theme-button gform-theme-button--secondary gform-theme-button--size-sm {$disabled_icon_class} {$add_button_class}' {$add_events}>" . $add_button_text . "</button>" .
Recommendation: Use $wpdb->prepare() with placeholders
2387. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:389
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"<button type='button' class='remove_repeater_item gform-theme-button gform-theme-button--secondary gform-theme-button--size-sm {$remove_button_class}' {$delete_events} style='{$delete_display}'>" . $remove_button_text . "</button>";
Recommendation: Use $wpdb->prepare() with placeholders
2388. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:963
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$line = $label . "\n" . $field->get_value_export_recursive( $field_value, $field->id, $use_text, $is_csv, $new_depth, $padding );
Recommendation: Use $wpdb->prepare() with placeholders
2389. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:982
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$row_value = "'" . $row_value;
Recommendation: Use $wpdb->prepare() with placeholders
2390. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-repeater.php:992
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$value = "'" . $value;
Recommendation: Use $wpdb->prepare() with placeholders
2391. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-email.php:212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<label for='{$field_id}' class='gform-field-label gform-field-label--type-sub {$sub_label_class}'>" . $enter_email_label . "</label>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2392. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-email.php:212
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<label for='{$field_id}' class='gform-field-label gform-field-label--type-sub {$sub_label_class}'>" . $enter_email_label . "</label>
Recommendation: Use $wpdb->prepare() with placeholders
2393. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
_deprecated_function( "Array access to the field object is now deprecated. Further notices will be suppressed. \$field['" . $offset . "']", '2.0', 'the object operator e.g. $field->' . $offset );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2394. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:1220
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "onchange='gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ");' onkeyup='clearTimeout(__gf_timeout_handle); __gf_timeout_handle = setTimeout(\"gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ")\", 300);'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2395. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:1224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "onclick='gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ");' onkeypress='gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ");'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2396. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:1228
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "onchange='gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ");'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2397. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:1791
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $is_admin || ! empty( $description ) ? "<div class='$css_class' id='$id'>" . $description . '</div>' : '';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2398. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
_deprecated_function( "Array access to the field object is now deprecated. Further notices will be suppressed. \$field['" . $offset . "']", '2.0', 'the object operator e.g. $field->' . $offset );
Recommendation: Use $wpdb->prepare() with placeholders
2399. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:1220
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "onchange='gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ");' onkeyup='clearTimeout(__gf_timeout_handle); __gf_timeout_handle = setTimeout(\"gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ")\", 300);'";
Recommendation: Use $wpdb->prepare() with placeholders
2400. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:1224
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "onclick='gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ");' onkeypress='gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ");'";
Recommendation: Use $wpdb->prepare() with placeholders
2401. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:1228
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return "onchange='gf_apply_rules(" . $this->formId . ',' . GFCommon::json_encode( $this->conditionalLogicFields ) . ");'";
Recommendation: Use $wpdb->prepare() with placeholders
2402. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field.php:1791
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return $is_admin || ! empty( $description ) ? "<div class='$css_class' id='$id'>" . $description . '</div>' : '';
Recommendation: Use $wpdb->prepare() with placeholders
2403. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-singleproduct.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$quantity_field .= " <span class='ginput_quantity_label gform-field-label' aria-hidden='true'>" . $product_quantity_sub_label . "</span> <input type='{$qty_input_type}' name='input_{$id}.3' value='{$quantity}' id='input_{$form_id}_{$this->id}_1' class='ginput_quantity' size='10' {$qty_min_attr} {$tabindex} {$disabled_text} {$quantity_aria_label} {$quantity_aria_describedby} />";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2404. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/fields/class-gf-field-singleproduct.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$quantity_field .= " <span class='ginput_quantity_label gform-field-label' aria-hidden='true'>" . $product_quantity_sub_label . "</span> <input type='{$qty_input_type}' name='input_{$id}.3' value='{$quantity}' id='input_{$form_id}_{$this->id}_1' class='ginput_quantity' size='10' {$qty_min_attr} {$tabindex} {$disabled_text} {$quantity_aria_label} {$quantity_aria_describedby} />";
Recommendation: Use $wpdb->prepare() with placeholders
2405. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/query/batch-processing/class-gf-entry-meta-batch-processor.php:93
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
array( "SELECT id, meta_key FROM {$meta_table} WHERE meta_key in " . $prepare_statement_placeholders ),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2406. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/query/batch-processing/class-gf-entry-meta-batch-processor.php:93
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
array( "SELECT id, meta_key FROM {$meta_table} WHERE meta_key in " . $prepare_statement_placeholders ),
Recommendation: Use $wpdb->prepare() with placeholders
2407. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/settings/fields/class-notification-routing.php:498
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "<option value='" . $field->id . "' " . $selected . '>' . $field_label . '</option>';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2408. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/gravityforms/includes/settings/fields/class-notification-routing.php:498
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str .= "<option value='" . $field->id . "' " . $selected . '>' . $field_label . '</option>';
Recommendation: Use $wpdb->prepare() with placeholders
2409. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/all-in-one-wp-migration/uninstall.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "DELETE FROM `{$wpdb->options}` WHERE `option_name` LIKE 'ai1wm\_%'" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2410. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/antispam-bee/inc/columns.class.php:109
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$reasons = $wpdb->get_results( "SELECT meta_value FROM {$wpdb->prefix}commentmeta WHERE meta_key = 'antispam_bee_reason' group by meta_value", ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
2411. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:37
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total plugins: " . $stats['total_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2412. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active plugins: " . $stats['active_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2413. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:39
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total downloads: " . $stats['total_downloads'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2414. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total plugins: " . $stats['total_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2415. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active plugins: " . $stats['active_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2416. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Testing plugin: " . $test_plugin->plugin_slug . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2417. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Registry version: " . $test_plugin->current_version . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2418. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:86
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Simulated installed version: " . $old_version . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2419. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:92
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Current: " . $update['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2420. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:93
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New: " . $update['new_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2421. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $retrieved->plugin_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2422. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Version: " . $retrieved->current_version . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2423. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:136
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✓ Plugin updated to v" . $retrieved2->current_version . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2424. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:154
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total plugins: " . $final_stats['total_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2425. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:155
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active plugins: " . $final_stats['active_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2426. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:156
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total downloads: " . $final_stats['total_downloads'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2427. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:37
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total plugins: " . $stats['total_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2428. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active plugins: " . $stats['active_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2429. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:39
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total downloads: " . $stats['total_downloads'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2430. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:54
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total plugins: " . $stats['total_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2431. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active plugins: " . $stats['active_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2432. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Testing plugin: " . $test_plugin->plugin_slug . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2433. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:82
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Registry version: " . $test_plugin->current_version . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2434. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:86
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Simulated installed version: " . $old_version . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2435. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:92
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Current: " . $update['current_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2436. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:93
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " New: " . $update['new_version'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2437. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Name: " . $retrieved->plugin_name . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2438. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Version: " . $retrieved->current_version . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2439. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:136
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "✓ Plugin updated to v" . $retrieved2->current_version . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2440. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:154
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total plugins: " . $final_stats['total_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2441. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:155
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Active plugins: " . $final_stats['active_plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2442. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/test-plugin-registry.php:156
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total downloads: " . $final_stats['total_downloads'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2443. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:1261
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$cols = $wpdb->get_col( "DESC " . $wpdb->posts, 0 );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2444. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:2213
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$table_name}`
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2445. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:2218
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("ALTER TABLE `{$table_name}` CHANGE `log_id` `log_id` BIGINT(20) UNSIGNED NOT NULL AUTO_INCREMENT;");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2446. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:2721
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$needle = str_replace($e,"\\".$e,$needle);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2447. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:2722
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$replace = str_replace($e,"\\".$e,$replace);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2448. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:2985
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('error',"Installation of $type `{$slug}` failed (".$installed->get_error_message().')');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2449. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:1261
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$cols = $wpdb->get_col( "DESC " . $wpdb->posts, 0 );
Recommendation: Use $wpdb->prepare() with placeholders
2450. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:2721
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$needle = str_replace($e,"\\".$e,$needle);
Recommendation: Use $wpdb->prepare() with placeholders
2451. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:2722
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$replace = str_replace($e,"\\".$e,$replace);
Recommendation: Use $wpdb->prepare() with placeholders
2452. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/cxq-site-manager-host.class.php:2985
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->add_notice('error',"Installation of $type `{$slug}` failed (".$installed->get_error_message().')');
Recommendation: Use $wpdb->prepare() with placeholders
2453. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2454. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total updates: " . $data['total_all'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2455. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Core: " . $data['totals']['core'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2456. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Plugins: " . $data['totals']['plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2457. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Themes: " . $data['totals']['themes'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2458. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:67
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2459. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:35
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2460. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Total updates: " . $data['total_all'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2461. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Core: " . $data['totals']['core'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2462. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Plugins: " . $data['totals']['plugins'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2463. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " Themes: " . $data['totals']['themes'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2464. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/diag.php:67
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " ✗ Error: " . $e->getMessage() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2465. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2466. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2467. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2468. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2469. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2470. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2471. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2472. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2473. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/includes/core/cxq-site-manager-host-cloudflare.php:13
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
//protected $zone_api_token = '-xHZ2Ut7wyszICtT_MMJT9out0uHSltENvyi85Ic';
Recommendation: Move credentials to environment variables or secure configuration
2474. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/includes/core/cxq-site-manager-host-cloudflare.php:14
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
protected $api_key = '3b55771ba3f2a783a2baaa0c11f512b29c7d2';
Recommendation: Move credentials to environment variables or secure configuration
2475. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/includes/core/cxq-site-manager-host-lightsail.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print($instance['name'] . ": " . $instance['state']['name'] . "\n");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2476. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/includes/core/cxq-site-manager-host-lightsail.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print($instance['name'] . ": " . $instance['state']['name'] . "\n");
Recommendation: Use $wpdb->prepare() with placeholders
2477. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-site-manager-host/includes/core/cxq-site-manager-host-lightsail.php:20
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$secret = 'v5UZpJWwVhFJjO2fe0BaobZw+K4gXIbASKjnOCu1';
Recommendation: Move credentials to environment variables or secure configuration
2478. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-documents/includes/core/cxq-docmgr-document.php:331
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exif[] = exif_read_data("data://{$mime_type};base64," . $file,$sections );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2479. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-documents/includes/core/cxq-docmgr-document.php:331
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$exif[] = exif_read_data("data://{$mime_type};base64," . $file,$sections );
Recommendation: Use $wpdb->prepare() with placeholders
2480. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api-rules.php:1027
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "TRUNCATE TABLE {$table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2481. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:168
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$this->table_name} ADD COLUMN sm_client_id BIGINT UNSIGNED DEFAULT NULL" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2482. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:169
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$this->table_name} ADD KEY sm_client_id (sm_client_id)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2483. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:473
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN source_category VARCHAR(30) NOT NULL DEFAULT 'auto_uncertain' AFTER confidence_level" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2484. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:478
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN original_client_verdict VARCHAR(20) DEFAULT NULL AFTER source_category" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2485. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:483
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN priority INT NOT NULL DEFAULT 50 AFTER original_client_verdict" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2486. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:484
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD KEY idx_priority (priority)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2487. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:489
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN client_submission_log_id BIGINT DEFAULT NULL AFTER priority" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2488. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:494
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN deferred_response_needed BOOLEAN DEFAULT FALSE AFTER client_submission_log_id" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2489. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:499
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN deferred_deadline DATETIME DEFAULT NULL AFTER deferred_response_needed" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2490. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:500
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD KEY idx_deferred_deadline (deferred_deadline)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2491. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:505
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN verdict_pushed_to_client BOOLEAN DEFAULT FALSE AFTER client_notified" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2492. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:510
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN verdict_push_attempts INT DEFAULT 0 AFTER verdict_pushed_to_client" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2493. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:515
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD COLUMN verdict_pushed_at DATETIME DEFAULT NULL AFTER verdict_push_attempts" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2494. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:525
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "ALTER TABLE {$table_name} ADD KEY idx_source_category (source_category)" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2495. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:466
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$columns = $wpdb->get_results( "SHOW COLUMNS FROM {$table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders
2496. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-client-manager.php:519
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$indexes = $wpdb->get_results( "SHOW INDEX FROM {$table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders
2497. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-health-monitor.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->get_results( "SELECT COUNT(*) FROM {$wpdb->prefix}cxq_antispam_clients" );
Recommendation: Use $wpdb->prepare() with placeholders
2498. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-captcha-manager.php:182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results = $wpdb->get_results( "SELECT * FROM {$this->config_table}", ARRAY_A );
Recommendation: Use $wpdb->prepare() with placeholders
2499. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api.php:1397
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Content: " . $feedback_data['content'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2500. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api.php:1399
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Original Verdict: " . $feedback_data['original_verdict'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2501. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api.php:1400
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Original Score: " . $feedback_data['original_score'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2502. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api.php:1401
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Timestamp: " . $feedback_data['timestamp'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2503. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api.php:1397
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Content: " . $feedback_data['content'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2504. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api.php:1399
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Original Verdict: " . $feedback_data['original_verdict'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2505. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api.php:1400
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Original Score: " . $feedback_data['original_score'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2506. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-api.php:1401
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Timestamp: " . $feedback_data['timestamp'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2507. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/includes/class-cxq-antispam-host-cli.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "TRUNCATE TABLE {$table_name}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2508. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/admin/class-cxq-antispam-host-admin.php:723
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$rules = $wpdb->get_results( "SELECT * FROM {$rules_table} ORDER BY priority DESC, rule_name ASC" );
Recommendation: Use $wpdb->prepare() with placeholders
2509. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam-host/admin/class-cxq-antispam-host-admin.php:1084
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$clients = $wpdb->get_results( "SELECT id, client_name FROM {$clients_table} WHERE status = 'approved' ORDER BY client_name" );
Recommendation: Use $wpdb->prepare() with placeholders
2510. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:23
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Status: " . $post->post_status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2511. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:24
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Type: " . $post->post_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2512. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:25
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Title: " . $post->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2513. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:26
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Date: " . $post->post_date . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2514. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Shift Title: " . $shift_post->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2515. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Shift Status: " . $shift_post->post_status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2516. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:23
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Status: " . $post->post_status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2517. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:24
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Type: " . $post->post_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2518. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:25
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Title: " . $post->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2519. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:26
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Date: " . $post->post_date . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
2520. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:65
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Shift Title: " . $shift_post->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2521. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1950.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Shift Status: " . $shift_post->post_status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2522. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:20
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Status: " . $post->post_status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2523. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Type: " . $post->post_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2524. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Title: " . $post->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2525. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:23
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Date: " . $post->post_date . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2526. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Shift Title: " . $shift_post->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2527. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Shift Status: " . $shift_post->post_status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2528. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:20
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Status: " . $post->post_status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2529. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Type: " . $post->post_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2530. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Title: " . $post->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2531. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:23
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Date: " . $post->post_date . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
2532. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Shift Title: " . $shift_post->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2533. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_diagnostic_1948.php:64
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Shift Status: " . $shift_post->post_status . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2534. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_find_schedules_oct14.php:30
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Found " . $query->found_posts . " schedules for October 14, 2025\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2535. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_find_schedules_oct14.php:30
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Found " . $query->found_posts . " schedules for October 14, 2025\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
2536. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_fix_staff_titles.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "ERROR: Post ID $post_id - " . $result->get_error_message() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2537. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_fix_staff_titles.php:70
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "ERROR: Post ID $post_id - " . $result->get_error_message() . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2538. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total staff found: " . $query->found_posts . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2539. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff.php:49
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Label: " . $post_type_object->label . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2540. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Capability type: " . $post_type_object->capability_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2541. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Total staff found: " . $query->found_posts . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
2542. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff.php:49
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Label: " . $post_type_object->label . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2543. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Capability type: " . $post_type_object->capability_type . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2544. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_list_recent_schedules.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Found " . $query->found_posts . " schedules\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2545. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_list_recent_schedules.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Found " . $query->found_posts . " schedules\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
2546. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_test_member_sync.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Message: " . $result['message'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2547. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_test_member_sync.php:42
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "- Synced: " . $result['synced'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2548. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_test_member_sync.php:43
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "- Created: " . $result['created'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2549. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_test_member_sync.php:44
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "- Updated: " . $result['updated'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2550. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_test_member_sync.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Message: " . $result['message'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2551. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_test_member_sync.php:42
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "- Synced: " . $result['synced'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2552. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_test_member_sync.php:43
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "- Created: " . $result['created'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2553. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_test_member_sync.php:44
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "- Updated: " . $result['updated'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2554. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff_detail.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Title: '" . $post->post_title . "'\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2555. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff_detail.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Name (slug): '" . $post->post_name . "'\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2556. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff_detail.php:24
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Status: " . $post->post_status . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2557. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff_detail.php:21
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Title: '" . $post->post_title . "'\n";
Recommendation: Use $wpdb->prepare() with placeholders
2558. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff_detail.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Name (slug): '" . $post->post_name . "'\n";
Recommendation: Use $wpdb->prepare() with placeholders
2559. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/temp_check_staff_detail.php:24
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Post Status: " . $post->post_status . "\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
2560. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to convert UTC time '{$utc_time}' to local: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2561. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:318
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2562. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:621
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: Failed to update schedule: " . $result->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2563. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:653
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: Failed to create schedule: " . $post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2564. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:721
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2565. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:939
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2566. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to convert UTC time '{$utc_time}' to local: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2567. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:318
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders
2568. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:621
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: Failed to update schedule: " . $result->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2569. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:653
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: Failed to create schedule: " . $post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2570. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:721
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2571. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/class-cxq-schedule-sync.php:939
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2572. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Pairing: About to call filterOutStaffedPlaceholders with " . $total_count . " events");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2573. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Pairing: filterOutStaffedPlaceholders returned " . $displayed_count . " events");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2574. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:627
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part[$idx]: " . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2575. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:646
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part[$idx]: " . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2576. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:683
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Schedule $schedule_id: " . $sched_start->format('Y-m-d H:i') . " to " . $sched_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2577. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:688
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part $idx: UID=$part_uid, Time=" . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2578. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:705
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part $idx: UID=$part_uid, Time=" . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2579. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:724
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part[$idx]: " . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2580. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:737
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Pairing: Adding to unstaffedSlots - UID: $part_uid, Time: " . $start->format('H:i') . "-" . $end->format('H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2581. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:936
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part[$idx]: " . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2582. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:996
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Pairing: In combinedSchedule - UID: $evt_uid, Time: " . $start->format('H:i') . "-" . $end->format('H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2583. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Placeholder time: " . $p_start->format('Y-m-d H:i') . " to " . $p_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2584. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1102
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Scheduled time: " . $s_start->format('Y-m-d H:i') . " to " . $s_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2585. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Created BEFORE portion: " . $p_start->format('Y-m-d H:i') . " to " . $s_start->format('Y-m-d H:i') . " (UID: " . $newEvent->getUID() . ")");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2586. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Created AFTER portion: " . $s_end->format('Y-m-d H:i') . " to " . $p_end->format('Y-m-d H:i') . " (UID: " . $newEvent->getUID() . ")");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2587. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1982
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Existing schedule_id: " . $converted_positions[$position_key]['schedule_id']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2588. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1983
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Existing time: " . $converted_positions[$position_key]['time']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2589. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1992
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Start DateTime: " . $start_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2590. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1993
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" End DateTime: " . $end_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2591. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2006
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Start DateTime: " . $start_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2592. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2007
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" End DateTime: " . $end_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2593. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2019
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Start DateTime: " . $start_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2594. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2020
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" End DateTime: " . $end_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2595. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2533
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$converted_data[$assignment['date_key']][$assignment['shift_name']][$assignment['pos_index']]['validation_message'] . "\n" . $overload_message :
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2596. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2592
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Validation: Credential issue detected - Staff ID $staff_id, Position $position_key: " . $validation['message']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2597. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:3922
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Calendar: First schedule ID: " . $posts[0]->ID);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2598. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:56
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Pairing: About to call filterOutStaffedPlaceholders with " . $total_count . " events");
Recommendation: Use $wpdb->prepare() with placeholders
2599. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:59
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Pairing: filterOutStaffedPlaceholders returned " . $displayed_count . " events");
Recommendation: Use $wpdb->prepare() with placeholders
2600. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:627
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part[$idx]: " . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2601. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:646
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part[$idx]: " . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2602. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:683
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Schedule $schedule_id: " . $sched_start->format('Y-m-d H:i') . " to " . $sched_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2603. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:688
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part $idx: UID=$part_uid, Time=" . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2604. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:705
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part $idx: UID=$part_uid, Time=" . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2605. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:724
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part[$idx]: " . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2606. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:737
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Pairing: Adding to unstaffedSlots - UID: $part_uid, Time: " . $start->format('H:i') . "-" . $end->format('H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2607. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:936
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Part[$idx]: " . $part_start->format('Y-m-d H:i') . " to " . $part_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2608. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:996
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Pairing: In combinedSchedule - UID: $evt_uid, Time: " . $start->format('H:i') . "-" . $end->format('H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2609. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Placeholder time: " . $p_start->format('Y-m-d H:i') . " to " . $p_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2610. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1102
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Scheduled time: " . $s_start->format('Y-m-d H:i') . " to " . $s_end->format('Y-m-d H:i'));
Recommendation: Use $wpdb->prepare() with placeholders
2611. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Created BEFORE portion: " . $p_start->format('Y-m-d H:i') . " to " . $s_start->format('Y-m-d H:i') . " (UID: " . $newEvent->getUID() . ")");
Recommendation: Use $wpdb->prepare() with placeholders
2612. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Created AFTER portion: " . $s_end->format('Y-m-d H:i') . " to " . $p_end->format('Y-m-d H:i') . " (UID: " . $newEvent->getUID() . ")");
Recommendation: Use $wpdb->prepare() with placeholders
2613. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1982
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Existing schedule_id: " . $converted_positions[$position_key]['schedule_id']);
Recommendation: Use $wpdb->prepare() with placeholders
2614. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1983
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Existing time: " . $converted_positions[$position_key]['time']);
Recommendation: Use $wpdb->prepare() with placeholders
2615. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1992
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Start DateTime: " . $start_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders
2616. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:1993
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" End DateTime: " . $end_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders
2617. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2006
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Start DateTime: " . $start_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders
2618. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2007
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" End DateTime: " . $end_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders
2619. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2019
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" Start DateTime: " . $start_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders
2620. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2020
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log(" End DateTime: " . $end_date->format('Y-m-d H:i:s'));
Recommendation: Use $wpdb->prepare() with placeholders
2621. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2533
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$converted_data[$assignment['date_key']][$assignment['shift_name']][$assignment['pos_index']]['validation_message'] . "\n" . $overload_message :
Recommendation: Use $wpdb->prepare() with placeholders
2622. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:2592
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Validation: Credential issue detected - Staff ID $staff_id, Position $position_key: " . $validation['message']);
Recommendation: Use $wpdb->prepare() with placeholders
2623. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/scheduler.class.php:3922
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Calendar: First schedule ID: " . $posts[0]->ID);
Recommendation: Use $wpdb->prepare() with placeholders
2624. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2625. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2626. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2627. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2628. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2629. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2630. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2631. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2632. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2633. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2634. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2635. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2636. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:313
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2637. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2638. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
2639. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
2640. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2641. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
2642. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2643. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
2644. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2645. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2646. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:242
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2647. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2648. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
2649. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2650. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:313
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2651. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/dBug.class.php:387
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
2652. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/iCal.class.php:846
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str = "{$this->ordinal($this->bysetpos)} {$weekday} of ".$dt->format('Y-m');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2653. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/iCal.class.php:978
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$eventStartDT = new DateTime("{$this->ordinal($bysetpos)} {$weekday} of ".$eventStartDT->format('Y-m'));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2654. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/iCal.class.php:981
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//new dBug2(array("{$this->ordinal($bysetpos)} {$weekday} of ".$eventStartDT->format('Y-m')));
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2655. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/iCal.class.php:846
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str = "{$this->ordinal($this->bysetpos)} {$weekday} of ".$dt->format('Y-m');
Recommendation: Use $wpdb->prepare() with placeholders
2656. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/iCal.class.php:978
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$eventStartDT = new DateTime("{$this->ordinal($bysetpos)} {$weekday} of ".$eventStartDT->format('Y-m'));
Recommendation: Use $wpdb->prepare() with placeholders
2657. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/iCal.class.php:981
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//new dBug2(array("{$this->ordinal($bysetpos)} {$weekday} of ".$eventStartDT->format('Y-m')));
Recommendation: Use $wpdb->prepare() with placeholders
2658. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/tests/get-test-info.php:12
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Username: " . $u->user_login . ", Email: " . $u->user_email . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2659. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/tests/get-test-info.php:39
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "- " . $ct->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2660. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/tests/get-test-info.php:12
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Username: " . $u->user_login . ", Email: " . $u->user_email . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2661. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/tests/get-test-info.php:39
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "- " . $ct->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2662. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/_debug-archive/diagnose-splits.php:171
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<p>Found " . $schedule_query->found_posts . " schedule(s) for Brandon in November 2025</p>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2663. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/_debug-archive/diagnose-splits.php:171
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<p>Found " . $schedule_query->found_posts . " schedule(s) for Brandon in November 2025</p>";
Recommendation: Use $wpdb->prepare() with placeholders
2664. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2665. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2666. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2667. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2668. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2669. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2670. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2671. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2672. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to convert UTC time '{$utc_time}' to local: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2673. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:319
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2674. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:693
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: Failed to update schedule: " . $result->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2675. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:725
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: Failed to create schedule: " . $post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2676. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:795
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to fetch member details for {$member_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2677. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:807
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2678. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:1076
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2679. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:1420
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Staff Sync: Exception syncing member {$member_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2680. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:1476
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Staff Sync: API error fetching member {$member_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2681. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:1507
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Staff Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2682. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to convert UTC time '{$utc_time}' to local: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2683. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:319
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders
2684. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:693
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: Failed to update schedule: " . $result->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2685. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:725
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync ERROR: Failed to create schedule: " . $post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2686. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:795
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to fetch member details for {$member_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2687. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:807
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2688. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:1076
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Schedule Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2689. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:1420
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Staff Sync: Exception syncing member {$member_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2690. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:1476
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Staff Sync: API error fetching member {$member_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2691. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-schedule-sync.php:1507
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Staff Sync: Failed to create staff: " . $staff_post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2692. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:307
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception syncing schedule {$post_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2693. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:418
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception transferring schedule {$post_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2694. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:452
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception updating schedule {$post_id} after metadata change: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2695. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:552
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception deleting shift {$iar_schedule_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2696. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:651
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception transferring shift {$iar_schedule_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2697. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:307
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception syncing schedule {$post_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2698. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:418
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception transferring schedule {$post_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2699. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:452
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception updating schedule {$post_id} after metadata change: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2700. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:552
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception deleting shift {$iar_schedule_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2701. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-outbound-schedule-sync.php:651
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Outbound Sync: Exception transferring shift {$iar_schedule_id}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2702. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-member-sync.php:223
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Member Sync: wp_insert_post FAILED - Error: " . $post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2703. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/sync/class-cxq-member-sync.php:223
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Member Sync: wp_insert_post FAILED - Error: " . $post_id->get_error_message());
Recommendation: Use $wpdb->prepare() with placeholders
2704. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/ajax/class-cxq-ajax-handlers.php:896
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Timesheet: Created 'Other' position for duty '$duty' with total hours: " . $total_other_hours);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2705. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/ajax/class-cxq-ajax-handlers.php:896
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CxQ Timesheet: Created 'Other' position for duty '$duty' with total hours: " . $total_other_hours);
Recommendation: Use $wpdb->prepare() with placeholders
2706. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/ajax/class-cxq-manual-assignment-ajax.php:1127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Schedule: " . $schedule->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2707. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/ajax/class-cxq-manual-assignment-ajax.php:1128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Shift: " . $shift->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2708. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/ajax/class-cxq-manual-assignment-ajax.php:1127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Schedule: " . $schedule->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2709. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/ajax/class-cxq-manual-assignment-ajax.php:1128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Shift: " . $shift->post_title . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2710. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/post-types/class-cxq-post-types.php:1198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$duplicate_list[] = "'{$mapping}' (already in " . $cred_type->post_title . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2711. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/post-types/class-cxq-post-types.php:1198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$duplicate_list[] = "'{$mapping}' (already in " . $cred_type->post_title . ")";
Recommendation: Use $wpdb->prepare() with placeholders
2712. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/api/CxQ_SchedulerClient.php:181
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$errorMessage = "✗ Authentication failed for {$this->getSystemName()}: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2713. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/api/CxQ_SchedulerClient.php:181
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$errorMessage = "✗ Authentication failed for {$this->getSystemName()}: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
2714. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/api/class-cxq-api-client.php:139
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
// error_log('CxQ save_tokens: session_token = ' . substr($tokens['session_token'] ?? 'MISSING', 0, 30));
Recommendation: Move credentials to environment variables or secure configuration
2715. Hardcoded credentials detected
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/api/class-cxq-api-client.php:183
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
// error_log('CxQ load_tokens: session_token = ' . substr($sessionToken ?: 'EMPTY', 0, 30));
Recommendation: Move credentials to environment variables or secure configuration
2716. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/api/CxQ_Scheduler_Error_Handling.php:375
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Operation failed after {$maxAttempts} attempts: " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2717. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/api/CxQ_Scheduler_Error_Handling.php:375
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"Operation failed after {$maxAttempts} attempts: " . $e->getMessage(),
Recommendation: Use $wpdb->prepare() with placeholders
2718. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:61
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Schedules deleted: " . $purge_stats['schedules_deleted'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2719. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - External events deleted: " . $purge_stats['external_events_deleted'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2720. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Staff records deleted: " . $purge_stats['staff_deleted'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2721. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Schedules created: " . $iar_stats['created'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2722. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Schedules updated: " . $iar_stats['updated'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2723. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Total synced: " . $iar_stats['total'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2724. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log("✗ IamResponding sync failed: " . $iar_stats['error'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2725. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:95
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Subscriptions processed: " . $google_stats['subscriptions'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2726. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:96
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Events created: " . $google_stats['events_created'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2727. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:97
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Events updated: " . $google_stats['events_updated'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2728. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log("✗ Google Calendar sync failed: " . $google_stats['error'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2729. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:284
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query("DELETE FROM {$wpdb->postmeta} WHERE post_id NOT IN (SELECT ID FROM {$wpdb->posts})");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2730. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:61
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Schedules deleted: " . $purge_stats['schedules_deleted'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2731. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - External events deleted: " . $purge_stats['external_events_deleted'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2732. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:63
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Staff records deleted: " . $purge_stats['staff_deleted'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2733. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Schedules created: " . $iar_stats['created'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2734. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Schedules updated: " . $iar_stats['updated'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2735. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:81
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Total synced: " . $iar_stats['total'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2736. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:83
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log("✗ IamResponding sync failed: " . $iar_stats['error'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2737. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:95
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Subscriptions processed: " . $google_stats['subscriptions'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2738. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:96
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Events created: " . $google_stats['events_created'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2739. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:97
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log(" - Events updated: " . $google_stats['events_updated'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2740. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-scheduler/includes/admin/purge-and-resync.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::log("✗ Google Calendar sync failed: " . $google_stats['error'], $options['verbose']);
Recommendation: Use $wpdb->prepare() with placeholders
2741. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/includes/class-cxq-antispam-rules-sync.php:582
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$wpdb->query( "TRUNCATE TABLE {$this->rules_table}" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2742. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/includes/class-cxq-antispam-email-digest.php:215
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Period: " . $queue[0]['timestamp'] . " to " . $queue[ count( $queue ) - 1 ]['timestamp'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2743. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/includes/class-cxq-antispam-email-digest.php:215
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message .= "Period: " . $queue[0]['timestamp'] . " to " . $queue[ count( $queue ) - 1 ]['timestamp'] . "\n";
Recommendation: Use $wpdb->prepare() with placeholders
2744. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2745. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2746. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/vendor-scoped/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2747. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/vendor-scoped/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2748. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2749. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2750. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:172
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2751. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-antispam/vendor-scoped/cxq-libs-metapackage/packages/cxq-util-handshake-kit/src/Host.php:198
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$canonical = strtoupper($method) . "\n" . $url . "\n" . $timestamp . "\n" . hash('sha256', $body);
Recommendation: Use $wpdb->prepare() with placeholders
2752. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-places/class-cxq-woocommerce-place-editor.php:178
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$id = "{$name}_".$cat['slug']."_{$archive_id}";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2753. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-places/class-cxq-woocommerce-place-editor.php:18
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$locations = $wpdb->get_results("SELECT * FROM `{$this->table_names['locations']}` order by region, city /* (in ".__FILE__.':'.__LINE__." )*/");
Recommendation: Use $wpdb->prepare() with placeholders
2754. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-places/class-cxq-woocommerce-place-editor.php:178
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$id = "{$name}_".$cat['slug']."_{$archive_id}";
Recommendation: Use $wpdb->prepare() with placeholders
2755. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/cxq-license-manager.php:689
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
jQuery( 'select[name=\"post_status\"]' ).append( '<option value=\"{$status}\">{$label}</option>' );".$jq_status;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2756. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/cxq-license-manager.php:689
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
jQuery( 'select[name=\"post_status\"]' ).append( '<option value=\"{$status}\">{$label}</option>' );".$jq_status;
Recommendation: Use $wpdb->prepare() with placeholders
2757. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2758. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2759. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2760. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2761. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2762. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2763. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2764. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:209
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2765. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2766. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2767. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2768. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2769. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2770. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2771. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
2772. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:118
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
2773. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:120
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2774. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
2775. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2776. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
2777. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2778. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:209
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2779. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:243
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2780. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:246
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2781. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:293
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
2782. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:303
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2783. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:314
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2784. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/dBug.php:388
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
2785. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/cxq-license-checker.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//return "-----BEGIN PUBLIC KEY-----\r\n".$public_key."\r\n-----END PUBLIC KEY-----";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2786. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/cxq-license-checker.php:185
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//return "-----BEGIN PUBLIC KEY-----\r\n".$public_key."\r\n-----END PUBLIC KEY-----";
Recommendation: Use $wpdb->prepare() with placeholders
2787. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/includes/GHRelay.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$file = "{$slug}/".$this->get_package_name($slug); //TODO: don't assume all plugins match this format.
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2788. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/includes/GHRelay.php:33
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$file = "{$slug}/".$this->get_package_name($slug); //TODO: don't assume all plugins match this format.
Recommendation: Use $wpdb->prepare() with placeholders
2789. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/includes/register-deregister-post-status.class.php:183
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
jQuery( 'select[name=\"post_status\"]' ).append( '<option value=\"{$status}\">{$label}</option>' );".$jq_status;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2790. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-license-manager/includes/register-deregister-post-status.class.php:183
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
jQuery( 'select[name=\"post_status\"]' ).append( '<option value=\"{$status}\">{$label}</option>' );".$jq_status;
Recommendation: Use $wpdb->prepare() with placeholders
2791. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:235
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug_log( "TEAM/CART ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2792. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug_log( "TEAM/CART ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2793. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:390
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error_msg = "Failed to save item {$item_id}: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2794. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:392
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug_log( "TEAM/CART ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2795. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug_log( "TEAM/CART RESULT: " . $message);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2796. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:235
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug_log( "TEAM/CART ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders
2797. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:245
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug_log( "TEAM/CART ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders
2798. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:390
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$error_msg = "Failed to save item {$item_id}: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
2799. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:392
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug_log( "TEAM/CART ERROR: " . $error_msg);
Recommendation: Use $wpdb->prepare() with placeholders
2800. Possible SQL injection via string concatenation
File: /var/www/html/wordpress/wp-content/plugins/cxq-woocommerce-sales-list/cxq-woocommerce-sales-list.php:415
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
self::debug_log( "TEAM/CART RESULT: " . $message);
Recommendation: Use $wpdb->prepare() with placeholders
2801. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay/db-helper.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Database connection failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2802. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay/db-helper.php:61
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Query failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2803. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay/db-helper.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Query failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2804. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay/db-helper.php:96
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Exec failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2805. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay/db-helper.php:48
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Database connection failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2806. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay/db-helper.php:61
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Query failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2807. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay/db-helper.php:75
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Query failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2808. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay/db-helper.php:96
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Exec failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2809. Hardcoded credentials detected
File: /opt/claude-workspace/projects/ecoeye-alert-relay/api-thumbnails.php:35
CWE: CWE-798
Confidence: HIGH
Description: Hardcoded credentials detected
Code:
$valid_api_key = 'your-api-key-here'; // TODO: Replace with actual key
Recommendation: Move credentials to environment variables or secure configuration
2810. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/cyber-guardian/api/malware.php:139
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Malware API Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2811. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/cyber-guardian/api/malware.php:139
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Malware API Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2812. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/cyber-guardian/api/posture.php:84
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Malware score calculation failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2813. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/cyber-guardian/api/posture.php:84
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Malware score calculation failed: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
2814. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/cxq-woocommerce-product-map/products-xml.php:114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$attribute_taxonomies = $wpdb->get_results( "SELECT * FROM " . $wpdb->prefix . "woocommerce_attribute_taxonomies order by attribute_name ASC;" );
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2815. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/cxq-woocommerce-product-map/products-xml.php:114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$attribute_taxonomies = $wpdb->get_results( "SELECT * FROM " . $wpdb->prefix . "woocommerce_attribute_taxonomies order by attribute_name ASC;" );
Recommendation: Use $wpdb->prepare() with placeholders
2816. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay-old/events-viewer.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$cmd = "sqlite3 -json " . escapeshellarg($dbPath) . " " . $escapedSql . " 2>/dev/null";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2817. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay-old/events-viewer.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$cmd = "sqlite3 " . escapeshellarg($dbPath) . " " . $escapedSql . " 2>/dev/null";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2818. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay-old/events-viewer.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$cmd = "sqlite3 -json " . escapeshellarg($dbPath) . " " . $escapedSql . " 2>/dev/null";
Recommendation: Use $wpdb->prepare() with placeholders
2819. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/ecoeye-alert-relay-old/events-viewer.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$cmd = "sqlite3 " . escapeshellarg($dbPath) . " " . $escapedSql . " 2>/dev/null";
Recommendation: Use $wpdb->prepare() with placeholders
2820. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno_project_form.php:125
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html.="var roomCount = ".$roomNo.";\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2821. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno_project_form.php:410
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$outStr=htmlspecialchars($oMaterial->name." (".$currency_units.number_format($oMaterial->Price(1), 2, '.', ',')." / ".$oMaterial->quantity_units.")", ENT_QUOTES);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2822. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno_project_form.php:536
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$customerSelect.="<option value=".$thisCustomer['id_code'].">".$thisCustomer['title']."</option>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2823. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno_project_form.php:125
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html.="var roomCount = ".$roomNo.";\n";
Recommendation: Use $wpdb->prepare() with placeholders
2824. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno_project_form.php:410
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$outStr=htmlspecialchars($oMaterial->name." (".$currency_units.number_format($oMaterial->Price(1), 2, '.', ',')." / ".$oMaterial->quantity_units.")", ENT_QUOTES);
Recommendation: Use $wpdb->prepare() with placeholders
2825. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno_project_form.php:536
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$customerSelect.="<option value=".$thisCustomer['id_code'].">".$thisCustomer['title']."</option>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2826. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/_header.php:10
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$bottom_host_name = $host_names[0]=="localhost"?$host_names[0]:($host_names[count($host_names)-2] . "." . $host_names[count($host_names)-1]);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2827. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/_header.php:10
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$bottom_host_name = $host_names[0]=="localhost"?$host_names[0]:($host_names[count($host_names)-2] . "." . $host_names[count($host_names)-1]);
Recommendation: Use $wpdb->prepare() with placeholders
2828. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/discgolfid/test.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$s = preg_replace("|\[".$k."\](.*)\[/".$k."\]|isU", "<font color=\"#".$v."\">\\1</font>", $s);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2829. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/discgolfid/test.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$s = preg_replace("|\[".$k."\](.*)\[/".$k."\]|isU", "<font color=\"#".$v."\">\\1</font>", $s);
Recommendation: Use $wpdb->prepare() with placeholders
2830. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2831. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2832. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2833. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2834. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2835. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2836. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2837. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2838. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2839. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2840. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:291
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2841. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:301
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2842. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2843. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:386
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2844. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
2845. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
2846. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2847. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
2848. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
2849. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
2850. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2851. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2852. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2853. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
2854. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:291
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
2855. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:301
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
2856. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
2857. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/dBug.php:386
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
2858. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/form.php:374
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$outStr=htmlspecialchars($oMaterial->name." (".$currency_units.number_format($oMaterial->Price(1), 2, '.', ',')." / ".$oMaterial->quantity_units.")", ENT_QUOTES);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2859. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/form.php:375
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " '<option value=\"$id\">".$outStr."</option>'+"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2860. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/form.php:417
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$customerSelect.="<option value=".$thisCustomer['id_code'].">".$thisCustomer['title']."</option>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2861. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/form.php:374
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$outStr=htmlspecialchars($oMaterial->name." (".$currency_units.number_format($oMaterial->Price(1), 2, '.', ',')." / ".$oMaterial->quantity_units.")", ENT_QUOTES);
Recommendation: Use $wpdb->prepare() with placeholders
2862. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/form.php:375
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo " '<option value=\"$id\">".$outStr."</option>'+"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2863. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/form.php:417
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$customerSelect.="<option value=".$thisCustomer['id_code'].">".$thisCustomer['title']."</option>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2864. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/dbOps_CMartifacts.class.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" AND `artifact_value` LIKE '%\"category1\":\"".$this->mysqli->real_escape_string($category1)."\"%'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2865. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/dbOps_CMartifacts.class.php:216
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" AND `artifact_key`='".$this->mysqli->real_escape_string($key)."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2866. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/dbOps_CMartifacts.class.php:31
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" AND `artifact_value` LIKE '%\"category1\":\"".$this->mysqli->real_escape_string($category1)."\"%'";
Recommendation: Use $wpdb->prepare() with placeholders
2867. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/dbOps_CMartifacts.class.php:216
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" AND `artifact_key`='".$this->mysqli->real_escape_string($key)."'";
Recommendation: Use $wpdb->prepare() with placeholders
2868. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:19
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->projects)){
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2869. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2870. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->people)){
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2871. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2872. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:86
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->rooms)){
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2873. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:89
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2874. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->physicals)){
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2875. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:133
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2876. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:192
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Invalid Number of Physical Dimensions (".$dimension_count.')');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2877. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not recognized as a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2878. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:217
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->materials)){
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2879. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:220
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2880. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:300
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Invalid Number of Physical Dimensions (".$this->dimension_count.')');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2881. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:19
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->projects)){
Recommendation: Use $wpdb->prepare() with placeholders
2882. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders
2883. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:50
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->people)){
Recommendation: Use $wpdb->prepare() with placeholders
2884. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:53
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders
2885. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:86
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->rooms)){
Recommendation: Use $wpdb->prepare() with placeholders
2886. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:89
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders
2887. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->physicals)){
Recommendation: Use $wpdb->prepare() with placeholders
2888. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:133
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders
2889. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:192
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Invalid Number of Physical Dimensions (".$dimension_count.')');
Recommendation: Use $wpdb->prepare() with placeholders
2890. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:208
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not recognized as a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders
2891. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:217
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while(array_key_exists($name."_".$i, $this->materials)){
Recommendation: Use $wpdb->prepare() with placeholders
2892. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:220
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$name=$name."_".$i;
Recommendation: Use $wpdb->prepare() with placeholders
2893. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/classes/renovate.php:300
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Invalid Number of Physical Dimensions (".$this->dimension_count.')');
Recommendation: Use $wpdb->prepare() with placeholders
2894. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:4866
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2895. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:5730
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$s .= "\n".$this->linestyleWidth.' '.$this->linestyleCap.' '.$this->linestyleJoin.' '.$this->linestyleDash.' '.$this->DrawColor."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2896. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8017
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<<'.$filter.'/Length '.strlen($p).'>> stream'."\n".$p."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2897. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8140
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out($this->_getobj($radio_button_obj_id)."\n".$annots."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2898. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8710
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out($this->_getobj($annot_obj_id)."\n".$annots."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2899. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8748
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2900. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8816
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2901. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8940
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<<'.$filter.'/Length '.strlen($stream).'>> stream'."\n".$stream."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2902. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9001
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2903. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9167
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2904. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9176
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<</N '.$info['ch'].' /Alternate /'.$info['cs'].' '.$filter.'/Length '.strlen($icc).'>> stream'."\n".$icc."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2905. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<<'.$filter.'/Length '.strlen($pal).'>> stream'."\n".$pal."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2906. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9285
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2907. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9602
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out = '<< /Type /Metadata /Subtype /XML /Length '.strlen($xmp).' >> stream'."\n".$xmp."\n".'endstream'."\n".'endobj';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2908. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9628
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<</N 3 '.$filter.'/Length '.strlen($icc).'>> stream'."\n".$icc."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2909. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:10268
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return 'stream'."\n".$this->_getrawstream($s, $n)."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2910. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:10297
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($this->page, $page.$s."\n".$footer);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2911. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:12541
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->javascript = $jsa."\n".$this->javascript."\n".$jsb;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2912. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:12594
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->javascript .= sprintf("f".$name."=this.addField('%s','%s',%u,[%F,%F,%F,%F]);", $name, $type, $this->PageNo()-1, $x*$k, ($this->h-$y)*$k+1, ($x+$w)*$k, ($this->h-$y-$h)*$k+1)."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2913. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:12600
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$val = "'".$val."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2914. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:14639
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2915. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:14690
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2916. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:16274
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while (preg_match("'<xre([^\>]*)>(.*?)".$this->re_space['p']."(.*?)</pre>'".$this->re_space['m'], $html_b)) {
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2917. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:16276
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html_b = preg_replace("'<xre([^\>]*)>(.*?)".$this->re_space['p']."(.*?)</pre>'".$this->re_space['m'], "<xre\\1>\\2 \\3</pre>", $html_b);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2918. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($this->page, $tstart."\nq\n".$try."\n".$linebeg."\nQ\n".$tend);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2919. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17355
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($this->page, $tstart."\nq\n".$try."\n".$linebeg."\nQ\n".$tend);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2920. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17638
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pmid = $pmid_b."\nq\n".$trx."\n".$pmid_m."\nQ\n".$pmid_e;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2921. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17798
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xobjects[$this->xobjid]['outdata'] = $pstart."\n".$pmid."\n".$pend;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2922. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17800
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($startlinepage, $pstart."\n".$pmid."\n".$pend);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2923. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17802
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$endlinepos = strlen($pstart."\n".$pmid."\n");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2924. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17813
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xobjects[$this->xobjid]['outdata'] = $pstart."\n".$pmid."\nBT 0 Tw ET\n".$pend;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2925. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17815
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($startlinepage, $pstart."\n".$pmid."\nBT 0 Tw ET\n".$pend);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2926. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17817
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$endlinepos = strlen($pstart."\n".$pmid."\nBT 0 Tw ET\n");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2927. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17825
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pstart .= "\nq\n".$trx."\n".$pmid."\nQ\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2928. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:18505
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pstart .= "\nq\n".$trx."\n".$pmid."\nQ\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2929. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:20923
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$newjs = "this.addField(\'".$pamatch[1][$pk]."\',\'".$pamatch[2][$pk]."\',".$newpage;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2930. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:21105
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$newjs = "this.addField(\'".$pamatch[1][$pk]."\',\'".$pamatch[2][$pk]."\',".$newpage;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2931. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:4866
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2932. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:5730
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$s .= "\n".$this->linestyleWidth.' '.$this->linestyleCap.' '.$this->linestyleJoin.' '.$this->linestyleDash.' '.$this->DrawColor."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2933. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8017
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<<'.$filter.'/Length '.strlen($p).'>> stream'."\n".$p."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders
2934. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8140
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out($this->_getobj($radio_button_obj_id)."\n".$annots."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders
2935. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8710
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out($this->_getobj($annot_obj_id)."\n".$annots."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders
2936. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8748
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2937. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8816
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2938. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:8940
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<<'.$filter.'/Length '.strlen($stream).'>> stream'."\n".$stream."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders
2939. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9001
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2940. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9167
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2941. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9176
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<</N '.$info['ch'].' /Alternate /'.$info['cs'].' '.$filter.'/Length '.strlen($icc).'>> stream'."\n".$icc."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders
2942. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9182
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<<'.$filter.'/Length '.strlen($pal).'>> stream'."\n".$pal."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders
2943. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9285
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2944. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9602
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out = '<< /Type /Metadata /Subtype /XML /Length '.strlen($xmp).' >> stream'."\n".$xmp."\n".'endstream'."\n".'endobj';
Recommendation: Use $wpdb->prepare() with placeholders
2945. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:9628
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->_out('<</N 3 '.$filter.'/Length '.strlen($icc).'>> stream'."\n".$icc."\n".'endstream'."\n".'endobj');
Recommendation: Use $wpdb->prepare() with placeholders
2946. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:10268
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return 'stream'."\n".$this->_getrawstream($s, $n)."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2947. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:10297
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($this->page, $page.$s."\n".$footer);
Recommendation: Use $wpdb->prepare() with placeholders
2948. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:12541
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->javascript = $jsa."\n".$this->javascript."\n".$jsb;
Recommendation: Use $wpdb->prepare() with placeholders
2949. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:12594
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->javascript .= sprintf("f".$name."=this.addField('%s','%s',%u,[%F,%F,%F,%F]);", $name, $type, $this->PageNo()-1, $x*$k, ($this->h-$y)*$k+1, ($x+$w)*$k, ($this->h-$y-$h)*$k+1)."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2950. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:12600
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$val = "'".$val."'";
Recommendation: Use $wpdb->prepare() with placeholders
2951. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:14639
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2952. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:14690
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$out .= ' stream'."\n".$stream."\n".'endstream';
Recommendation: Use $wpdb->prepare() with placeholders
2953. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:16274
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
while (preg_match("'<xre([^\>]*)>(.*?)".$this->re_space['p']."(.*?)</pre>'".$this->re_space['m'], $html_b)) {
Recommendation: Use $wpdb->prepare() with placeholders
2954. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:16276
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$html_b = preg_replace("'<xre([^\>]*)>(.*?)".$this->re_space['p']."(.*?)</pre>'".$this->re_space['m'], "<xre\\1>\\2 \\3</pre>", $html_b);
Recommendation: Use $wpdb->prepare() with placeholders
2955. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17292
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($this->page, $tstart."\nq\n".$try."\n".$linebeg."\nQ\n".$tend);
Recommendation: Use $wpdb->prepare() with placeholders
2956. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17355
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($this->page, $tstart."\nq\n".$try."\n".$linebeg."\nQ\n".$tend);
Recommendation: Use $wpdb->prepare() with placeholders
2957. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17638
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pmid = $pmid_b."\nq\n".$trx."\n".$pmid_m."\nQ\n".$pmid_e;
Recommendation: Use $wpdb->prepare() with placeholders
2958. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17798
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xobjects[$this->xobjid]['outdata'] = $pstart."\n".$pmid."\n".$pend;
Recommendation: Use $wpdb->prepare() with placeholders
2959. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17800
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($startlinepage, $pstart."\n".$pmid."\n".$pend);
Recommendation: Use $wpdb->prepare() with placeholders
2960. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17802
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$endlinepos = strlen($pstart."\n".$pmid."\n");
Recommendation: Use $wpdb->prepare() with placeholders
2961. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17813
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xobjects[$this->xobjid]['outdata'] = $pstart."\n".$pmid."\nBT 0 Tw ET\n".$pend;
Recommendation: Use $wpdb->prepare() with placeholders
2962. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17815
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->setPageBuffer($startlinepage, $pstart."\n".$pmid."\nBT 0 Tw ET\n".$pend);
Recommendation: Use $wpdb->prepare() with placeholders
2963. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17817
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$endlinepos = strlen($pstart."\n".$pmid."\nBT 0 Tw ET\n");
Recommendation: Use $wpdb->prepare() with placeholders
2964. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:17825
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pstart .= "\nq\n".$trx."\n".$pmid."\nQ\n";
Recommendation: Use $wpdb->prepare() with placeholders
2965. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:18505
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$pstart .= "\nq\n".$trx."\n".$pmid."\nQ\n";
Recommendation: Use $wpdb->prepare() with placeholders
2966. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:20923
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$newjs = "this.addField(\'".$pamatch[1][$pk]."\',\'".$pamatch[2][$pk]."\',".$newpage;
Recommendation: Use $wpdb->prepare() with placeholders
2967. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tcpdf.php:21105
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$newjs = "this.addField(\'".$pamatch[1][$pk]."\',\'".$pamatch[2][$pk]."\',".$newpage;
Recommendation: Use $wpdb->prepare() with placeholders
2968. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:8
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "result:".$result."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2969. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "latLngs:".$latLngs."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2970. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:23
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Type:".$type."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2971. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:25
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "preARray:".$preARray."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2972. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:32
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "latLngsArr[$j]:".$latLngsArr[$j]."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2973. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "thesePoints:".$thesePoints[0].",".$thesePoints[1]."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2974. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "1:".$arr[1]."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2975. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:43
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "numDec:".$numDec."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2976. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:8
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "result:".$result."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2977. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:22
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "latLngs:".$latLngs."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2978. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:23
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "Type:".$type."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2979. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:25
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "preARray:".$preARray."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2980. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:32
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "latLngsArr[$j]:".$latLngsArr[$j]."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2981. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:34
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "thesePoints:".$thesePoints[0].",".$thesePoints[1]."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2982. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:38
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "1:".$arr[1]."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2983. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/constructimator/leaf_save.php:43
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "numDec:".$numDec."<br/>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
2984. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:44
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004b] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2985. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_HttpRequest("https://www.google.com/m8/feeds/groups/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2986. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2987. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:69
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004c] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2988. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:85
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_HttpRequest("https://www.google.com/m8/feeds/groups/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2989. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004d] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2990. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2991. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_HttpRequest("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?group=".urlencode($baseurl.$groupID)."&alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2992. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:150
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004e] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2993. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:297
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:givenName>".$this->givenName."</gd:givenName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2994. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:familyName>".$this->familyName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2995. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:307
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:fullName>".$this->fullName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2996. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<atom:content type='text'>".$this->notes."</atom:content>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2997. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:316
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:email rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2998. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:320
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" address='".$this->email[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
2999. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:321
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" displayName='".$this->email[$type]['displayName']."'/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3000. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:324
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:phoneNumber rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3001. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:328
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=">".$this->phone[$type]['number']."</gd:phoneNumber>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3002. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:331
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:im address='".$this->instantMessaging[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3003. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:332
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" protocol='".$this->instantMessaging[$type]['protocol']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3004. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:334
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" rel='http://schemas.google.com/g/2005#".$type."'/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3005. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:338
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3006. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:341
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:city>".$this->postalAddress[$type]['city']."</gd:city>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3007. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:342
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:street>".$this->postalAddress[$type]['street']."</gd:street>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3008. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:343
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:region>".$this->postalAddress[$type]['region']."</gd:region>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3009. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:344
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:postcode>".$this->postalAddress[$type]['postcode']."</gd:postcode>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3010. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:345
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:country>".$this->postalAddress[$type]['country']."</gd:country>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3011. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:349
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:formattedAddress>".$this->postalAddress[$type]['formattedAddress']."</gd:formattedAddress>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3012. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:355
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gContact:groupMembershipInfo deleted='false' href='http://www.google.com/m8/feeds/groups/".$this->user_email."/base/".$group_id."'/> ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3013. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:358
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "\n"."\n"."\n".$contact."\n"."\n"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3014. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:365
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_HttpRequest("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3015. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:380
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3016. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:381
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_HttpRequest("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3017. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:411
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_HttpRequest($url="https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/".$contactId."?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3018. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:423
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3019. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:44
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004b] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3020. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:52
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_HttpRequest("https://www.google.com/m8/feeds/groups/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3021. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3022. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:69
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004c] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3023. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:85
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_HttpRequest("https://www.google.com/m8/feeds/groups/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders
3024. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:99
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004d] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3025. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3026. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:128
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_HttpRequest("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?group=".urlencode($baseurl.$groupID)."&alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3027. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:150
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004e] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3028. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:297
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:givenName>".$this->givenName."</gd:givenName>
Recommendation: Use $wpdb->prepare() with placeholders
3029. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:302
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:familyName>".$this->familyName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders
3030. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:307
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:fullName>".$this->fullName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders
3031. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<atom:content type='text'>".$this->notes."</atom:content>";
Recommendation: Use $wpdb->prepare() with placeholders
3032. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:316
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:email rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3033. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:320
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" address='".$this->email[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3034. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:321
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" displayName='".$this->email[$type]['displayName']."'/>";
Recommendation: Use $wpdb->prepare() with placeholders
3035. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:324
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:phoneNumber rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3036. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:328
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=">".$this->phone[$type]['number']."</gd:phoneNumber>";
Recommendation: Use $wpdb->prepare() with placeholders
3037. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:331
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:im address='".$this->instantMessaging[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3038. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:332
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" protocol='".$this->instantMessaging[$type]['protocol']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3039. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:334
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" rel='http://schemas.google.com/g/2005#".$type."'/>";
Recommendation: Use $wpdb->prepare() with placeholders
3040. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:338
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3041. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:341
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:city>".$this->postalAddress[$type]['city']."</gd:city>
Recommendation: Use $wpdb->prepare() with placeholders
3042. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:342
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:street>".$this->postalAddress[$type]['street']."</gd:street>
Recommendation: Use $wpdb->prepare() with placeholders
3043. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:343
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:region>".$this->postalAddress[$type]['region']."</gd:region>
Recommendation: Use $wpdb->prepare() with placeholders
3044. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:344
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:postcode>".$this->postalAddress[$type]['postcode']."</gd:postcode>
Recommendation: Use $wpdb->prepare() with placeholders
3045. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:345
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:country>".$this->postalAddress[$type]['country']."</gd:country>";
Recommendation: Use $wpdb->prepare() with placeholders
3046. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:349
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:formattedAddress>".$this->postalAddress[$type]['formattedAddress']."</gd:formattedAddress>";
Recommendation: Use $wpdb->prepare() with placeholders
3047. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:355
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gContact:groupMembershipInfo deleted='false' href='http://www.google.com/m8/feeds/groups/".$this->user_email."/base/".$group_id."'/> ";
Recommendation: Use $wpdb->prepare() with placeholders
3048. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:358
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "\n"."\n"."\n".$contact."\n"."\n"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
3049. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:365
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_HttpRequest("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders
3050. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:380
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3051. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:381
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_HttpRequest("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3052. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:411
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_HttpRequest($url="https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/".$contactId."?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3053. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/Google_Contacts.php:423
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3054. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[003] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3055. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[004] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3056. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:111
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[003] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3057. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[002] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3058. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[001] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3059. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:55
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[003] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3060. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:62
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[004] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3061. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:111
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[003] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3062. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[002] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3063. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/GoogleAPI.php:122
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
print "[001] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3064. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/contacts.php:57
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$customerSelect.="<option value=$i>".$thisCustomer['title']."</option>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3065. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/contacts.php:68
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$user_email."/full/".$contactId."?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3066. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/contacts.php:74
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//$group="http%3A%2F%2Fwww.google.com%2Fm8%2Ffeeds%2Fgroups%2F".$user_email."%2Fbase%2F6";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3067. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/contacts.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$user_email."/full?group=".$group);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3068. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/contacts.php:57
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$customerSelect.="<option value=$i>".$thisCustomer['title']."</option>"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
3069. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/contacts.php:68
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$user_email."/full/".$contactId."?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3070. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/contacts.php:74
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//$group="http%3A%2F%2Fwww.google.com%2Fm8%2Ffeeds%2Fgroups%2F".$user_email."%2Fbase%2F6";
Recommendation: Use $wpdb->prepare() with placeholders
3071. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/contacts.php:76
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$user_email."/full?group=".$group);
Recommendation: Use $wpdb->prepare() with placeholders
3072. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3073. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3074. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3075. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3076. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3077. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3078. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3079. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3080. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3081. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3082. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:291
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3083. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:301
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3084. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3085. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:386
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3086. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
3087. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
3088. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
3089. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
3090. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
3091. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
3092. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
3093. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
3094. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
3095. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
3096. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:291
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
3097. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:301
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
3098. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
3099. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/dBug.php:386
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
3100. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Invalid Number of Physical Dimensions (".$dimension_count.')');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3101. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' is not a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3102. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3103. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:153
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3104. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3105. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:173
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not recognized as a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3106. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:219
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Invalid Number of Physical Dimensions (".$this->dimension_count.')');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3107. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:123
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Invalid Number of Physical Dimensions (".$dimension_count.')');
Recommendation: Use $wpdb->prepare() with placeholders
3108. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' is not a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders
3109. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders
3110. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:153
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders
3111. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:166
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders
3112. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:173
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Unit Mismatch: '$quantity_units' not recognized as a unit of ".$this->quantity_term.'"');
Recommendation: Use $wpdb->prepare() with placeholders
3113. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/leafM/renovate.php:219
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Invalid Number of Physical Dimensions (".$this->dimension_count.')');
Recommendation: Use $wpdb->prepare() with placeholders
3114. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tools/tcpdf_addfont.php:237
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "ERROR: Can't write to ".$options['outpath']."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3115. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tools/tcpdf_addfont.php:253
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "--- ERROR: can't add ".$font."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3116. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tools/tcpdf_addfont.php:255
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "+++ OK : ".$fontfile.' added as '.$fontname."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3117. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tools/tcpdf_addfont.php:237
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "ERROR: Can't write to ".$options['outpath']."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
3118. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tools/tcpdf_addfont.php:253
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "--- ERROR: can't add ".$font."\n";
Recommendation: Use $wpdb->prepare() with placeholders
3119. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/tcpdf/tools/tcpdf_addfont.php:255
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "+++ OK : ".$fontfile.' added as '.$fontname."\n";
Recommendation: Use $wpdb->prepare() with placeholders
3120. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/src/io/Google_CurlIO.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$responseHeaders[$header] .= "\n" . $value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3121. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/src/io/Google_CurlIO.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$responseHeaders[$header] .= "\n" . $value;
Recommendation: Use $wpdb->prepare() with placeholders
3122. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/src/auth/Google_OAuth2.php:378
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$signed = $segments[0] . "." . $segments[1];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3123. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/src/auth/Google_OAuth2.php:384
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Google_AuthException("Can't parse token envelope: " . $segments[0]);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3124. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/src/auth/Google_OAuth2.php:391
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Google_AuthException("Can't parse token payload: " . $segments[1]);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3125. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/src/auth/Google_OAuth2.php:378
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$signed = $segments[0] . "." . $segments[1];
Recommendation: Use $wpdb->prepare() with placeholders
3126. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/src/auth/Google_OAuth2.php:384
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Google_AuthException("Can't parse token envelope: " . $segments[0]);
Recommendation: Use $wpdb->prepare() with placeholders
3127. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/constructimator.com/reno/contacts/src/auth/Google_OAuth2.php:391
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Google_AuthException("Can't parse token payload: " . $segments[1]);
Recommendation: Use $wpdb->prepare() with placeholders
3128. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/usergroups.dbOps.class.php:236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$thisUserGroup=$usergroup_basename."_".$suffix;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3129. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/usergroups.dbOps.class.php:236
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$thisUserGroup=$usergroup_basename."_".$suffix;
Recommendation: Use $wpdb->prepare() with placeholders
3130. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.="`$varKey` ".$varConfig['type']." ".(isset($varConfig['size'])?("(".$varConfig['size'].")"):'').' '.(isset($varConfig['flags'])?$varConfig['flags']:'');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3131. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" COMMENT '".$varConfig['comment']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3132. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:144
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.="ADD COLUMN `$varKey` ".$varConfig['type']." ".(isset($varConfig['size'])?("(".$varConfig['size'].")"):'').' '.(isset($varConfig['flags'])?$varConfig['flags']:'');
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3133. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:146
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" AFTER `".$varConfig['after']."`";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3134. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" COMMENT '".$varConfig['comment']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3135. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:200
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql="DROP TABLE `".$tableName."`;";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3136. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:71
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.="`$varKey` ".$varConfig['type']." ".(isset($varConfig['size'])?("(".$varConfig['size'].")"):'').' '.(isset($varConfig['flags'])?$varConfig['flags']:'');
Recommendation: Use $wpdb->prepare() with placeholders
3137. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:79
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" COMMENT '".$varConfig['comment']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3138. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:144
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.="ADD COLUMN `$varKey` ".$varConfig['type']." ".(isset($varConfig['size'])?("(".$varConfig['size'].")"):'').' '.(isset($varConfig['flags'])?$varConfig['flags']:'');
Recommendation: Use $wpdb->prepare() with placeholders
3139. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:146
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" AFTER `".$varConfig['after']."`";
Recommendation: Use $wpdb->prepare() with placeholders
3140. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:157
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql.=" COMMENT '".$varConfig['comment']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3141. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:200
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql="DROP TABLE `".$tableName."`;";
Recommendation: Use $wpdb->prepare() with placeholders
3142. Deprecated mysql_query() with user input
File: /opt/claude-workspace/projects/archive/_shared/database/dbOps.class.php:327
CWE: CWE-89
Confidence: HIGH
Description: Deprecated mysql_query() with user input
Code:
mysql_query($query, $link);
Recommendation: Use PDO or mysqli with prepared statements
3143. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/subscribers.dbOps.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql= sprintf(' UPDATE %s SET '.implode(',', array_map(function ($v, $k) { return "`".$k . "`='" . $v."'"; }, $subscriber, array_keys($subscriber))),
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3144. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/database/subscribers.dbOps.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$sql= sprintf(' UPDATE %s SET '.implode(',', array_map(function ($v, $k) { return "`".$k . "`='" . $v."'"; }, $subscriber, array_keys($subscriber))),
Recommendation: Use $wpdb->prepare() with placeholders
3145. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/TimeZones.class.php:108
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$defs_data_orig = file(realpath(dirname(__FILE__))."/src_TimeZones/timezones/".$region,FILE_SKIP_EMPTY_LINES);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3146. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/TimeZones.class.php:108
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$defs_data_orig = file(realpath(dirname(__FILE__))."/src_TimeZones/timezones/".$region,FILE_SKIP_EMPTY_LINES);
Recommendation: Use $wpdb->prepare() with placeholders
3147. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:106
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:givenName>".$this->givenName."</gd:givenName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3148. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:111
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:familyName>".$this->familyName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3149. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:fullName>".$this->fullName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3150. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:121
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<atom:content type='text'>".$this->notes."</atom:content>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3151. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:125
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:email rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3152. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" address='".$this->email[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3153. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" displayName='".$this->email[$type]['displayName']."'/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3154. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:133
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:phoneNumber rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3155. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=">".$this->phone[$type]['number']."</gd:phoneNumber>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3156. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:140
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:im address='".$this->instantMessaging[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3157. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:141
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" protocol='".$this->instantMessaging[$type]['protocol']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3158. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" rel='http://schemas.google.com/g/2005#".$type."'/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3159. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3160. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:150
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:city>".$this->postalAddress[$type]['city']."</gd:city>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3161. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:151
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:street>".$this->postalAddress[$type]['street']."</gd:street>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3162. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:152
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:region>".$this->postalAddress[$type]['region']."</gd:region>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3163. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:153
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:postcode>".$this->postalAddress[$type]['postcode']."</gd:postcode>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3164. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:154
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:country>".$this->postalAddress[$type]['country']."</gd:country>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3165. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:formattedAddress>".$this->postalAddress[$type]['formattedAddress']."</gd:formattedAddress>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3166. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gContact:groupMembershipInfo deleted='false' href='http://www.google.com/m8/feeds/groups/".$this->user_email."/base/".$group_id."'/> ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3167. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:167
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "\n"."\n"."\n".$contact."\n"."\n"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3168. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3169. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3170. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3171. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:220
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request($url="https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/".$contactId."?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3172. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:232
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3173. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:106
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:givenName>".$this->givenName."</gd:givenName>
Recommendation: Use $wpdb->prepare() with placeholders
3174. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:111
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:familyName>".$this->familyName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders
3175. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:116
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:fullName>".$this->fullName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders
3176. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:121
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<atom:content type='text'>".$this->notes."</atom:content>";
Recommendation: Use $wpdb->prepare() with placeholders
3177. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:125
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:email rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3178. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:129
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" address='".$this->email[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3179. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:130
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" displayName='".$this->email[$type]['displayName']."'/>";
Recommendation: Use $wpdb->prepare() with placeholders
3180. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:133
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:phoneNumber rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3181. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=">".$this->phone[$type]['number']."</gd:phoneNumber>";
Recommendation: Use $wpdb->prepare() with placeholders
3182. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:140
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:im address='".$this->instantMessaging[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3183. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:141
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" protocol='".$this->instantMessaging[$type]['protocol']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3184. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:143
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" rel='http://schemas.google.com/g/2005#".$type."'/>";
Recommendation: Use $wpdb->prepare() with placeholders
3185. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:147
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3186. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:150
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:city>".$this->postalAddress[$type]['city']."</gd:city>
Recommendation: Use $wpdb->prepare() with placeholders
3187. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:151
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:street>".$this->postalAddress[$type]['street']."</gd:street>
Recommendation: Use $wpdb->prepare() with placeholders
3188. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:152
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:region>".$this->postalAddress[$type]['region']."</gd:region>
Recommendation: Use $wpdb->prepare() with placeholders
3189. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:153
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:postcode>".$this->postalAddress[$type]['postcode']."</gd:postcode>
Recommendation: Use $wpdb->prepare() with placeholders
3190. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:154
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:country>".$this->postalAddress[$type]['country']."</gd:country>";
Recommendation: Use $wpdb->prepare() with placeholders
3191. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:158
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:formattedAddress>".$this->postalAddress[$type]['formattedAddress']."</gd:formattedAddress>";
Recommendation: Use $wpdb->prepare() with placeholders
3192. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gContact:groupMembershipInfo deleted='false' href='http://www.google.com/m8/feeds/groups/".$this->user_email."/base/".$group_id."'/> ";
Recommendation: Use $wpdb->prepare() with placeholders
3193. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:167
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "\n"."\n"."\n".$contact."\n"."\n"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
3194. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders
3195. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:189
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3196. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:190
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3197. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:220
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request($url="https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/".$contactId."?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3198. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContact.class.php:232
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3199. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:28
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004b] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3200. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/groups/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3201. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3202. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004c] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3203. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_Http_Request("https://www.google.com/m8/feeds/groups/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3204. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:94
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004d] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3205. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3206. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?group=".urlencode($baseurl.$groupID)."&alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3207. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004e] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3208. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:28
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004b] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3209. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/groups/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3210. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3211. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004c] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3212. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_Http_Request("https://www.google.com/m8/feeds/groups/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders
3213. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:94
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004d] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3214. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3215. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?group=".urlencode($baseurl.$groupID)."&alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3216. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/GContacts.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004e] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3217. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:43
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if($custom_message!='') $message_template .= "<br>" . $custom_message . "";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3218. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message_template .= "<tr><td><strong>Decision:</strong> </td><td>" . $link_accept .' '.$link_reject. "</td></tr>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3219. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if($welcome_message!='') $message_template .= "" . $welcome_message . "";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3220. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:104
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if($site_url!='') $message_template .= "<tr><td><strong>Site URL:</strong> </td><td>" . $site_url . "</td></tr>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3221. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message_extra_admin_only.="<tr><td><strong>Picture:</strong> </td><td><img src=\"" . $userinfo['user_gdata_decode']->picture . "\" alt=\"".$userinfo['user_name']."\" height=\"200\"></td></tr>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3222. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:43
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if($custom_message!='') $message_template .= "<br>" . $custom_message . "";
Recommendation: Use $wpdb->prepare() with placeholders
3223. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:47
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message_template .= "<tr><td><strong>Decision:</strong> </td><td>" . $link_accept .' '.$link_reject. "</td></tr>";
Recommendation: Use $wpdb->prepare() with placeholders
3224. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:100
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if($welcome_message!='') $message_template .= "" . $welcome_message . "";
Recommendation: Use $wpdb->prepare() with placeholders
3225. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:104
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
if($site_url!='') $message_template .= "<tr><td><strong>Site URL:</strong> </td><td>" . $site_url . "</td></tr>";
Recommendation: Use $wpdb->prepare() with placeholders
3226. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Mailman.class.php:113
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$message_extra_admin_only.="<tr><td><strong>Picture:</strong> </td><td><img src=\"" . $userinfo['user_gdata_decode']->picture . "\" alt=\"".$userinfo['user_name']."\" height=\"200\"></td></tr>";
Recommendation: Use $wpdb->prepare() with placeholders
3227. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:28
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004b] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3228. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/groups/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3229. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3230. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004c] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3231. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_Http_Request("https://www.google.com/m8/feeds/groups/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3232. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:94
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004d] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3233. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3234. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?group=".urlencode($baseurl.$groupID)."&alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3235. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004e] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3236. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:424
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:givenName>".$this->givenName."</gd:givenName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3237. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:429
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:familyName>".$this->familyName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3238. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:434
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:fullName>".$this->fullName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3239. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:439
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<atom:content type='text'>".$this->notes."</atom:content>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3240. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:443
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:email rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3241. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:447
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" address='".$this->email[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3242. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:448
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" displayName='".$this->email[$type]['displayName']."'/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3243. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:451
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:phoneNumber rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3244. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:455
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=">".$this->phone[$type]['number']."</gd:phoneNumber>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3245. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:458
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:im address='".$this->instantMessaging[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3246. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:459
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" protocol='".$this->instantMessaging[$type]['protocol']."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3247. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:461
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" rel='http://schemas.google.com/g/2005#".$type."'/>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3248. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:465
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3249. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:468
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:city>".$this->postalAddress[$type]['city']."</gd:city>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3250. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:469
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:street>".$this->postalAddress[$type]['street']."</gd:street>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3251. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:470
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:region>".$this->postalAddress[$type]['region']."</gd:region>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3252. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:471
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:postcode>".$this->postalAddress[$type]['postcode']."</gd:postcode>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3253. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:472
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:country>".$this->postalAddress[$type]['country']."</gd:country>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3254. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:476
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:formattedAddress>".$this->postalAddress[$type]['formattedAddress']."</gd:formattedAddress>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3255. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:482
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gContact:groupMembershipInfo deleted='false' href='http://www.google.com/m8/feeds/groups/".$this->user_email."/base/".$group_id."'/> ";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3256. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:485
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "\n"."\n"."\n".$contact."\n"."\n"."\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3257. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:492
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3258. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:507
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3259. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:508
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3260. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:538
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request($url="https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/".$contactId."?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3261. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:550
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3262. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:28
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004b] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3263. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:36
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/groups/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3264. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:46
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3265. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004c] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3266. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:80
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_Http_Request("https://www.google.com/m8/feeds/groups/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders
3267. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:94
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004d] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3268. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:137
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3269. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:138
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?group=".urlencode($baseurl.$groupID)."&alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3270. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//print "[004e] An error occurred: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3271. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:424
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:givenName>".$this->givenName."</gd:givenName>
Recommendation: Use $wpdb->prepare() with placeholders
3272. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:429
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:familyName>".$this->familyName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders
3273. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:434
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:fullName>".$this->fullName."</gd:familyName>
Recommendation: Use $wpdb->prepare() with placeholders
3274. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:439
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<atom:content type='text'>".$this->notes."</atom:content>";
Recommendation: Use $wpdb->prepare() with placeholders
3275. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:443
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:email rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3276. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:447
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" address='".$this->email[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3277. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:448
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" displayName='".$this->email[$type]['displayName']."'/>";
Recommendation: Use $wpdb->prepare() with placeholders
3278. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:451
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:phoneNumber rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3279. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:455
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=">".$this->phone[$type]['number']."</gd:phoneNumber>";
Recommendation: Use $wpdb->prepare() with placeholders
3280. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:458
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:im address='".$this->instantMessaging[$type]['address']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3281. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:459
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" protocol='".$this->instantMessaging[$type]['protocol']."'";
Recommendation: Use $wpdb->prepare() with placeholders
3282. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:461
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.=" rel='http://schemas.google.com/g/2005#".$type."'/>";
Recommendation: Use $wpdb->prepare() with placeholders
3283. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:465
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
rel='http://schemas.google.com/g/2005#".$type."'";
Recommendation: Use $wpdb->prepare() with placeholders
3284. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:468
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:city>".$this->postalAddress[$type]['city']."</gd:city>
Recommendation: Use $wpdb->prepare() with placeholders
3285. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:469
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:street>".$this->postalAddress[$type]['street']."</gd:street>
Recommendation: Use $wpdb->prepare() with placeholders
3286. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:470
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:region>".$this->postalAddress[$type]['region']."</gd:region>
Recommendation: Use $wpdb->prepare() with placeholders
3287. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:471
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:postcode>".$this->postalAddress[$type]['postcode']."</gd:postcode>
Recommendation: Use $wpdb->prepare() with placeholders
3288. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:472
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<gd:country>".$this->postalAddress[$type]['country']."</gd:country>";
Recommendation: Use $wpdb->prepare() with placeholders
3289. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:476
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gd:formattedAddress>".$this->postalAddress[$type]['formattedAddress']."</gd:formattedAddress>";
Recommendation: Use $wpdb->prepare() with placeholders
3290. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:482
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$contact.="<gContact:groupMembershipInfo deleted='false' href='http://www.google.com/m8/feeds/groups/".$this->user_email."/base/".$group_id."'/> ";
Recommendation: Use $wpdb->prepare() with placeholders
3291. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:485
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
//echo "\n"."\n"."\n".$contact."\n"."\n"."\n";
Recommendation: Use $wpdb->prepare() with placeholders
3292. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:492
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$add = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/");
Recommendation: Use $wpdb->prepare() with placeholders
3293. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:507
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3294. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:508
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request("https://www.google.com/m8/feeds/contacts/".$this->user_email."/full?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3295. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:538
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$req = new Google_Http_Request($url="https://www.google.com/m8/feeds/contacts/".$this->user_email."/full/".$contactId."?alt=json");
Recommendation: Use $wpdb->prepare() with placeholders
3296. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/Contacts_Google.php:550
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$baseurl="http://www.google.com/m8/feeds/groups/".$this->user_email."/base/";
Recommendation: Use $wpdb->prepare() with placeholders
3297. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3298. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3299. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3300. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3301. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3302. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3303. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3304. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3305. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3306. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3307. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:291
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3308. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:301
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3309. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3310. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:386
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3311. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:112
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$header = $this->getVariableName() . " (" . $header . ")";
Recommendation: Use $wpdb->prepare() with placeholders
3312. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:117
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=2 cellpadding=3 class=\"dBug_".$type."\">
Recommendation: Use $wpdb->prepare() with placeholders
3313. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:119
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td ".$str_i."class=\"dBug_".$type."Header\" colspan=".$colspan." onClick='dBug_toggleTable(this)'>".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
3314. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:126
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<tr".$str_d.">
Recommendation: Use $wpdb->prepare() with placeholders
3315. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:127
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
<td valign=\"top\" onClick='dBug_toggleRow(this)' class=\"dBug_".$type."Key\">".$header."</td>
Recommendation: Use $wpdb->prepare() with placeholders
3316. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:142
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
return ($error." ".$type." type");
Recommendation: Use $wpdb->prepare() with placeholders
3317. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<table cellspacing=0><tr>\n<td>".$var."</td>\n</tr>\n</table>\n";
Recommendation: Use $wpdb->prepare() with placeholders
3318. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:207
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("array").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
3319. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "[function]".$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
3320. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:244
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
else echo "<tr><td>".$this->error("object").$this->closeTDRow();
Recommendation: Use $wpdb->prepare() with placeholders
3321. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:291
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$db_func = $db."_field_".$arrFields[$j];
Recommendation: Use $wpdb->prepare() with placeholders
3322. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:301
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td class=\"dBug_resourceKey\" title=\"".$field_header."\">".$field_name."</td>";
Recommendation: Use $wpdb->prepare() with placeholders
3323. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:312
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
echo "<td>".$fieldrow."</td>\n";
Recommendation: Use $wpdb->prepare() with placeholders
3324. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/classes/dBug.class.php:386
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->xmlSData[$this->xmlCount].='echo "<strong>'.$this->xmlName[$this->xmlCount].'</strong>".$this->closeTDRow();';
Recommendation: Use $wpdb->prepare() with placeholders
3325. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/phpqrcode-master/tools/merge.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$outputCode .= "\n\n".$anotherCode."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3326. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/phpqrcode-master/tools/merge.php:60
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$outputCode .= "\n\n".$anotherCode."\n\n";
Recommendation: Use $wpdb->prepare() with placeholders
3327. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Http/Batch.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->expected_classes["response-" . $key] = $req->getExpectedClass();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3328. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Http/Batch.php:66
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$this->expected_classes["response-" . $key] = $req->getExpectedClass();
Recommendation: Use $wpdb->prepare() with placeholders
3329. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Http/Request.php:232
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"?" . $this->buildQuery($this->queryParams) :
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3330. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Http/Request.php:289
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
isset($parts['port']) ? ":" . $parts['port'] : ''
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3331. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Http/Request.php:409
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str = $headers . "\n" . $str;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3332. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Http/Request.php:232
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
"?" . $this->buildQuery($this->queryParams) :
Recommendation: Use $wpdb->prepare() with placeholders
3333. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Http/Request.php:289
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
isset($parts['port']) ? ":" . $parts['port'] : ''
Recommendation: Use $wpdb->prepare() with placeholders
3334. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Http/Request.php:409
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$str = $headers . "\n" . $str;
Recommendation: Use $wpdb->prepare() with placeholders
3335. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Utils/URITemplate.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$values[] = $pkey . "=" . $pvalue; // Explode triggers = combine.
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3336. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Utils/URITemplate.php:241
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$values[] = $pkey . "=" . $pvalue; // Explode triggers = combine.
Recommendation: Use $wpdb->prepare() with placeholders
3337. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/IO/Abstract.php:287
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[$header] .= "\n" . $value;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3338. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/IO/Abstract.php:287
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$headers[$header] .= "\n" . $value;
Recommendation: Use $wpdb->prepare() with placeholders
3339. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Auth/OAuth2.php:475
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$signed = $segments[0] . "." . $segments[1];
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3340. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Auth/OAuth2.php:481
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Google_Auth_Exception("Can't parse token envelope: " . $segments[0]);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3341. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Auth/OAuth2.php:488
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Google_Auth_Exception("Can't parse token payload: " . $segments[1]);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3342. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Auth/OAuth2.php:475
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$signed = $segments[0] . "." . $segments[1];
Recommendation: Use $wpdb->prepare() with placeholders
3343. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Auth/OAuth2.php:481
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Google_Auth_Exception("Can't parse token envelope: " . $segments[0]);
Recommendation: Use $wpdb->prepare() with placeholders
3344. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/archive/_shared/includes/api-clients/Google/Auth/OAuth2.php:488
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Google_Auth_Exception("Can't parse token payload: " . $segments[1]);
Recommendation: Use $wpdb->prepare() with placeholders
3345. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/dashboard-api.php:628
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Warning: Could not enable redirect for alias '$alias': " . $redirectError->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3346. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/dashboard-api.php:2102
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Dashboard API Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3347. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/dashboard-api.php:628
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Warning: Could not enable redirect for alias '$alias': " . $redirectError->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3348. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/dashboard-api.php:2102
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Dashboard API Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3349. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/fix-dns.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Fix DNS Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3350. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/fix-dns.php:132
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Fix DNS Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3351. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/api.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$progress->failStep('preflight', "Failed to resolve {$failedCount} conflict(s): " . $firstFailed['error']);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3352. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/api.php:566
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Service restart error (non-fatal): " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3353. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/api.php:608
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Hestia Automation Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3354. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/api.php:188
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$progress->failStep('preflight', "Failed to resolve {$failedCount} conflict(s): " . $firstFailed['error']);
Recommendation: Use $wpdb->prepare() with placeholders
3355. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/api.php:566
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Service restart error (non-fatal): " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3356. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/api.php:608
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Hestia Automation Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3357. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:973
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$warnings[] = "SendGrid error: " . $sgError->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3358. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:988
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$warnings[] = "Error retrieving DKIM records: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3359. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1148
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Check for existing records: " . $checkError->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3360. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$errorMsg = "Cloudflare API error for {$record['name']}: " . $cfError->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3361. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CLOUDFLARE ERROR: " . $errorMsg);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3362. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1176
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$errorMsg = $record['name'] . ": " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3363. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1177
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("EXCEPTION creating DKIM record: " . $errorMsg);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3364. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1231
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results[] = "⚠ DNS records created but validation failed: " . $validateError->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3365. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1477
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Configure DNS Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3366. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:973
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$warnings[] = "SendGrid error: " . $sgError->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3367. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:988
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$warnings[] = "Error retrieving DKIM records: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3368. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1148
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Check for existing records: " . $checkError->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3369. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$errorMsg = "Cloudflare API error for {$record['name']}: " . $cfError->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3370. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1165
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("CLOUDFLARE ERROR: " . $errorMsg);
Recommendation: Use $wpdb->prepare() with placeholders
3371. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1176
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$errorMsg = $record['name'] . ": " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3372. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1177
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("EXCEPTION creating DKIM record: " . $errorMsg);
Recommendation: Use $wpdb->prepare() with placeholders
3373. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1231
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results[] = "⚠ DNS records created but validation failed: " . $validateError->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3374. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/configure-dns.php:1477
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("Configure DNS Error: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3375. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/EmailConfig.php:114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results[] = "Error: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3376. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/EmailConfig.php:114
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$results[] = "Error: " . $e->getMessage();
Recommendation: Use $wpdb->prepare() with placeholders
3377. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/SendGridAPI.php:424
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Cannot retrieve DKIM records: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3378. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/SendGridAPI.php:424
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
throw new Exception("Cannot retrieve DKIM records: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3379. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressConfigurator.php:358
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
file_put_contents($htaccess, $rules . "\n" . $content);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3380. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressConfigurator.php:389
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
file_put_contents($functionsPhp, $content . "\n" . $code);
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3381. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressConfigurator.php:358
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
file_put_contents($htaccess, $rules . "\n" . $content);
Recommendation: Use $wpdb->prepare() with placeholders
3382. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressConfigurator.php:389
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
file_put_contents($functionsPhp, $content . "\n" . $code);
Recommendation: Use $wpdb->prepare() with placeholders
3383. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to check WordPress for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3384. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:294
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to scan for WordPress sites: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3385. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:428
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get overview data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3386. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:500
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get config data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3387. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:579
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get users list for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3388. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:774
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$method = "get_test_" . $test_id;
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3389. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:837
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get site health for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3390. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:1174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get updates for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3391. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:1263
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get plugins for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3392. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:1661
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get security data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3393. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:1854
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get performance data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3394. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:2040
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get themes for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3395. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:2304
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get settings for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3396. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:2517
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get backup data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders instead of string concatenation
3397. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:164
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to check WordPress for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3398. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:294
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to scan for WordPress sites: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3399. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:428
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get overview data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3400. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:500
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get config data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3401. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:579
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get users list for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3402. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:774
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
$method = "get_test_" . $test_id;
Recommendation: Use $wpdb->prepare() with placeholders
3403. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:837
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get site health for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3404. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:1174
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get updates for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3405. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:1263
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get plugins for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3406. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:1661
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get security data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3407. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:1854
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get performance data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3408. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:2040
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get themes for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3409. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:2304
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get settings for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
3410. Possible SQL injection via string concatenation
File: /opt/claude-workspace/projects/hestia-automation/includes/WordPressValidator.php:2517
CWE: CWE-89
Confidence: HIGH
Description: Possible SQL injection via string concatenation
Code:
error_log("WordPressValidator: Failed to get backup data for {$domain}: " . $e->getMessage());
Recommendation: Use $wpdb->prepare() with placeholders
Projects Summary
| Project | Files | Issues | CRITICAL | HIGH | MEDIUM | LOW |
|---|---|---|---|---|---|---|
| archive | 537 | 560 | 525 | 0 | 35 | 0 |
| cxq-membership | 468 | 274 | 255 | 7 | 12 | 0 |
| mailpoet | 3569 | 261 | 242 | 0 | 19 | 0 |
| cxq-membership.backup-20260115 | 190 | 258 | 252 | 2 | 4 | 0 |
| cxq-scheduler | 217 | 243 | 231 | 2 | 10 | 0 |
| woocommerce | 2996 | 231 | 172 | 8 | 51 | 0 |
| jetpack | 1351 | 204 | 133 | 17 | 54 | 0 |
| gravityforms | 331 | 198 | 176 | 7 | 15 | 0 |
| wordfence | 383 | 196 | 180 | 0 | 16 | 0 |
| motopress-hotel-booking | 1035 | 125 | 102 | 5 | 18 | 0 |
| worker | 316 | 111 | 77 | 0 | 34 | 0 |
| cxq-signage | 50 | 94 | 90 | 0 | 4 | 0 |
| cxq-site-manager-host | 254 | 81 | 67 | 4 | 10 | 0 |
| hestia-automation | 37 | 79 | 66 | 6 | 7 | 0 |
| cxq-site-manager-client | 97 | 77 | 74 | 0 | 3 | 0 |
| cxq-facebot | 292 | 76 | 57 | 4 | 15 | 0 |
| the-events-calendar | 1959 | 68 | 21 | 0 | 47 | 0 |
| woocommerce-product-vendors | 363 | 66 | 66 | 0 | 0 | 0 |
| pta-volunteer-sign-up-sheets | 35 | 61 | 60 | 0 | 1 | 0 |
| wpforms | 1161 | 58 | 29 | 12 | 17 | 0 |
| all-in-one-seo-pack-pro | 532 | 57 | 25 | 0 | 32 | 0 |
| wpforms-lite | 3541 | 50 | 28 | 4 | 18 | 0 |
| cxq-email-relay | 226 | 49 | 39 | 4 | 6 | 0 |
| cxq-autocomplete-awsc-form | 82 | 48 | 48 | 0 | 0 | 0 |
| cxq-event-calendar | 255 | 44 | 34 | 4 | 6 | 0 |
| cxq-cashdrawer | 54 | 41 | 38 | 0 | 3 | 0 |
| cxq-woocommerce-sales-listx | 3 | 40 | 40 | 0 | 0 | 0 |
| cxq-license-manager | 9 | 39 | 36 | 0 | 3 | 0 |
| wp-mail-smtp | 436 | 35 | 34 | 0 | 1 | 0 |
| cxq-antispam-host | 23 | 33 | 30 | 0 | 3 | 0 |
| cxq-dev-tools | 3 | 28 | 28 | 0 | 0 | 0 |
| cxq-firewall | 222 | 26 | 12 | 4 | 10 | 0 |
| cxq-updater-host | 18 | 25 | 15 | 0 | 10 | 0 |
| google-analytics-for-wordpress | 213 | 24 | 17 | 2 | 5 | 0 |
| cxq-antispam | 251 | 23 | 11 | 4 | 8 | 0 |
| cxq-google-hours | 231 | 22 | 10 | 4 | 8 | 0 |
| woocommerce-product-addons | 87 | 21 | 6 | 3 | 12 | 0 |
| cxq-board-docs | 224 | 18 | 8 | 4 | 6 | 0 |
| akismet | 22 | 11 | 11 | 0 | 0 | 0 |
| cxq-woocommerce-sales-list | 8 | 11 | 10 | 0 | 1 | 0 |
| ecoeye-alert-relay | 7 | 10 | 9 | 0 | 1 | 0 |
| woocommerce-gateway-stripe | 143 | 8 | 6 | 0 | 2 | 0 |
| woocommerce-payments | 410 | 8 | 0 | 0 | 8 | 0 |
| antispam-bee | 3 | 8 | 1 | 0 | 7 | 0 |
| all-in-one-wp-migration | 142 | 7 | 1 | 4 | 2 | 0 |
| query-monitor | 141 | 6 | 4 | 0 | 2 | 0 |
| woocommerce-checkout-manager | 106 | 5 | 0 | 3 | 2 | 0 |
| mphb-request-payment | 42 | 5 | 2 | 0 | 3 | 0 |
| cxq-doc-builder | 16 | 5 | 4 | 0 | 1 | 0 |
| distributor | 46 | 5 | 0 | 0 | 5 | 0 |
| woocommerce-ajax-layered-nav | 6 | 4 | 4 | 0 | 0 | 0 |
| mphb-notifier | 41 | 4 | 0 | 0 | 4 | 0 |
| cyber-guardian | 2 | 4 | 4 | 0 | 0 | 0 |
| ecoeye-alert-relay-old | 3 | 4 | 4 | 0 | 0 | 0 |
| cxq-libs | 89 | 4 | 0 | 2 | 2 | 0 |
| gravityformsuserregistration | 12 | 3 | 3 | 0 | 0 | 0 |
| cxq-woocommerce-places | 19 | 3 | 3 | 0 | 0 | 0 |
| cxq-cloudflare-manager | 2 | 2 | 2 | 0 | 0 | 0 |
| debug-bar | 10 | 2 | 0 | 0 | 2 | 0 |
| cxq-enhance-wpforms | 9 | 2 | 2 | 0 | 0 | 0 |
| cxq-documents | 5 | 2 | 2 | 0 | 0 | 0 |
| cxq-woocommerce-product-map | 4 | 2 | 2 | 0 | 0 | 0 |
| all-in-one-wp-migration-unlimited-extension | 15 | 1 | 1 | 0 | 0 | 0 |
| cxq-spec-auditor | 6 | 1 | 1 | 0 | 0 | 0 |
Issues by Category
SQL INJECTION (3367 issues)
CRITICAL: 3367, HIGH: 0
WEAK CRYPTO (545 issues)
CRITICAL: 0, HIGH: 0
FILE UPLOAD (126 issues)
CRITICAL: 10, HIGH: 116
CREDENTIALS (33 issues)
CRITICAL: 33, HIGH: 0