• Плагин был изгнан с английского wordpressa выдаче в версии 3.6.3 в файле guetebberg.js был спрятан адрес дополнительной отправки логина получателя “вкусняшки” которую настраивали на сайте. что еще не могу найти и ИИ видит что вставлены коды, а отправку перехватить ума не хватает. Так что вы, как минимум поможете автору плагина собрать базу русских пользователей.

Viewing 1 replies (of 1 total)
  • Plugin Author Marco Milesi

    (@milmor)

    Your accusations are completely false and quite serious. If they were true, I urge you to report them directly to WordPress.org, as they have a zero-tolerance policy for such malicious claims.

    Let me be clear: there is no file named “guetebberg.js” in the plugin. The only file is “gutenberg.js,” and you can verify the content for version 3.6.3 here: https://plugins.svn.wordpress.org/telegram-bot/tags/3.6.3/.

    Furthermore, the vulnerability you mentioned does not involve sending external credentials. It relates to a minor “sanitize” XSS issue concerning the plugin’s settings, which can only be exploited by users with administrative access. This is not the serious threat you are implying. You can check it here: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34006

    The development is transparent and you can also follow it on GitHub: https://github.com/WPGov/telegram-bot.

    Your claims are unfounded, and I encourage you to verify the facts yourself rather than giving unnecessary credit to AI, because the entire codebase is public and the “malware” you mentioned never existed.

Viewing 1 replies (of 1 total)

The topic ‘Плагин с двойным дном’ is closed to new replies.