Viewing 1 replies (of 1 total)
  • Plugin Author Eli

    (@scheeeli)

    I have confirmed that the code in question is not malicious.
    //debug: html.push('<div style="position:absolute;opacity:0.10;background-color:red;left:' + box.left + 'px;top:' + box.top + 'px;width:' + box.width + 'px;height:' + box.height + 'px"></div>')
    Please note that this nearly hidden div is exactly the kind of HTML code that hackers use to hide text that they want to get indexed on infected sites. In this case it is just a slightly red tinted box that was clearly just used for debugging. You can also see that this code is rem’d out so it’s not even executed when the insertAxisLabels function is called.

    https://plugins.trac.wordpress.org/browser/contact-forms/trunk/flot/jquery.flot.js#L1663

    As this line was only used for debugging, and its not even needed in this JS include, it should probably just be removed and it won’t hurt for my Anti-Malware plugin to be deleting this line of code from this file. However, I understand this is not your code and this library could also show up in someone else’s plugin so I have whitelisted this version of this file so that it will not be flagged as a threat in my Anti-Malware plugin any more.

    Thanks for reporting this to me. Please let me know if there is anything else.

    Aloha, Eli

Viewing 1 replies (of 1 total)
  • The topic ‘Possible false-positive with file jquery.flot.js in contact-forms plugin’ is closed to new replies.