• Resolved kristianimmersive

    (@kristianimmersive)


    Hi there,
    We have a site using the MX Chat, and recently our cPanel started flagging the site as containing malware in the site files.

    It’s within the integrator class – plugins/mxchat-basic/includes/class-mxchat-integrator.php

    Eploit that has been found is: php.administrator.file.put.contents.if.isset.str.replace.array.map.function.isset.post

    What’s the severity of this?

Viewing 1 replies (of 1 total)
  • Plugin Support m4xw3ll

    (@m4xw3ll)

    hi @kristianimmersive,

    This is a FALSE POSITIVE.

    The “exploit” pattern cPanel is flagging (file_put_contentsisset($_POST)str_replacearray_map) describes common PHP functions that malware often uses but are also used by legitimate WordPress plugins for normal operations like saving settings and sanitizing data.

    MxChat is safe. The integrator class doesn’t contain any malicious code it’s standard WordPress functionality. All $_POST data in MxChat is properly sanitized and uses WordPress nonce verification for security.

Viewing 1 replies (of 1 total)

You must be logged in to reply to this topic.