Title: bidev's Replies | WordPress.org

---

# bidev

  [  ](https://wordpress.org/support/users/bidev/)

 *   [Profile](https://wordpress.org/support/users/bidev/)
 *   [Topics Started](https://wordpress.org/support/users/bidev/topics/)
 *   [Replies Created](https://wordpress.org/support/users/bidev/replies/)
 *   [Reviews Written](https://wordpress.org/support/users/bidev/reviews/)
 *   [Topics Replied To](https://wordpress.org/support/users/bidev/replied-to/)
 *   [Engagements](https://wordpress.org/support/users/bidev/engagements/)
 *   [Favorites](https://wordpress.org/support/users/bidev/favorites/)

 Search replies:

## Forum Replies Created

Viewing 1 replies (of 1 total)

 *   Forum: [Plugins](https://wordpress.org/support/forum/plugins-and-hacks/)
    In
   reply to: [[Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets] Security risk: rce. An attacker could use this vulnerability to modify site conf](https://wordpress.org/support/topic/security-risk-rce-an-attacker-could-use-this-vulnerability-to-modify-site-conf/)
 *  [bidev](https://wordpress.org/support/users/bidev/)
 * (@bidev)
 * [1 year, 3 months ago](https://wordpress.org/support/topic/security-risk-rce-an-attacker-could-use-this-vulnerability-to-modify-site-conf/#post-18303515)
 * Until you receive the patch, you can go to the plugin settings: **Settings – 
   Widget Options**
   And disable the **Display Logic** feature (of course, if you’re
   not using it).This will completely close the vulnerability.
 * Also, I would like to point out that the vulnerability can only be exploited 
   by authorized WordPress users.

Viewing 1 replies (of 1 total)