PageRenderTime 41ms CodeModel.GetById 14ms RepoModel.GetById 0ms app.codeStats 0ms

/wp-content/plugins/wordfence/wordfence/lib/email_newIssues.php

https://bitbucket.org/youresolutions/sheffieldcareservices.yes1.co.uk
PHP | 99 lines | 80 code | 19 blank | 0 comment | 33 complexity | 92490ed2a685ce816beaeb4bca293944 MD5 | raw file
Possible License(s): GPL-2.0, LGPL-3.0, MIT, Apache-2.0
  1. <p>This email was sent from your website "<?php echo get_bloginfo('name', 'raw'); ?>" by the Wordfence plugin.</p>
  2. <p>Wordfence found the following new issues on "<?php echo get_bloginfo('name', 'raw'); ?>".</p>
  3. <p>Alert generated at <?php echo wfUtils::localHumanDate(); ?></p>
  4. <?php if (wfConfig::get('scansEnabled_highSense')): ?>
  5. <div style="margin: 12px 0;padding: 8px; background-color: #ffffe0; border: 1px solid #ffd975; border-width: 1px 1px 1px 10px;">
  6. <em>HIGH SENSITIVITY scanning is enabled, it may produce false positives</em>
  7. </div>
  8. <?php endif ?>
  9. <?php if ($timeLimitReached): ?>
  10. <div style="margin: 12px 0;padding: 8px; background-color: #ffffe0; border: 1px solid #ffd975; border-width: 1px 1px 1px 10px;">
  11. <em>The scan was terminated early because it reached the time limit for scans. If you would like to allow your scans to run longer, you can customize the limit on the options page: <a href="<?php echo esc_attr(network_admin_url('admin.php?page=WordfenceSecOpt')); ?>"><?php echo esc_attr(network_admin_url('admin.php?page=WordfenceSecOpt')); ?></a> or read more about scan options to improve scan speed here: <a href="https://docs.wordfence.com/en/Scan_time_limit">https://docs.wordfence.com/en/Scan_time_limit</a></em>
  12. </div>
  13. <?php endif ?>
  14. <?php if($totalCriticalIssues > 0){ ?>
  15. <p>Critical Problems:</p>
  16. <?php foreach($issues as $i){ if($i['severity'] == 1){ ?>
  17. <p>* <?php echo htmlspecialchars($i['shortMsg']) ?></p>
  18. <?php
  19. if ((isset($i['tmplData']['wpRemoved']) && $i['tmplData']['wpRemoved']) || (isset($i['tmplData']['abandoned']) && $i['tmplData']['abandoned'])) {
  20. if (isset($i['tmplData']['vulnerable']) && $i['tmplData']['vulnerable']) {
  21. echo '<p><strong>Plugin contains an unpatched security vulnerability.</strong>';
  22. if (isset($i['tmplData']['vulnerabilityLink'])) {
  23. echo ' <a href="' . $i['tmplData']['vulnerabilityLink'] . '" target="_blank" rel="nofollow noreferer noopener">Vulnerability Information</a>';
  24. }
  25. echo '</p>';
  26. }
  27. }
  28. else if (isset($i['tmplData']['wpURL'])) {
  29. echo '<p>';
  30. if (isset($i['tmplData']['vulnerable']) && $i['tmplData']['vulnerable']) {
  31. echo '<strong>Update includes security-related fixes.</strong> ';
  32. if (isset($i['tmplData']['vulnerabilityLink'])) {
  33. echo '<a href="' . $i['tmplData']['vulnerabilityLink'] . '" target="_blank" rel="nofollow noreferer noopener">Vulnerability Information</a> ';
  34. }
  35. }
  36. echo $i['tmplData']['wpURL'] . '/#developers</p>';
  37. }
  38. else if (isset($i['tmplData']['vulnerable']) && $i['tmplData']['vulnerable']) {
  39. echo '<p><strong>Update includes security-related fixes.</strong>';
  40. if (isset($i['tmplData']['vulnerabilityLink'])) {
  41. echo ' <a href="' . $i['tmplData']['vulnerabilityLink'] . '" target="_blank" rel="nofollow noreferer noopener">Vulnerability Information</a>';
  42. }
  43. echo '</p>';
  44. }
  45. ?>
  46. <?php if (!empty($i['tmplData']['badURL'])): ?>
  47. <p><img src="<?php echo WORDFENCE_API_URL_BASE_NONSEC . "?" . http_build_query(array(
  48. 'v' => wfUtils::getWPVersion(),
  49. 's' => home_url(),
  50. 'k' => wfConfig::get('apiKey'),
  51. 'action' => 'image',
  52. 'txt' => base64_encode($i['tmplData']['badURL'])
  53. ), '', '&') ?>" alt="" /></p>
  54. <?php endif ?>
  55. <?php } } } ?>
  56. <?php if($level == 2 && $totalWarningIssues > 0){ ?>
  57. <p>Warnings:</p>
  58. <?php foreach($issues as $i){ if($i['severity'] == 2){ ?>
  59. <p>* <?php echo htmlspecialchars($i['shortMsg']) ?></p>
  60. <?php if (isset($i['tmplData']['wpURL'])): ?>
  61. <p><?php echo $i['tmplData']['wpURL']; ?>/#developers</p>
  62. <?php endif ?>
  63. <?php } } } ?>
  64. <?php if ($issuesNotShown > 0) { ?>
  65. <p><?php echo wfUtils::pluralize($issuesNotShown, 'issue'); ?> were omitted from this email. View every issue: <a href="<?php echo esc_attr(network_admin_url('admin.php?page=WordfenceScan')); ?>"><?php echo esc_html(network_admin_url('admin.php?page=WordfenceScan')); ?></a></p>
  66. <?php } ?>
  67. <?php if(! $isPaid){ ?>
  68. <p>NOTE: You are using the free version of Wordfence. Upgrade today:</p>
  69. <ul>
  70. <li>Receive real-time Firewall and Scan engine rule updates for protection as threats emerge</li>
  71. <li>Other advanced features like IP reputation monitoring, country blocking, an advanced comment spam filter and cell phone sign-in give you the best protection available</li>
  72. <li>Remote, frequent and scheduled scans</li>
  73. <li>Access to Premium Support</li>
  74. <li>Discounts of up to 90% for multiyear and multi-license purchases</li>
  75. </ul>
  76. <p>
  77. Click here to upgrade to Wordfence Premium:<br>
  78. <a href="https://www.wordfence.com/zz2/wordfence-signup/">https://www.wordfence.com/zz2/wordfence-signup/</a>
  79. </p>
  80. <?php } ?>