<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized &#8211; Best WordPress theme &amp; Plugins</title>
	<atom:link href="https://e-plugins.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://e-plugins.com</link>
	<description>Best WordPress theme &#38; plugins</description>
	<lastBuildDate>Sat, 30 Dec 2023 12:50:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">201737970</site>	<item>
		<title>Unsafe SQL calls</title>
		<link>https://e-plugins.com/unsafe-sql-calls/</link>
					<comments>https://e-plugins.com/unsafe-sql-calls/#respond</comments>
		
		<dc:creator><![CDATA[Aktar Zaman]]></dc:creator>
		<pubDate>Fri, 29 Dec 2023 14:38:51 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[WordPress Plugin Review]]></category>
		<guid isPermaLink="false">https://e-plugins.com/?p=5935</guid>

					<description><![CDATA[WordPress Plugin Or theme Review issue : Unsafe SQL calls When making database calls, it&#8217;s highly important to protect your code from SQL injection vulnerabilities. You need to update your code to use wpdb calls and prepare() with your queries to protect them. Please review the following:]]></description>
										<content:encoded><![CDATA[
<p></p>



<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">WordPress Plugin Or theme Review issue : Unsafe SQL calls</mark></strong></p>



<p>When making database calls, it&#8217;s highly important to protect your code from SQL injection vulnerabilities. You need to update your code to use wpdb calls and prepare() with your queries to protect them.</p>



<p>Please review the following:</p>



<ul class="wp-block-list">
<li><a href="https://developer.wordpress.org/reference/classes/wpdb/#protect-queries-against-sql-injection-attackshttp://codex.wordpress.org/Data_Validation#Databasehttp://make.wordpress.org/core/2012/12/12/php-warning-missing-argument-2-for-wpdb-prepare/http://ottopress.com/2013/better-know-a-vulnerability-sql-injection/" target="_blank" rel="noopener">https://developer.wordpress.org/reference/classes/wpdb/#protect-queries-against-sql-injection-attacks</a></li>



<li><a href="https://developer.wordpress.org/reference/classes/wpdb/#protect-queries-against-sql-injection-attackshttp://codex.wordpress.org/Data_Validation#Databasehttp://make.wordpress.org/core/2012/12/12/php-warning-missing-argument-2-for-wpdb-prepare/http://ottopress.com/2013/better-know-a-vulnerability-sql-injection/" target="_blank" rel="noopener">http://codex.wordpress.org/Data_Validation#Database</a></li>



<li><a href="https://developer.wordpress.org/reference/classes/wpdb/#protect-queries-against-sql-injection-attackshttp://codex.wordpress.org/Data_Validation#Databasehttp://make.wordpress.org/core/2012/12/12/php-warning-missing-argument-2-for-wpdb-prepare/http://ottopress.com/2013/better-know-a-vulnerability-sql-injection/" target="_blank" rel="noopener">http://make.wordpress.org/core/2012/12/12/php-warning-missing-argument-2-for-wpdb-prepare/</a></li>



<li><a href="https://developer.wordpress.org/reference/classes/wpdb/#protect-queries-against-sql-injection-attackshttp://codex.wordpress.org/Data_Validation#Databasehttp://make.wordpress.org/core/2012/12/12/php-warning-missing-argument-2-for-wpdb-prepare/http://ottopress.com/2013/better-know-a-vulnerability-sql-injection/" target="_blank" rel="noopener">http://ottopress.com/2013/better-know-a-vulnerability-sql-injection/</a></li>
</ul>



<pre class="wp-block-code"><code>Wrong  Code : $sql="SELECT * FROM $wpdb-&gt;posts WHERE post_type='post' and post_status='published'";
Right Code :
&lt;?php
$post_type='post';
$post_status='published';
$sql=$wpdb-&gt;prepare("SELECT * FROM $wpdb-&gt;posts WHERE post_type=%s and post_status=%s", $post_type, $post_status  );
 ?&gt;
%d (integer)
%f (float)
%s (string)
%i (identifier, e.g. table/field names)</code></pre>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://e-plugins.com/unsafe-sql-calls/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5935</post-id>	</item>
	</channel>
</rss>
