Closed emiluzelac closed 8 years ago
@emiluzelac Thanks for submitting.
What part specifically is vulnerable to XSS? There really isn't any user inputs in the code you highlighted. $this->theme->get( 'Name' )
is coming directly from WP...
Sure thing @mgibbs189 it's right here: href="javascript:;"
and it's .on('click'
as well.
href="javascript:;"
just tells the browser not to do anything on click.
It's the same as href="#"
, but doesn't scroll the page to the top.
Sorry for writing and deleting earlier. I see what do you mean now.
I would recommend escaping the following in: https://github.com/FacetWP/use-child-theme/blob/master/use-child-theme.php#L52-L78
More details:
There's also another method as well: https://github.com/Automattic/theme-tools/blob/master/jetpack-dependency-script/plugin-enhancements.php#L234-L269
P.S. I had bit more time today :)