Thanks for that. My host updated without me about two weeks later, and you eliminated any stress level.
Moving along, Sitelock tells me there is a theme vulnerability. For your information:
Atahualpa 3.7.24
Severity: Medium
Category: xss
Summary: Atahualpa Theme - Authenticated Cross-Site Scripting (XSS)
Description: Providing any of the following fields with string such as: "><script>alert(1);</script> results in the script element getting appended after the respective input element when the request returns from the server: "comment_feed_link", "home_cat_menu_bar", "email_subscribe_link", "home_single_next_prev", "email_subscribe_link_title", "feedburner_email_id", "excerpt_length", "page_menu_bar_link_color", "cat_menu_bar_background_color_parent", "cat_menu_bar_link_color", "left_col_pages_exclude", "widget_lists link-hover-color", "left_col2_cats_exclude" The solution to this issue is to encode as html all the user-provided parameters before they are returned to the browser.
|