Opened 3 years ago
Closed 3 years ago
#53271 closed defect (bug) (duplicate)
How to stop direct access wp-includes files
Reported by: | classicalrehan | Owned by: | |
---|---|---|---|
Milestone: | Priority: | normal | |
Severity: | critical | Version: | 5.7.1 |
Component: | General | Keywords: | |
Focuses: | Cc: |
Description (last modified by )
Hi Team,
I am getting 500 error due to WordPress loopholes,
if someone trying to access directly this file then it's generating 500 error because in these below file wp extend another class "Walker" without checking ABSPATH
if ( ! defined( 'ABSPATH' ) ) { exit; // Exit if accessed directly }
File: wp-includes/class-walker-nav-menu.php
File: wp-includes/class-walker-comment.php
File: wp-includes/class-walker-category-dropdown.php
The walker class include in wp via wp-settings.php but in my case user are directly access file
Change History (1)
Note: See
TracTickets for help on using
tickets.
Hi there, welcome back to WordPress Trac! Thanks for the report.
This has come up a few times before, for example in #36177, #30806, #44700, #45773, and most recently in #48049.
Per the Security FAQ, these errors are considered a server configuration issue rather than a security issue:
Instead of changing all PHP files to add a check for
ABSPATH
, this should be done in a central location, which is being discussed in #36177.Let's continue the discussion in that ticket, as it would be best to keep all discussion on the general idea of "blocking malicious requests" in a single place, even if any implemented change does not necessarily follow how the ticket originally intended on it being implemented.
That said, it looks like this ticket is more about unnecessary error logging rather than a path disclosure. Still, blocking direct access to the files in question using the web server configuration file should resolve the issue for now, until any changes are implemented in core.
See also a related similar ticket for bundled themes: #47154.