A security problem was reported. Please visit
phpwcms forum to get all information neccessary to fix this. Patched release is in preparation.
One of the main problems might be the possibility to inject phpwcms by using external PHP code. Here is a way to remove such code from all GET and POST vars.
Add the following lines of code to your index.php:
[Update] Before you add the function check if the function still exists in the code and replace it by the new, better ones. Otherwise a PHP error message might occur like:
function
remove_unsecure_rptags($check) {
$check = preg_replace('/{

PHP:(.*?)}/i', '$1', $check);
$check = preg_replace('/{

PHPVAR:(.*?)}/si', '$1', $check);
$check = preg_replace('/[

PHP](.*?)[/PHP]/si', '$1', $check);
$check = preg_replace('/{

URL:(.*?)}/i', '$1', $check);
$check = str_replace('[PHP]', '[ PHP ]', $check);
$check = str_replace('[/PHP]', '[ /PHP ]', $check);
$check = str_replace('{PHP:', '{ PHP :', $check);
$check = str_replace('{PHPVAR:', '{ PHPVAR :', $check);
$check = str_replace('{URL:', '{ URL :', $check);
return $check;
}
function
cleanupPOSTandGET() {
if(isset($_POST) && count($_POST)) {
foreach($_POST as $key => $value) {
if(!is_array($_POST[$key])) {
$_POST[$key] = remove_unsecure_rptags($value);
}
}
}
if(isset($_GET) && count($_GET)) {
foreach($_GET as $key => $value) {
$_GET[$key] = remove_unsecure_rptags($value);
}
}
}