2003-12-23 23:09:02 +01:00
|
|
|
<?php
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2010-12-30 19:37:18 +01:00
|
|
|
* kses 0.2.2 - HTML/XHTML filter that only allows some elements and attributes
|
|
|
|
* Copyright (C) 2002, 2003, 2005 Ulf Harnhammar
|
|
|
|
*
|
|
|
|
* This program is free software and open source software; you can redistribute
|
|
|
|
* it and/or modify it under the terms of the GNU General Public License as
|
|
|
|
* published by the Free Software Foundation; either version 2 of the License,
|
|
|
|
* or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
2011-12-14 00:45:31 +01:00
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
2010-12-30 19:37:18 +01:00
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
2011-05-26 00:15:12 +02:00
|
|
|
* 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
2010-12-30 19:37:18 +01:00
|
|
|
* http://www.gnu.org/licenses/gpl.html
|
2011-01-06 05:11:14 +01:00
|
|
|
*
|
2010-12-30 19:37:18 +01:00
|
|
|
* [kses strips evil scripts!]
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* Added wp_ prefix to avoid conflicts with existing kses users
|
|
|
|
*
|
|
|
|
* @version 0.2.2
|
|
|
|
* @copyright (C) 2002, 2003, 2005
|
2010-12-30 21:07:12 +01:00
|
|
|
* @author Ulf Harnhammar <http://advogato.org/person/metaur/>
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @package External
|
|
|
|
* @subpackage KSES
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Specifies the default allowable HTML tags.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* Using `CUSTOM_TAGS` is not recommended and should be considered deprecated. The
|
|
|
|
* {@see 'wp_kses_allowed_html'} filter is more powerful and supplies context.
|
2012-09-10 20:00:41 +02:00
|
|
|
*
|
|
|
|
* @see wp_kses_allowed_html()
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 1.2.0
|
2018-04-28 15:58:21 +02:00
|
|
|
*
|
2021-01-03 23:04:04 +01:00
|
|
|
* @var array[]|false Array of default allowable HTML tags, or false to use the defaults.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! defined( 'CUSTOM_TAGS' ) ) {
|
2010-02-24 08:33:14 +01:00
|
|
|
define( 'CUSTOM_TAGS', false );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2014-06-26 04:14:15 +02:00
|
|
|
// Ensure that these variables are added to the global namespace
|
|
|
|
// (e.g. if using namespaces / autoload in the current PHP environment).
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
global $allowedposttags, $allowedtags, $allowedentitynames, $allowedxmlentitynames;
|
2014-06-26 04:14:15 +02:00
|
|
|
|
2010-02-24 08:33:14 +01:00
|
|
|
if ( ! CUSTOM_TAGS ) {
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* KSES global for default allowable HTML tags.
|
2008-09-06 08:53:45 +02:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* Can be overridden with the `CUSTOM_TAGS` constant.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @var array[] $allowedposttags Array of default allowable HTML tags.
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 2.0.0
|
|
|
|
*/
|
2007-05-02 06:17:43 +02:00
|
|
|
$allowedposttags = array(
|
2017-12-01 00:11:00 +01:00
|
|
|
'address' => array(),
|
|
|
|
'a' => array(
|
2018-12-14 04:28:38 +01:00
|
|
|
'href' => true,
|
|
|
|
'rel' => true,
|
|
|
|
'rev' => true,
|
|
|
|
'name' => true,
|
|
|
|
'target' => true,
|
|
|
|
'download' => array(
|
|
|
|
'valueless' => 'y',
|
|
|
|
),
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'abbr' => array(),
|
|
|
|
'acronym' => array(),
|
|
|
|
'area' => array(
|
|
|
|
'alt' => true,
|
2012-09-10 18:19:54 +02:00
|
|
|
'coords' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'href' => true,
|
2012-09-10 18:19:54 +02:00
|
|
|
'nohref' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'shape' => true,
|
2012-09-10 18:19:54 +02:00
|
|
|
'target' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'article' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'aside' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'audio' => array(
|
2014-10-28 20:36:23 +01:00
|
|
|
'autoplay' => true,
|
|
|
|
'controls' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'loop' => true,
|
|
|
|
'muted' => true,
|
|
|
|
'preload' => true,
|
|
|
|
'src' => true,
|
2014-10-28 20:36:23 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'b' => array(),
|
2022-03-21 01:13:05 +01:00
|
|
|
'bdo' => array(),
|
2017-12-01 00:11:00 +01:00
|
|
|
'big' => array(),
|
2007-05-02 06:26:57 +02:00
|
|
|
'blockquote' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'cite' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'br' => array(),
|
|
|
|
'button' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'disabled' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'name' => true,
|
|
|
|
'type' => true,
|
|
|
|
'value' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'caption' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
|
|
|
),
|
2022-03-21 01:13:05 +01:00
|
|
|
'cite' => array(),
|
2017-12-01 00:11:00 +01:00
|
|
|
'code' => array(),
|
|
|
|
'col' => array(
|
|
|
|
'align' => true,
|
|
|
|
'char' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'charoff' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'span' => true,
|
|
|
|
'valign' => true,
|
|
|
|
'width' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'colgroup' => array(
|
|
|
|
'align' => true,
|
|
|
|
'char' => true,
|
2014-09-12 07:51:17 +02:00
|
|
|
'charoff' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'span' => true,
|
|
|
|
'valign' => true,
|
|
|
|
'width' => true,
|
2014-09-12 07:51:17 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'del' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'datetime' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'dd' => array(),
|
|
|
|
'dfn' => array(),
|
|
|
|
'details' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
|
|
|
'open' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'div' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'dl' => array(),
|
|
|
|
'dt' => array(),
|
|
|
|
'em' => array(),
|
|
|
|
'fieldset' => array(),
|
|
|
|
'figure' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
|
|
|
'figcaption' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'font' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'color' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'face' => true,
|
|
|
|
'size' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'footer' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'h1' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'h2' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'h3' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'h4' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'h5' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'h6' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'header' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'hgroup' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'hr' => array(
|
|
|
|
'align' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'noshade' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'size' => true,
|
|
|
|
'width' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'i' => array(),
|
|
|
|
'img' => array(
|
|
|
|
'alt' => true,
|
|
|
|
'align' => true,
|
|
|
|
'border' => true,
|
|
|
|
'height' => true,
|
|
|
|
'hspace' => true,
|
2020-07-23 02:44:04 +02:00
|
|
|
'loading' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'longdesc' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'vspace' => true,
|
|
|
|
'src' => true,
|
|
|
|
'usemap' => true,
|
|
|
|
'width' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'ins' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'datetime' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'cite' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'kbd' => array(),
|
|
|
|
'label' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'for' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'legend' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'li' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'align' => true,
|
2013-09-16 22:49:10 +02:00
|
|
|
'value' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2021-05-25 19:43:57 +02:00
|
|
|
'main' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2021-05-25 03:43:55 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'map' => array(
|
2012-09-10 18:19:54 +02:00
|
|
|
'name' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'mark' => array(),
|
|
|
|
'menu' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'type' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'nav' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
KSES: Add options for restricting tags based upon their attributes.
This change adds two now attribute-related config options to KSES:
- An array of allowed values can be defined for attributes. If the attribute value doesn't fall into the list, the attribute will be removed from the tag.
- Attributes can be marked as required. If a required attribute is not present, KSES will remove all attributes from the tag. As KSES doesn't match opening and closing tags, it's not possible to safely remove the tag itself, the safest fallback is to strip all attributes from the tag, instead.
Included with this change is an implementation of these options, allowing the `<object>` tag to be stored in posts, but only when it has a `type` attribute set to `application/pdf`.
Props pento, swissspidy, peterwilsoncc, dd32, jorbin.
Fixes #54261.
Built from https://develop.svn.wordpress.org/trunk@51963
git-svn-id: http://core.svn.wordpress.org/trunk@51552 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-11-01 03:13:56 +01:00
|
|
|
'object' => array(
|
2021-12-02 01:56:01 +01:00
|
|
|
'data' => array(
|
|
|
|
'required' => true,
|
|
|
|
'value_callback' => '_wp_kses_allow_pdf_objects',
|
|
|
|
),
|
KSES: Add options for restricting tags based upon their attributes.
This change adds two now attribute-related config options to KSES:
- An array of allowed values can be defined for attributes. If the attribute value doesn't fall into the list, the attribute will be removed from the tag.
- Attributes can be marked as required. If a required attribute is not present, KSES will remove all attributes from the tag. As KSES doesn't match opening and closing tags, it's not possible to safely remove the tag itself, the safest fallback is to strip all attributes from the tag, instead.
Included with this change is an implementation of these options, allowing the `<object>` tag to be stored in posts, but only when it has a `type` attribute set to `application/pdf`.
Props pento, swissspidy, peterwilsoncc, dd32, jorbin.
Fixes #54261.
Built from https://develop.svn.wordpress.org/trunk@51963
git-svn-id: http://core.svn.wordpress.org/trunk@51552 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-11-01 03:13:56 +01:00
|
|
|
'type' => array(
|
|
|
|
'required' => true,
|
|
|
|
'values' => array( 'application/pdf' ),
|
|
|
|
),
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'p' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'pre' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'width' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'q' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'cite' => true,
|
|
|
|
),
|
2022-03-21 01:30:04 +01:00
|
|
|
'rb' => array(),
|
|
|
|
'rp' => array(),
|
|
|
|
'rt' => array(),
|
|
|
|
'rtc' => array(),
|
|
|
|
'ruby' => array(),
|
2017-12-01 00:11:00 +01:00
|
|
|
's' => array(),
|
|
|
|
'samp' => array(),
|
|
|
|
'span' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'section' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'small' => array(),
|
|
|
|
'strike' => array(),
|
|
|
|
'strong' => array(),
|
|
|
|
'sub' => array(),
|
|
|
|
'summary' => array(
|
2022-03-21 01:13:05 +01:00
|
|
|
'align' => true,
|
2010-05-03 22:34:49 +02:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'sup' => array(),
|
|
|
|
'table' => array(
|
|
|
|
'align' => true,
|
|
|
|
'bgcolor' => true,
|
|
|
|
'border' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'cellpadding' => true,
|
|
|
|
'cellspacing' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'rules' => true,
|
|
|
|
'summary' => true,
|
|
|
|
'width' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'tbody' => array(
|
|
|
|
'align' => true,
|
|
|
|
'char' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'charoff' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'valign' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'td' => array(
|
|
|
|
'abbr' => true,
|
|
|
|
'align' => true,
|
|
|
|
'axis' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'bgcolor' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'char' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'charoff' => true,
|
|
|
|
'colspan' => true,
|
|
|
|
'headers' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'height' => true,
|
|
|
|
'nowrap' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'rowspan' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'scope' => true,
|
|
|
|
'valign' => true,
|
|
|
|
'width' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'textarea' => array(
|
|
|
|
'cols' => true,
|
|
|
|
'rows' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'disabled' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'name' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'readonly' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'tfoot' => array(
|
|
|
|
'align' => true,
|
|
|
|
'char' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'charoff' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'valign' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'th' => array(
|
|
|
|
'abbr' => true,
|
|
|
|
'align' => true,
|
|
|
|
'axis' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'bgcolor' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'char' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'charoff' => true,
|
|
|
|
'colspan' => true,
|
|
|
|
'headers' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'height' => true,
|
|
|
|
'nowrap' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'rowspan' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'scope' => true,
|
|
|
|
'valign' => true,
|
|
|
|
'width' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'thead' => array(
|
|
|
|
'align' => true,
|
|
|
|
'char' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'charoff' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'valign' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'title' => array(),
|
|
|
|
'tr' => array(
|
|
|
|
'align' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'bgcolor' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'char' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'charoff' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'valign' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'track' => array(
|
2014-10-28 20:36:23 +01:00
|
|
|
'default' => true,
|
2017-12-01 00:11:00 +01:00
|
|
|
'kind' => true,
|
|
|
|
'label' => true,
|
|
|
|
'src' => true,
|
2014-10-28 20:36:23 +01:00
|
|
|
'srclang' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'tt' => array(),
|
|
|
|
'u' => array(),
|
|
|
|
'ul' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'type' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'ol' => array(
|
|
|
|
'start' => true,
|
|
|
|
'type' => true,
|
2015-12-16 10:54:26 +01:00
|
|
|
'reversed' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'var' => array(),
|
|
|
|
'video' => array(
|
2020-05-21 06:54:11 +02:00
|
|
|
'autoplay' => true,
|
|
|
|
'controls' => true,
|
|
|
|
'height' => true,
|
|
|
|
'loop' => true,
|
|
|
|
'muted' => true,
|
|
|
|
'playsinline' => true,
|
|
|
|
'poster' => true,
|
|
|
|
'preload' => true,
|
|
|
|
'src' => true,
|
|
|
|
'width' => true,
|
2014-10-28 20:36:23 +01:00
|
|
|
),
|
2012-02-21 21:33:44 +01:00
|
|
|
);
|
2008-09-06 08:53:45 +02:00
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* @var array[] $allowedtags Array of KSES allowed HTML elements.
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 1.0.0
|
|
|
|
*/
|
2007-05-02 06:17:43 +02:00
|
|
|
$allowedtags = array(
|
2017-12-01 00:11:00 +01:00
|
|
|
'a' => array(
|
|
|
|
'href' => true,
|
2012-02-21 21:33:44 +01:00
|
|
|
'title' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'abbr' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'title' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'acronym' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'title' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'b' => array(),
|
2007-05-02 06:26:57 +02:00
|
|
|
'blockquote' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'cite' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'cite' => array(),
|
|
|
|
'code' => array(),
|
|
|
|
'del' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'datetime' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'em' => array(),
|
|
|
|
'i' => array(),
|
|
|
|
'q' => array(
|
2012-02-21 21:33:44 +01:00
|
|
|
'cite' => true,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
's' => array(),
|
|
|
|
'strike' => array(),
|
|
|
|
'strong' => array(),
|
2005-01-21 08:53:02 +01:00
|
|
|
);
|
2010-02-24 06:37:20 +01:00
|
|
|
|
2018-04-28 15:58:21 +02:00
|
|
|
/**
|
2021-11-21 18:17:02 +01:00
|
|
|
* @var string[] $allowedentitynames Array of KSES allowed HTML entity names.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @since 1.0.0
|
|
|
|
*/
|
2010-02-24 06:37:20 +01:00
|
|
|
$allowedentitynames = array(
|
2017-12-01 00:11:00 +01:00
|
|
|
'nbsp',
|
|
|
|
'iexcl',
|
|
|
|
'cent',
|
|
|
|
'pound',
|
|
|
|
'curren',
|
|
|
|
'yen',
|
|
|
|
'brvbar',
|
|
|
|
'sect',
|
|
|
|
'uml',
|
|
|
|
'copy',
|
|
|
|
'ordf',
|
|
|
|
'laquo',
|
|
|
|
'not',
|
|
|
|
'shy',
|
|
|
|
'reg',
|
|
|
|
'macr',
|
|
|
|
'deg',
|
|
|
|
'plusmn',
|
|
|
|
'acute',
|
|
|
|
'micro',
|
|
|
|
'para',
|
|
|
|
'middot',
|
|
|
|
'cedil',
|
|
|
|
'ordm',
|
|
|
|
'raquo',
|
|
|
|
'iquest',
|
|
|
|
'Agrave',
|
|
|
|
'Aacute',
|
|
|
|
'Acirc',
|
|
|
|
'Atilde',
|
|
|
|
'Auml',
|
|
|
|
'Aring',
|
|
|
|
'AElig',
|
|
|
|
'Ccedil',
|
|
|
|
'Egrave',
|
|
|
|
'Eacute',
|
|
|
|
'Ecirc',
|
|
|
|
'Euml',
|
|
|
|
'Igrave',
|
|
|
|
'Iacute',
|
|
|
|
'Icirc',
|
|
|
|
'Iuml',
|
|
|
|
'ETH',
|
|
|
|
'Ntilde',
|
|
|
|
'Ograve',
|
|
|
|
'Oacute',
|
|
|
|
'Ocirc',
|
|
|
|
'Otilde',
|
|
|
|
'Ouml',
|
|
|
|
'times',
|
|
|
|
'Oslash',
|
|
|
|
'Ugrave',
|
|
|
|
'Uacute',
|
|
|
|
'Ucirc',
|
|
|
|
'Uuml',
|
|
|
|
'Yacute',
|
|
|
|
'THORN',
|
|
|
|
'szlig',
|
|
|
|
'agrave',
|
|
|
|
'aacute',
|
|
|
|
'acirc',
|
|
|
|
'atilde',
|
|
|
|
'auml',
|
|
|
|
'aring',
|
|
|
|
'aelig',
|
|
|
|
'ccedil',
|
|
|
|
'egrave',
|
|
|
|
'eacute',
|
|
|
|
'ecirc',
|
|
|
|
'euml',
|
|
|
|
'igrave',
|
|
|
|
'iacute',
|
|
|
|
'icirc',
|
|
|
|
'iuml',
|
|
|
|
'eth',
|
|
|
|
'ntilde',
|
|
|
|
'ograve',
|
|
|
|
'oacute',
|
|
|
|
'ocirc',
|
|
|
|
'otilde',
|
|
|
|
'ouml',
|
|
|
|
'divide',
|
|
|
|
'oslash',
|
|
|
|
'ugrave',
|
|
|
|
'uacute',
|
|
|
|
'ucirc',
|
|
|
|
'uuml',
|
|
|
|
'yacute',
|
|
|
|
'thorn',
|
|
|
|
'yuml',
|
|
|
|
'quot',
|
|
|
|
'amp',
|
|
|
|
'lt',
|
|
|
|
'gt',
|
|
|
|
'apos',
|
|
|
|
'OElig',
|
|
|
|
'oelig',
|
|
|
|
'Scaron',
|
|
|
|
'scaron',
|
|
|
|
'Yuml',
|
|
|
|
'circ',
|
|
|
|
'tilde',
|
|
|
|
'ensp',
|
|
|
|
'emsp',
|
|
|
|
'thinsp',
|
|
|
|
'zwnj',
|
|
|
|
'zwj',
|
|
|
|
'lrm',
|
|
|
|
'rlm',
|
|
|
|
'ndash',
|
|
|
|
'mdash',
|
|
|
|
'lsquo',
|
|
|
|
'rsquo',
|
|
|
|
'sbquo',
|
|
|
|
'ldquo',
|
|
|
|
'rdquo',
|
|
|
|
'bdquo',
|
|
|
|
'dagger',
|
|
|
|
'Dagger',
|
|
|
|
'permil',
|
|
|
|
'lsaquo',
|
|
|
|
'rsaquo',
|
|
|
|
'euro',
|
|
|
|
'fnof',
|
|
|
|
'Alpha',
|
|
|
|
'Beta',
|
|
|
|
'Gamma',
|
|
|
|
'Delta',
|
|
|
|
'Epsilon',
|
|
|
|
'Zeta',
|
|
|
|
'Eta',
|
|
|
|
'Theta',
|
|
|
|
'Iota',
|
|
|
|
'Kappa',
|
|
|
|
'Lambda',
|
|
|
|
'Mu',
|
|
|
|
'Nu',
|
|
|
|
'Xi',
|
|
|
|
'Omicron',
|
|
|
|
'Pi',
|
|
|
|
'Rho',
|
|
|
|
'Sigma',
|
|
|
|
'Tau',
|
|
|
|
'Upsilon',
|
|
|
|
'Phi',
|
|
|
|
'Chi',
|
|
|
|
'Psi',
|
|
|
|
'Omega',
|
|
|
|
'alpha',
|
|
|
|
'beta',
|
|
|
|
'gamma',
|
|
|
|
'delta',
|
|
|
|
'epsilon',
|
|
|
|
'zeta',
|
|
|
|
'eta',
|
|
|
|
'theta',
|
|
|
|
'iota',
|
|
|
|
'kappa',
|
|
|
|
'lambda',
|
|
|
|
'mu',
|
|
|
|
'nu',
|
|
|
|
'xi',
|
|
|
|
'omicron',
|
|
|
|
'pi',
|
|
|
|
'rho',
|
|
|
|
'sigmaf',
|
|
|
|
'sigma',
|
|
|
|
'tau',
|
|
|
|
'upsilon',
|
|
|
|
'phi',
|
|
|
|
'chi',
|
|
|
|
'psi',
|
|
|
|
'omega',
|
|
|
|
'thetasym',
|
|
|
|
'upsih',
|
|
|
|
'piv',
|
|
|
|
'bull',
|
|
|
|
'hellip',
|
|
|
|
'prime',
|
|
|
|
'Prime',
|
|
|
|
'oline',
|
|
|
|
'frasl',
|
|
|
|
'weierp',
|
|
|
|
'image',
|
|
|
|
'real',
|
|
|
|
'trade',
|
|
|
|
'alefsym',
|
|
|
|
'larr',
|
|
|
|
'uarr',
|
|
|
|
'rarr',
|
|
|
|
'darr',
|
|
|
|
'harr',
|
|
|
|
'crarr',
|
|
|
|
'lArr',
|
|
|
|
'uArr',
|
|
|
|
'rArr',
|
|
|
|
'dArr',
|
|
|
|
'hArr',
|
|
|
|
'forall',
|
|
|
|
'part',
|
|
|
|
'exist',
|
|
|
|
'empty',
|
|
|
|
'nabla',
|
|
|
|
'isin',
|
|
|
|
'notin',
|
|
|
|
'ni',
|
|
|
|
'prod',
|
|
|
|
'sum',
|
|
|
|
'minus',
|
|
|
|
'lowast',
|
|
|
|
'radic',
|
|
|
|
'prop',
|
|
|
|
'infin',
|
|
|
|
'ang',
|
|
|
|
'and',
|
|
|
|
'or',
|
|
|
|
'cap',
|
|
|
|
'cup',
|
|
|
|
'int',
|
|
|
|
'sim',
|
|
|
|
'cong',
|
|
|
|
'asymp',
|
|
|
|
'ne',
|
|
|
|
'equiv',
|
|
|
|
'le',
|
|
|
|
'ge',
|
|
|
|
'sub',
|
|
|
|
'sup',
|
|
|
|
'nsub',
|
|
|
|
'sube',
|
|
|
|
'supe',
|
|
|
|
'oplus',
|
|
|
|
'otimes',
|
|
|
|
'perp',
|
|
|
|
'sdot',
|
|
|
|
'lceil',
|
|
|
|
'rceil',
|
|
|
|
'lfloor',
|
|
|
|
'rfloor',
|
|
|
|
'lang',
|
|
|
|
'rang',
|
|
|
|
'loz',
|
|
|
|
'spades',
|
|
|
|
'clubs',
|
|
|
|
'hearts',
|
|
|
|
'diams',
|
|
|
|
'sup1',
|
|
|
|
'sup2',
|
|
|
|
'sup3',
|
|
|
|
'frac14',
|
|
|
|
'frac12',
|
|
|
|
'frac34',
|
2013-11-27 23:32:09 +01:00
|
|
|
'there4',
|
2010-02-24 06:37:20 +01:00
|
|
|
);
|
2012-09-10 18:19:54 +02:00
|
|
|
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
/**
|
2021-11-21 18:17:02 +01:00
|
|
|
* @var string[] $allowedxmlentitynames Array of KSES allowed XML entity names.
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
* @since 5.5.0
|
|
|
|
*/
|
2021-11-21 18:17:02 +01:00
|
|
|
$allowedxmlentitynames = array(
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
'amp',
|
|
|
|
'lt',
|
|
|
|
'gt',
|
|
|
|
'apos',
|
|
|
|
'quot',
|
|
|
|
);
|
|
|
|
|
2012-09-10 18:19:54 +02:00
|
|
|
$allowedposttags = array_map( '_wp_add_global_attributes', $allowedposttags );
|
|
|
|
} else {
|
2017-12-01 00:11:00 +01:00
|
|
|
$allowedtags = wp_kses_array_lc( $allowedtags );
|
2012-09-10 18:19:54 +02:00
|
|
|
$allowedposttags = wp_kses_array_lc( $allowedposttags );
|
2004-02-05 15:40:32 +01:00
|
|
|
}
|
2007-05-02 06:17:43 +02:00
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Filters text content and strips out disallowed HTML.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2008-09-06 08:53:45 +02:00
|
|
|
* This function makes sure that only the allowed HTML element names, attribute
|
2018-04-28 15:58:21 +02:00
|
|
|
* names, attribute values, and HTML entities will occur in the given text string.
|
|
|
|
*
|
|
|
|
* This function expects unslashed data.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @see wp_kses_post() for specifically filtering post content and fields.
|
|
|
|
* @see wp_allowed_protocols() for the default allowed protocols in link URLs.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $string Text content to filter.
|
2020-07-14 14:41:03 +02:00
|
|
|
* @param array[]|string $allowed_html An array of allowed HTML elements and attributes,
|
|
|
|
* or a context name such as 'post'. See wp_kses_allowed_html()
|
|
|
|
* for the list of accepted context names.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
|
|
|
* @return string Filtered content containing only the allowed HTML.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2012-09-10 18:19:54 +02:00
|
|
|
function wp_kses( $string, $allowed_html, $allowed_protocols = array() ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( empty( $allowed_protocols ) ) {
|
2011-10-01 17:54:52 +02:00
|
|
|
$allowed_protocols = wp_allowed_protocols();
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2020-07-14 14:41:03 +02:00
|
|
|
|
2015-06-19 20:47:27 +02:00
|
|
|
$string = wp_kses_no_null( $string, array( 'slash_zero' => 'keep' ) );
|
2017-12-01 00:11:00 +01:00
|
|
|
$string = wp_kses_normalize_entities( $string );
|
2018-04-28 15:58:21 +02:00
|
|
|
$string = wp_kses_hook( $string, $allowed_html, $allowed_protocols );
|
2020-07-14 14:41:03 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
return wp_kses_split( $string, $allowed_html, $allowed_protocols );
|
2012-09-10 18:19:54 +02:00
|
|
|
}
|
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Filters one HTML attribute and ensures its value is allowed.
|
2015-07-22 07:15:25 +02:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* This function can escape data in some situations where `wp_kses()` must strip the whole attribute.
|
2015-07-22 07:15:25 +02:00
|
|
|
*
|
|
|
|
* @since 4.2.3
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $string The 'whole' attribute, including name and value.
|
|
|
|
* @param string $element The HTML element name to which the attribute belongs.
|
2015-07-22 07:15:25 +02:00
|
|
|
* @return string Filtered attribute.
|
|
|
|
*/
|
|
|
|
function wp_kses_one_attr( $string, $element ) {
|
2018-12-15 12:18:25 +01:00
|
|
|
$uris = wp_kses_uri_attributes();
|
2017-12-01 00:11:00 +01:00
|
|
|
$allowed_html = wp_kses_allowed_html( 'post' );
|
2015-07-22 07:15:25 +02:00
|
|
|
$allowed_protocols = wp_allowed_protocols();
|
2017-12-01 00:11:00 +01:00
|
|
|
$string = wp_kses_no_null( $string, array( 'slash_zero' => 'keep' ) );
|
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
// Preserve leading and trailing whitespace.
|
|
|
|
$matches = array();
|
2017-12-01 00:11:00 +01:00
|
|
|
preg_match( '/^\s*/', $string, $matches );
|
2015-07-22 07:15:25 +02:00
|
|
|
$lead = $matches[0];
|
2017-12-01 00:11:00 +01:00
|
|
|
preg_match( '/\s*$/', $string, $matches );
|
2015-07-22 07:15:25 +02:00
|
|
|
$trail = $matches[0];
|
|
|
|
if ( empty( $trail ) ) {
|
|
|
|
$string = substr( $string, strlen( $lead ) );
|
|
|
|
} else {
|
|
|
|
$string = substr( $string, strlen( $lead ), -strlen( $trail ) );
|
|
|
|
}
|
2017-12-01 00:11:00 +01:00
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
// Parse attribute name and value from input.
|
|
|
|
$split = preg_split( '/\s*=\s*/', $string, 2 );
|
2017-12-01 00:11:00 +01:00
|
|
|
$name = $split[0];
|
2015-07-22 07:15:25 +02:00
|
|
|
if ( count( $split ) == 2 ) {
|
|
|
|
$value = $split[1];
|
|
|
|
|
|
|
|
// Remove quotes surrounding $value.
|
|
|
|
// Also guarantee correct quoting in $string for this one attribute.
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( '' === $value ) {
|
2015-07-22 07:15:25 +02:00
|
|
|
$quote = '';
|
|
|
|
} else {
|
|
|
|
$quote = $value[0];
|
|
|
|
}
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( '"' === $quote || "'" === $quote ) {
|
2015-07-22 07:15:25 +02:00
|
|
|
if ( substr( $value, -1 ) != $quote ) {
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
$value = substr( $value, 1, -1 );
|
|
|
|
} else {
|
|
|
|
$quote = '"';
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sanitize quotes, angle braces, and entities.
|
|
|
|
$value = esc_attr( $value );
|
|
|
|
|
|
|
|
// Sanitize URI values.
|
2020-04-05 05:02:11 +02:00
|
|
|
if ( in_array( strtolower( $name ), $uris, true ) ) {
|
2015-07-22 07:15:25 +02:00
|
|
|
$value = wp_kses_bad_protocol( $value, $allowed_protocols );
|
|
|
|
}
|
|
|
|
|
|
|
|
$string = "$name=$quote$value$quote";
|
2017-12-01 00:11:00 +01:00
|
|
|
$vless = 'n';
|
2015-07-22 07:15:25 +02:00
|
|
|
} else {
|
|
|
|
$value = '';
|
|
|
|
$vless = 'y';
|
|
|
|
}
|
2017-12-01 00:11:00 +01:00
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
// Sanitize attribute by name.
|
|
|
|
wp_kses_attr_check( $name, $value, $string, $vless, $element, $allowed_html );
|
|
|
|
|
|
|
|
// Restore whitespace.
|
|
|
|
return $lead . $string . $trail;
|
|
|
|
}
|
|
|
|
|
2012-09-10 18:19:54 +02:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Returns an array of allowed HTML tags and attributes for a given context.
|
2012-09-10 18:19:54 +02:00
|
|
|
*
|
|
|
|
* @since 3.5.0
|
2018-12-18 17:46:48 +01:00
|
|
|
* @since 5.0.1 `form` removed as allowable HTML tag.
|
2012-09-10 18:19:54 +02:00
|
|
|
*
|
2015-05-26 20:06:24 +02:00
|
|
|
* @global array $allowedposttags
|
|
|
|
* @global array $allowedtags
|
|
|
|
* @global array $allowedentitynames
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string|array $context The context for which to retrieve tags. Allowed values are 'post',
|
|
|
|
* 'strip', 'data', 'entities', or the name of a field filter such as
|
2021-08-26 21:28:57 +02:00
|
|
|
* 'pre_user_description', or an array of allowed HTML elements and attributes.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @return array Array of allowed HTML tags and their allowed attributes.
|
2012-09-10 18:19:54 +02:00
|
|
|
*/
|
|
|
|
function wp_kses_allowed_html( $context = '' ) {
|
|
|
|
global $allowedposttags, $allowedtags, $allowedentitynames;
|
|
|
|
|
2014-03-26 15:57:15 +01:00
|
|
|
if ( is_array( $context ) ) {
|
2021-08-26 21:28:57 +02:00
|
|
|
// When `$context` is an array it's actually an array of allowed HTML elements and attributes.
|
|
|
|
$html = $context;
|
|
|
|
$context = 'explicit';
|
|
|
|
|
2014-03-26 15:57:15 +01:00
|
|
|
/**
|
2021-07-01 23:12:58 +02:00
|
|
|
* Filters the HTML tags that are allowed for a given context.
|
2014-03-26 15:57:15 +01:00
|
|
|
*
|
|
|
|
* @since 3.5.0
|
|
|
|
*
|
2021-08-26 21:28:57 +02:00
|
|
|
* @param array[] $html Allowed HTML tags.
|
|
|
|
* @param string $context Context name.
|
2014-03-26 15:57:15 +01:00
|
|
|
*/
|
2021-08-26 21:28:57 +02:00
|
|
|
return apply_filters( 'wp_kses_allowed_html', $html, $context );
|
2014-03-26 15:57:15 +01:00
|
|
|
}
|
2012-09-10 18:19:54 +02:00
|
|
|
|
|
|
|
switch ( $context ) {
|
|
|
|
case 'post':
|
2014-03-26 15:57:15 +01:00
|
|
|
/** This filter is documented in wp-includes/kses.php */
|
2018-12-18 17:46:48 +01:00
|
|
|
$tags = apply_filters( 'wp_kses_allowed_html', $allowedposttags, $context );
|
|
|
|
|
|
|
|
// 5.0.1 removed the `<form>` tag, allow it if a filter is allowing it's sub-elements `<input>` or `<select>`.
|
|
|
|
if ( ! CUSTOM_TAGS && ! isset( $tags['form'] ) && ( isset( $tags['input'] ) || isset( $tags['select'] ) ) ) {
|
|
|
|
$tags = $allowedposttags;
|
|
|
|
|
|
|
|
$tags['form'] = array(
|
2018-12-18 17:58:48 +01:00
|
|
|
'action' => true,
|
|
|
|
'accept' => true,
|
2018-12-18 17:46:48 +01:00
|
|
|
'accept-charset' => true,
|
2018-12-18 17:58:48 +01:00
|
|
|
'enctype' => true,
|
|
|
|
'method' => true,
|
|
|
|
'name' => true,
|
|
|
|
'target' => true,
|
2018-12-18 17:46:48 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
/** This filter is documented in wp-includes/kses.php */
|
|
|
|
$tags = apply_filters( 'wp_kses_allowed_html', $tags, $context );
|
|
|
|
}
|
|
|
|
|
|
|
|
return $tags;
|
2015-01-08 22:15:22 +01:00
|
|
|
|
2012-09-10 18:19:54 +02:00
|
|
|
case 'user_description':
|
|
|
|
case 'pre_user_description':
|
2017-12-01 00:11:00 +01:00
|
|
|
$tags = $allowedtags;
|
2012-09-10 18:19:54 +02:00
|
|
|
$tags['a']['rel'] = true;
|
2014-03-26 15:57:15 +01:00
|
|
|
/** This filter is documented in wp-includes/kses.php */
|
2012-09-10 18:19:54 +02:00
|
|
|
return apply_filters( 'wp_kses_allowed_html', $tags, $context );
|
2015-01-08 22:15:22 +01:00
|
|
|
|
2012-09-10 18:19:54 +02:00
|
|
|
case 'strip':
|
2014-03-26 15:57:15 +01:00
|
|
|
/** This filter is documented in wp-includes/kses.php */
|
2012-09-10 18:19:54 +02:00
|
|
|
return apply_filters( 'wp_kses_allowed_html', array(), $context );
|
2015-01-08 22:15:22 +01:00
|
|
|
|
2012-09-10 18:19:54 +02:00
|
|
|
case 'entities':
|
2014-03-26 15:57:15 +01:00
|
|
|
/** This filter is documented in wp-includes/kses.php */
|
2017-12-01 00:11:00 +01:00
|
|
|
return apply_filters( 'wp_kses_allowed_html', $allowedentitynames, $context );
|
2015-01-08 22:15:22 +01:00
|
|
|
|
2012-09-10 18:19:54 +02:00
|
|
|
case 'data':
|
|
|
|
default:
|
2014-03-26 15:57:15 +01:00
|
|
|
/** This filter is documented in wp-includes/kses.php */
|
2012-09-10 18:19:54 +02:00
|
|
|
return apply_filters( 'wp_kses_allowed_html', $allowedtags, $context );
|
|
|
|
}
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* You add any KSES hooks here.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* There is currently only one KSES WordPress hook, {@see 'pre_kses'}, and it is called here.
|
2016-05-23 21:01:27 +02:00
|
|
|
* All parameters are passed to the hooks and expected to receive a string.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2020-07-14 14:41:03 +02:00
|
|
|
* @param string $string Content to filter through KSES.
|
|
|
|
* @param array[]|string $allowed_html An array of allowed HTML elements and attributes,
|
|
|
|
* or a context name such as 'post'. See wp_kses_allowed_html()
|
|
|
|
* for the list of accepted context names.
|
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
2016-05-23 21:01:27 +02:00
|
|
|
* @return string Filtered content through {@see 'pre_kses'} hook.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2012-09-10 18:19:54 +02:00
|
|
|
function wp_kses_hook( $string, $allowed_html, $allowed_protocols ) {
|
2014-03-26 15:57:15 +01:00
|
|
|
/**
|
2020-07-14 14:41:03 +02:00
|
|
|
* Filters content to be run through KSES.
|
2014-03-26 15:57:15 +01:00
|
|
|
*
|
|
|
|
* @since 2.3.0
|
|
|
|
*
|
2020-07-14 14:41:03 +02:00
|
|
|
* @param string $string Content to filter through KSES.
|
|
|
|
* @param array[]|string $allowed_html An array of allowed HTML elements and attributes,
|
|
|
|
* or a context name such as 'post'. See wp_kses_allowed_html()
|
|
|
|
* for the list of accepted context names.
|
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
2014-03-26 15:57:15 +01:00
|
|
|
*/
|
2015-05-26 20:06:24 +02:00
|
|
|
return apply_filters( 'pre_kses', $string, $allowed_html, $allowed_protocols );
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Returns the version number of KSES.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @return string KSES version number.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
|
|
|
function wp_kses_version() {
|
2005-09-21 00:18:47 +02:00
|
|
|
return '0.2.2';
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2008-09-06 08:53:45 +02:00
|
|
|
* Searches for HTML tags, no matter how malformed.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* It also matches stray `>` characters.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2020-07-14 14:41:03 +02:00
|
|
|
* @global array[]|string $pass_allowed_html An array of allowed HTML elements and attributes,
|
|
|
|
* or a context name such as 'post'.
|
|
|
|
* @global string[] $pass_allowed_protocols Array of allowed URL protocols.
|
2015-05-26 20:06:24 +02:00
|
|
|
*
|
2020-07-14 14:41:03 +02:00
|
|
|
* @param string $string Content to filter.
|
|
|
|
* @param array[]|string $allowed_html An array of allowed HTML elements and attributes,
|
|
|
|
* or a context name such as 'post'. See wp_kses_allowed_html()
|
|
|
|
* for the list of accepted context names.
|
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
2008-01-16 20:15:07 +01:00
|
|
|
* @return string Content with fixed HTML tags
|
|
|
|
*/
|
2012-09-10 18:19:54 +02:00
|
|
|
function wp_kses_split( $string, $allowed_html, $allowed_protocols ) {
|
2009-01-09 20:29:35 +01:00
|
|
|
global $pass_allowed_html, $pass_allowed_protocols;
|
2020-07-14 14:41:03 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$pass_allowed_html = $allowed_html;
|
2009-01-09 20:29:35 +01:00
|
|
|
$pass_allowed_protocols = $allowed_protocols;
|
2020-07-14 14:41:03 +02:00
|
|
|
|
2011-04-27 23:50:39 +02:00
|
|
|
return preg_replace_callback( '%(<!--.*?(-->|$))|(<[^>]*(>|$)|>)%', '_wp_kses_split_callback', $string );
|
2010-11-11 23:50:36 +01:00
|
|
|
}
|
|
|
|
|
2018-12-15 12:18:25 +01:00
|
|
|
/**
|
2019-11-05 22:23:02 +01:00
|
|
|
* Returns an array of HTML attribute names whose value contains a URL.
|
2018-12-15 12:18:25 +01:00
|
|
|
*
|
|
|
|
* This function returns a list of all HTML attributes that must contain
|
|
|
|
* a URL according to the HTML specification.
|
|
|
|
*
|
|
|
|
* This list includes URI attributes both allowed and disallowed by KSES.
|
|
|
|
*
|
|
|
|
* @link https://developer.mozilla.org/en-US/docs/Web/HTML/Attributes
|
|
|
|
*
|
|
|
|
* @since 5.0.1
|
|
|
|
*
|
2019-11-05 22:23:02 +01:00
|
|
|
* @return string[] HTML attribute names whose value contains a URL.
|
2018-12-15 12:18:25 +01:00
|
|
|
*/
|
|
|
|
function wp_kses_uri_attributes() {
|
|
|
|
$uri_attributes = array(
|
|
|
|
'action',
|
|
|
|
'archive',
|
|
|
|
'background',
|
|
|
|
'cite',
|
|
|
|
'classid',
|
|
|
|
'codebase',
|
|
|
|
'data',
|
|
|
|
'formaction',
|
|
|
|
'href',
|
|
|
|
'icon',
|
|
|
|
'longdesc',
|
|
|
|
'manifest',
|
|
|
|
'poster',
|
|
|
|
'profile',
|
|
|
|
'src',
|
|
|
|
'usemap',
|
|
|
|
'xmlns',
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Filters the list of attributes that are required to contain a URL.
|
|
|
|
*
|
|
|
|
* Use this filter to add any `data-` attributes that are required to be
|
|
|
|
* validated as a URL.
|
|
|
|
*
|
|
|
|
* @since 5.0.1
|
|
|
|
*
|
2019-11-05 22:23:02 +01:00
|
|
|
* @param string[] $uri_attributes HTML attribute names whose value contains a URL.
|
2018-12-15 12:18:25 +01:00
|
|
|
*/
|
|
|
|
$uri_attributes = apply_filters( 'wp_kses_uri_attributes', $uri_attributes );
|
|
|
|
|
|
|
|
return $uri_attributes;
|
|
|
|
}
|
|
|
|
|
2010-11-11 23:50:36 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Callback for `wp_kses_split()`.
|
2010-11-11 23:50:36 +01:00
|
|
|
*
|
|
|
|
* @since 3.1.0
|
|
|
|
* @access private
|
2018-04-28 15:58:21 +02:00
|
|
|
* @ignore
|
2015-05-26 20:06:24 +02:00
|
|
|
*
|
2020-07-14 14:41:03 +02:00
|
|
|
* @global array[]|string $pass_allowed_html An array of allowed HTML elements and attributes,
|
|
|
|
* or a context name such as 'post'.
|
|
|
|
* @global string[] $pass_allowed_protocols Array of allowed URL protocols.
|
2015-05-26 20:06:24 +02:00
|
|
|
*
|
2021-07-01 23:12:58 +02:00
|
|
|
* @param array $match preg_replace regexp matches
|
2015-05-26 20:06:24 +02:00
|
|
|
* @return string
|
2010-11-11 23:50:36 +01:00
|
|
|
*/
|
|
|
|
function _wp_kses_split_callback( $match ) {
|
|
|
|
global $pass_allowed_html, $pass_allowed_protocols;
|
2020-07-14 14:41:03 +02:00
|
|
|
|
2011-04-27 23:50:39 +02:00
|
|
|
return wp_kses_split2( $match[0], $pass_allowed_html, $pass_allowed_protocols );
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Callback for `wp_kses_split()` for fixing malformed HTML tags.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2008-09-06 08:53:45 +02:00
|
|
|
* This function does a lot of work. It rejects some very malformed things like
|
2018-04-28 15:58:21 +02:00
|
|
|
* `<:::>`. It returns an empty string, if the element isn't allowed (look ma, no
|
|
|
|
* `strip_tags()`!). Otherwise it splits the tag into an element and an attribute
|
2008-09-06 08:53:45 +02:00
|
|
|
* list.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* After the tag is split into an element and an attribute list, it is run
|
2008-09-06 08:53:45 +02:00
|
|
|
* through another filter which will remove illegal attributes and once that is
|
|
|
|
* completed, will be returned.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2008-07-23 10:36:15 +02:00
|
|
|
* @access private
|
2018-04-28 15:58:21 +02:00
|
|
|
* @ignore
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2020-07-14 14:41:03 +02:00
|
|
|
* @param string $string Content to filter.
|
|
|
|
* @param array[]|string $allowed_html An array of allowed HTML elements and attributes,
|
|
|
|
* or a context name such as 'post'. See wp_kses_allowed_html()
|
|
|
|
* for the list of accepted context names.
|
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
2008-01-16 20:15:07 +01:00
|
|
|
* @return string Fixed HTML element
|
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_split2( $string, $allowed_html, $allowed_protocols ) {
|
|
|
|
$string = wp_kses_stripslashes( $string );
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2018-02-14 12:46:33 +01:00
|
|
|
// It matched a ">" character.
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( '<' !== substr( $string, 0, 1 ) ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
return '>';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2018-02-14 12:46:33 +01:00
|
|
|
// Allow HTML comments.
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( '<!--' === substr( $string, 0, 4 ) ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$string = str_replace( array( '<!--', '-->' ), '', $string );
|
2020-02-09 17:55:09 +01:00
|
|
|
while ( ( $newstring = wp_kses( $string, $allowed_html, $allowed_protocols ) ) != $string ) {
|
2006-01-10 02:27:36 +01:00
|
|
|
$string = $newstring;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( '' === $string ) {
|
2006-01-13 08:28:47 +01:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2020-01-29 01:45:18 +01:00
|
|
|
// Prevent multiple dashes in comments.
|
2017-12-01 00:11:00 +01:00
|
|
|
$string = preg_replace( '/--+/', '-', $string );
|
2020-01-29 01:45:18 +01:00
|
|
|
// Prevent three dashes closing a comment.
|
2017-12-01 00:11:00 +01:00
|
|
|
$string = preg_replace( '/-$/', '', $string );
|
2006-01-10 02:27:36 +01:00
|
|
|
return "<!--{$string}-->";
|
|
|
|
}
|
2006-01-10 00:49:56 +01:00
|
|
|
|
2018-02-14 12:46:33 +01:00
|
|
|
// It's seriously malformed.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! preg_match( '%^<\s*(/\s*)?([a-zA-Z0-9-]+)([^>]*)>?$%', $string, $matches ) ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$slash = trim( $matches[1] );
|
|
|
|
$elem = $matches[2];
|
2005-09-21 00:18:47 +02:00
|
|
|
$attrlist = $matches[3];
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! is_array( $allowed_html ) ) {
|
2012-09-10 18:19:54 +02:00
|
|
|
$allowed_html = wp_kses_allowed_html( $allowed_html );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-09-10 18:19:54 +02:00
|
|
|
|
2018-02-14 12:46:33 +01:00
|
|
|
// They are using a not allowed HTML element.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! isset( $allowed_html[ strtolower( $elem ) ] ) ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2018-02-14 12:46:33 +01:00
|
|
|
// No attributes are allowed for closing elements.
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( '' !== $slash ) {
|
2011-04-27 23:50:39 +02:00
|
|
|
return "</$elem>";
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2011-04-27 23:50:39 +02:00
|
|
|
return wp_kses_attr( $elem, $attrlist, $allowed_html, $allowed_protocols );
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2008-09-06 08:53:45 +02:00
|
|
|
* Removes all attributes, if none are allowed for this element.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* If some are allowed it calls `wp_kses_hair()` to split them further, and then
|
2022-02-08 17:25:01 +01:00
|
|
|
* it builds up new HTML code from the data that `wp_kses_hair()` returns. It also
|
2018-04-28 15:58:21 +02:00
|
|
|
* removes `<` and `>` characters, if there are any left. One more thing it does
|
2008-09-06 08:53:45 +02:00
|
|
|
* is to check if the tag has a closing XHTML slash, and if it does, it puts one
|
|
|
|
* in the returned code as well.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2021-11-23 19:39:00 +01:00
|
|
|
* An array of allowed values can be defined for attributes. If the attribute value
|
|
|
|
* doesn't fall into the list, the attribute will be removed from the tag.
|
|
|
|
*
|
|
|
|
* Attributes can be marked as required. If a required attribute is not present,
|
|
|
|
* KSES will remove all attributes from the tag. As KSES doesn't match opening and
|
|
|
|
* closing tags, it's not possible to safely remove the tag itself, the safest
|
|
|
|
* fallback is to strip all attributes from the tag, instead.
|
|
|
|
*
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 1.0.0
|
2021-11-23 19:39:00 +01:00
|
|
|
* @since 5.9.0 Added support for an array of allowed values for attributes.
|
|
|
|
* Added support for required attributes.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2020-07-14 14:41:03 +02:00
|
|
|
* @param string $element HTML element/tag.
|
|
|
|
* @param string $attr HTML attributes from HTML element to closing HTML element tag.
|
|
|
|
* @param array[]|string $allowed_html An array of allowed HTML elements and attributes,
|
|
|
|
* or a context name such as 'post'. See wp_kses_allowed_html()
|
|
|
|
* for the list of accepted context names.
|
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @return string Sanitized HTML element.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_attr( $element, $attr, $allowed_html, $allowed_protocols ) {
|
|
|
|
if ( ! is_array( $allowed_html ) ) {
|
2012-09-10 18:19:54 +02:00
|
|
|
$allowed_html = wp_kses_allowed_html( $allowed_html );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-09-10 18:19:54 +02:00
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
// Is there a closing XHTML slash at the end of the attributes?
|
2005-09-21 00:18:47 +02:00
|
|
|
$xhtml_slash = '';
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( preg_match( '%\s*/\s*$%', $attr ) ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$xhtml_slash = ' /';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2015-01-08 06:52:24 +01:00
|
|
|
// Are any attributes allowed at all for this element?
|
2018-03-20 22:35:31 +01:00
|
|
|
$element_low = strtolower( $element );
|
|
|
|
if ( empty( $allowed_html[ $element_low ] ) || true === $allowed_html[ $element_low ] ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
return "<$element$xhtml_slash>";
|
2017-05-11 21:23:43 +02:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Split it.
|
2017-12-01 00:11:00 +01:00
|
|
|
$attrarr = wp_kses_hair( $attr, $allowed_protocols );
|
2003-12-23 23:09:02 +01:00
|
|
|
|
KSES: Add options for restricting tags based upon their attributes.
This change adds two now attribute-related config options to KSES:
- An array of allowed values can be defined for attributes. If the attribute value doesn't fall into the list, the attribute will be removed from the tag.
- Attributes can be marked as required. If a required attribute is not present, KSES will remove all attributes from the tag. As KSES doesn't match opening and closing tags, it's not possible to safely remove the tag itself, the safest fallback is to strip all attributes from the tag, instead.
Included with this change is an implementation of these options, allowing the `<object>` tag to be stored in posts, but only when it has a `type` attribute set to `application/pdf`.
Props pento, swissspidy, peterwilsoncc, dd32, jorbin.
Fixes #54261.
Built from https://develop.svn.wordpress.org/trunk@51963
git-svn-id: http://core.svn.wordpress.org/trunk@51552 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-11-01 03:13:56 +01:00
|
|
|
// Check if there are attributes that are required.
|
|
|
|
$required_attrs = array_filter(
|
|
|
|
$allowed_html[ $element_low ],
|
|
|
|
function( $required_attr_limits ) {
|
|
|
|
return isset( $required_attr_limits['required'] ) && true === $required_attr_limits['required'];
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
2021-11-23 19:39:00 +01:00
|
|
|
/*
|
|
|
|
* If a required attribute check fails, we can return nothing for a self-closing tag,
|
|
|
|
* but for a non-self-closing tag the best option is to return the element with attributes,
|
|
|
|
* as KSES doesn't handle matching the relevant closing tag.
|
|
|
|
*/
|
KSES: Add options for restricting tags based upon their attributes.
This change adds two now attribute-related config options to KSES:
- An array of allowed values can be defined for attributes. If the attribute value doesn't fall into the list, the attribute will be removed from the tag.
- Attributes can be marked as required. If a required attribute is not present, KSES will remove all attributes from the tag. As KSES doesn't match opening and closing tags, it's not possible to safely remove the tag itself, the safest fallback is to strip all attributes from the tag, instead.
Included with this change is an implementation of these options, allowing the `<object>` tag to be stored in posts, but only when it has a `type` attribute set to `application/pdf`.
Props pento, swissspidy, peterwilsoncc, dd32, jorbin.
Fixes #54261.
Built from https://develop.svn.wordpress.org/trunk@51963
git-svn-id: http://core.svn.wordpress.org/trunk@51552 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-11-01 03:13:56 +01:00
|
|
|
$stripped_tag = '';
|
|
|
|
if ( empty( $xhtml_slash ) ) {
|
|
|
|
$stripped_tag = "<$element>";
|
|
|
|
}
|
|
|
|
|
2021-11-23 19:39:00 +01:00
|
|
|
// Go through $attrarr, and save the allowed attributes for this element in $attr2.
|
2005-09-21 00:18:47 +02:00
|
|
|
$attr2 = '';
|
2015-07-22 07:15:25 +02:00
|
|
|
foreach ( $attrarr as $arreach ) {
|
KSES: Add options for restricting tags based upon their attributes.
This change adds two now attribute-related config options to KSES:
- An array of allowed values can be defined for attributes. If the attribute value doesn't fall into the list, the attribute will be removed from the tag.
- Attributes can be marked as required. If a required attribute is not present, KSES will remove all attributes from the tag. As KSES doesn't match opening and closing tags, it's not possible to safely remove the tag itself, the safest fallback is to strip all attributes from the tag, instead.
Included with this change is an implementation of these options, allowing the `<object>` tag to be stored in posts, but only when it has a `type` attribute set to `application/pdf`.
Props pento, swissspidy, peterwilsoncc, dd32, jorbin.
Fixes #54261.
Built from https://develop.svn.wordpress.org/trunk@51963
git-svn-id: http://core.svn.wordpress.org/trunk@51552 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-11-01 03:13:56 +01:00
|
|
|
// Check if this attribute is required.
|
|
|
|
$required = isset( $required_attrs[ strtolower( $arreach['name'] ) ] );
|
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
if ( wp_kses_attr_check( $arreach['name'], $arreach['value'], $arreach['whole'], $arreach['vless'], $element, $allowed_html ) ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$attr2 .= ' ' . $arreach['whole'];
|
KSES: Add options for restricting tags based upon their attributes.
This change adds two now attribute-related config options to KSES:
- An array of allowed values can be defined for attributes. If the attribute value doesn't fall into the list, the attribute will be removed from the tag.
- Attributes can be marked as required. If a required attribute is not present, KSES will remove all attributes from the tag. As KSES doesn't match opening and closing tags, it's not possible to safely remove the tag itself, the safest fallback is to strip all attributes from the tag, instead.
Included with this change is an implementation of these options, allowing the `<object>` tag to be stored in posts, but only when it has a `type` attribute set to `application/pdf`.
Props pento, swissspidy, peterwilsoncc, dd32, jorbin.
Fixes #54261.
Built from https://develop.svn.wordpress.org/trunk@51963
git-svn-id: http://core.svn.wordpress.org/trunk@51552 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-11-01 03:13:56 +01:00
|
|
|
|
|
|
|
// If this was a required attribute, we can mark it as found.
|
|
|
|
if ( $required ) {
|
|
|
|
unset( $required_attrs[ strtolower( $arreach['name'] ) ] );
|
|
|
|
}
|
|
|
|
} elseif ( $required ) {
|
|
|
|
// This attribute was required, but didn't pass the check. The entire tag is not allowed.
|
|
|
|
return $stripped_tag;
|
2015-07-22 07:15:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
KSES: Add options for restricting tags based upon their attributes.
This change adds two now attribute-related config options to KSES:
- An array of allowed values can be defined for attributes. If the attribute value doesn't fall into the list, the attribute will be removed from the tag.
- Attributes can be marked as required. If a required attribute is not present, KSES will remove all attributes from the tag. As KSES doesn't match opening and closing tags, it's not possible to safely remove the tag itself, the safest fallback is to strip all attributes from the tag, instead.
Included with this change is an implementation of these options, allowing the `<object>` tag to be stored in posts, but only when it has a `type` attribute set to `application/pdf`.
Props pento, swissspidy, peterwilsoncc, dd32, jorbin.
Fixes #54261.
Built from https://develop.svn.wordpress.org/trunk@51963
git-svn-id: http://core.svn.wordpress.org/trunk@51552 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-11-01 03:13:56 +01:00
|
|
|
// If some required attributes weren't set, the entire tag is not allowed.
|
|
|
|
if ( ! empty( $required_attrs ) ) {
|
|
|
|
return $stripped_tag;
|
|
|
|
}
|
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Remove any "<" or ">" characters.
|
2017-12-01 00:11:00 +01:00
|
|
|
$attr2 = preg_replace( '/[<>]/', '', $attr2 );
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
return "<$element$attr2$xhtml_slash>";
|
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Determines whether an attribute is allowed.
|
2015-07-22 07:15:25 +02:00
|
|
|
*
|
|
|
|
* @since 4.2.3
|
2022-03-21 01:13:05 +01:00
|
|
|
* @since 5.0.0 Added support for `data-*` wildcard attributes.
|
2015-07-22 07:15:25 +02:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $name The attribute name. Passed by reference. Returns empty string when not allowed.
|
|
|
|
* @param string $value The attribute value. Passed by reference. Returns a filtered value.
|
|
|
|
* @param string $whole The `name=value` input. Passed by reference. Returns filtered input.
|
|
|
|
* @param string $vless Whether the attribute is valueless. Use 'y' or 'n'.
|
|
|
|
* @param string $element The name of the element to which this attribute belongs.
|
|
|
|
* @param array $allowed_html The full list of allowed elements and attributes.
|
|
|
|
* @return bool Whether or not the attribute is allowed.
|
2015-07-22 07:15:25 +02:00
|
|
|
*/
|
|
|
|
function wp_kses_attr_check( &$name, &$value, &$whole, $vless, $element, $allowed_html ) {
|
2019-12-14 16:53:06 +01:00
|
|
|
$name_low = strtolower( $name );
|
|
|
|
$element_low = strtolower( $element );
|
|
|
|
|
|
|
|
if ( ! isset( $allowed_html[ $element_low ] ) ) {
|
|
|
|
$name = '';
|
|
|
|
$value = '';
|
|
|
|
$whole = '';
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$allowed_attr = $allowed_html[ $element_low ];
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( ! isset( $allowed_attr[ $name_low ] ) || '' === $allowed_attr[ $name_low ] ) {
|
2018-12-12 03:39:25 +01:00
|
|
|
/*
|
|
|
|
* Allow `data-*` attributes.
|
|
|
|
*
|
|
|
|
* When specifying `$allowed_html`, the attribute name should be set as
|
|
|
|
* `data-*` (not to be mixed with the HTML 4.0 `data` attribute, see
|
|
|
|
* https://www.w3.org/TR/html40/struct/objects.html#adef-data).
|
|
|
|
*
|
|
|
|
* Note: the attribute name should only contain `A-Za-z0-9_-` chars,
|
|
|
|
* double hyphens `--` are not accepted by WordPress.
|
|
|
|
*/
|
2022-03-21 01:13:05 +01:00
|
|
|
if ( strpos( $name_low, 'data-' ) === 0 && ! empty( $allowed_attr['data-*'] )
|
|
|
|
&& preg_match( '/^data(?:-[a-z0-9_]+)+$/', $name_low, $match )
|
|
|
|
) {
|
2018-12-12 03:39:25 +01:00
|
|
|
/*
|
|
|
|
* Add the whole attribute name to the allowed attributes and set any restrictions
|
|
|
|
* for the `data-*` attribute values for the current element.
|
|
|
|
*/
|
|
|
|
$allowed_attr[ $match[0] ] = $allowed_attr['data-*'];
|
|
|
|
} else {
|
2019-07-03 01:42:58 +02:00
|
|
|
$name = '';
|
|
|
|
$value = '';
|
|
|
|
$whole = '';
|
2018-12-12 03:39:25 +01:00
|
|
|
return false;
|
|
|
|
}
|
2015-07-22 07:15:25 +02:00
|
|
|
}
|
2012-02-21 21:33:44 +01:00
|
|
|
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( 'style' === $name_low ) {
|
2015-07-22 07:15:25 +02:00
|
|
|
$new_value = safecss_filter_attr( $value );
|
2012-02-21 21:33:44 +01:00
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
if ( empty( $new_value ) ) {
|
2019-07-03 01:42:58 +02:00
|
|
|
$name = '';
|
|
|
|
$value = '';
|
|
|
|
$whole = '';
|
2015-07-22 07:15:25 +02:00
|
|
|
return false;
|
2012-02-21 21:33:44 +01:00
|
|
|
}
|
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
$whole = str_replace( $value, $new_value, $whole );
|
|
|
|
$value = $new_value;
|
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( is_array( $allowed_attr[ $name_low ] ) ) {
|
2020-01-29 01:45:18 +01:00
|
|
|
// There are some checks.
|
2017-12-01 00:11:00 +01:00
|
|
|
foreach ( $allowed_attr[ $name_low ] as $currkey => $currval ) {
|
2015-07-22 07:15:25 +02:00
|
|
|
if ( ! wp_kses_check_attr_val( $value, $vless, $currkey, $currval ) ) {
|
2019-07-03 01:42:58 +02:00
|
|
|
$name = '';
|
|
|
|
$value = '';
|
|
|
|
$whole = '';
|
2015-07-22 07:15:25 +02:00
|
|
|
return false;
|
2011-04-27 23:50:39 +02:00
|
|
|
}
|
2015-07-22 07:15:25 +02:00
|
|
|
}
|
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
return true;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2008-09-06 08:53:45 +02:00
|
|
|
* Builds an attribute list from string containing attributes.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* This function does a lot of work. It parses an attribute list into an array
|
|
|
|
* with attribute data, and tries to do the right thing even if it gets weird
|
|
|
|
* input. It will add quotes around attribute values that don't have any quotes
|
|
|
|
* or apostrophes around them, to make it easier to produce HTML code that will
|
|
|
|
* conform to W3C's HTML specification. It will also remove bad URL protocols
|
2011-12-14 00:45:31 +01:00
|
|
|
* from attribute values. It also reduces duplicate attributes by using the
|
2018-04-28 15:58:21 +02:00
|
|
|
* attribute defined first (`foo='bar' foo='baz'` will result in `foo='bar'`).
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $attr Attribute list from HTML element to closing HTML element tag.
|
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
|
|
|
* @return array[] Array of attribute information after parsing.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_hair( $attr, $allowed_protocols ) {
|
|
|
|
$attrarr = array();
|
|
|
|
$mode = 0;
|
2005-09-21 00:18:47 +02:00
|
|
|
$attrname = '';
|
2018-12-15 12:18:25 +01:00
|
|
|
$uris = wp_kses_uri_attributes();
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Loop through the whole attribute list.
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
while ( strlen( $attr ) != 0 ) {
|
2015-01-08 06:52:24 +01:00
|
|
|
$working = 0; // Was the last operation successful?
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
switch ( $mode ) {
|
|
|
|
case 0:
|
Formatting: Extend `wp_kses_hair` and `wp_kses_hair_parse` to allow digits and underscores.
Fixes a lot of issues around parsing XML/HTML attributes.
Fixes #49464.
See #34406, #48608.
Props codeforest, zodiac1978, johnpgreen, dlh, ayeshrajans, johnpgreen, rilwis, travisnorthcutt, miqrogroove, chriscct7, whyisjake.
Built from https://develop.svn.wordpress.org/trunk@48132
git-svn-id: http://core.svn.wordpress.org/trunk@47901 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-23 07:07:11 +02:00
|
|
|
if ( preg_match( '/^([_a-zA-Z][-_a-zA-Z0-9:.]*)/', $attr, $match ) ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$attrname = $match[1];
|
2019-07-03 01:42:58 +02:00
|
|
|
$working = 1;
|
|
|
|
$mode = 1;
|
Formatting: Extend `wp_kses_hair` and `wp_kses_hair_parse` to allow digits and underscores.
Fixes a lot of issues around parsing XML/HTML attributes.
Fixes #49464.
See #34406, #48608.
Props codeforest, zodiac1978, johnpgreen, dlh, ayeshrajans, johnpgreen, rilwis, travisnorthcutt, miqrogroove, chriscct7, whyisjake.
Built from https://develop.svn.wordpress.org/trunk@48132
git-svn-id: http://core.svn.wordpress.org/trunk@47901 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-23 07:07:11 +02:00
|
|
|
$attr = preg_replace( '/^[_a-zA-Z][-_a-zA-Z0-9:.]*/', '', $attr );
|
2005-09-21 00:18:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
case 1:
|
2020-01-29 01:45:18 +01:00
|
|
|
if ( preg_match( '/^\s*=\s*/', $attr ) ) { // Equals sign.
|
2005-09-21 00:18:47 +02:00
|
|
|
$working = 1;
|
2017-12-01 00:11:00 +01:00
|
|
|
$mode = 2;
|
|
|
|
$attr = preg_replace( '/^\s*=\s*/', '', $attr );
|
2005-09-21 00:18:47 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
if ( preg_match( '/^\s+/', $attr ) ) { // Valueless.
|
2005-09-21 00:18:47 +02:00
|
|
|
$working = 1;
|
2017-12-01 00:11:00 +01:00
|
|
|
$mode = 0;
|
|
|
|
if ( false === array_key_exists( $attrname, $attrarr ) ) {
|
|
|
|
$attrarr[ $attrname ] = array(
|
|
|
|
'name' => $attrname,
|
|
|
|
'value' => '',
|
|
|
|
'whole' => $attrname,
|
|
|
|
'vless' => 'y',
|
|
|
|
);
|
2008-07-21 03:12:49 +02:00
|
|
|
}
|
2017-12-01 00:11:00 +01:00
|
|
|
$attr = preg_replace( '/^\s+/', '', $attr );
|
2005-09-21 00:18:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
case 2:
|
|
|
|
if ( preg_match( '%^"([^"]*)"(\s+|/?$)%', $attr, $match ) ) {
|
2015-01-08 06:52:24 +01:00
|
|
|
// "value"
|
2008-08-19 20:43:21 +02:00
|
|
|
$thisval = $match[1];
|
2020-04-05 05:02:11 +02:00
|
|
|
if ( in_array( strtolower( $attrname ), $uris, true ) ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$thisval = wp_kses_bad_protocol( $thisval, $allowed_protocols );
|
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( false === array_key_exists( $attrname, $attrarr ) ) {
|
|
|
|
$attrarr[ $attrname ] = array(
|
|
|
|
'name' => $attrname,
|
|
|
|
'value' => $thisval,
|
|
|
|
'whole' => "$attrname=\"$thisval\"",
|
|
|
|
'vless' => 'n',
|
|
|
|
);
|
2008-07-21 03:12:49 +02:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
$working = 1;
|
2017-12-01 00:11:00 +01:00
|
|
|
$mode = 0;
|
|
|
|
$attr = preg_replace( '/^"[^"]*"(\s+|$)/', '', $attr );
|
2005-09-21 00:18:47 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( preg_match( "%^'([^']*)'(\s+|/?$)%", $attr, $match ) ) {
|
2015-01-08 06:52:24 +01:00
|
|
|
// 'value'
|
2008-08-19 20:43:21 +02:00
|
|
|
$thisval = $match[1];
|
2020-04-05 05:02:11 +02:00
|
|
|
if ( in_array( strtolower( $attrname ), $uris, true ) ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$thisval = wp_kses_bad_protocol( $thisval, $allowed_protocols );
|
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( false === array_key_exists( $attrname, $attrarr ) ) {
|
|
|
|
$attrarr[ $attrname ] = array(
|
|
|
|
'name' => $attrname,
|
|
|
|
'value' => $thisval,
|
|
|
|
'whole' => "$attrname='$thisval'",
|
|
|
|
'vless' => 'n',
|
|
|
|
);
|
2008-07-21 03:12:49 +02:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
$working = 1;
|
2017-12-01 00:11:00 +01:00
|
|
|
$mode = 0;
|
|
|
|
$attr = preg_replace( "/^'[^']*'(\s+|$)/", '', $attr );
|
2005-09-21 00:18:47 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( preg_match( "%^([^\s\"']+)(\s+|/?$)%", $attr, $match ) ) {
|
2015-01-08 06:52:24 +01:00
|
|
|
// value
|
2008-08-19 20:43:21 +02:00
|
|
|
$thisval = $match[1];
|
2020-04-05 05:02:11 +02:00
|
|
|
if ( in_array( strtolower( $attrname ), $uris, true ) ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$thisval = wp_kses_bad_protocol( $thisval, $allowed_protocols );
|
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( false === array_key_exists( $attrname, $attrarr ) ) {
|
|
|
|
$attrarr[ $attrname ] = array(
|
|
|
|
'name' => $attrname,
|
|
|
|
'value' => $thisval,
|
|
|
|
'whole' => "$attrname=\"$thisval\"",
|
|
|
|
'vless' => 'n',
|
|
|
|
);
|
2008-07-21 03:12:49 +02:00
|
|
|
}
|
2015-01-08 06:52:24 +01:00
|
|
|
// We add quotes to conform to W3C's HTML spec.
|
2005-09-21 00:18:47 +02:00
|
|
|
$working = 1;
|
2017-12-01 00:11:00 +01:00
|
|
|
$mode = 0;
|
|
|
|
$attr = preg_replace( "%^[^\s\"']+(\s+|$)%", '', $attr );
|
2005-09-21 00:18:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
2020-01-29 01:45:18 +01:00
|
|
|
} // End switch.
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2020-02-09 17:55:09 +01:00
|
|
|
if ( 0 == $working ) { // Not well-formed, remove and try again.
|
2017-12-01 00:11:00 +01:00
|
|
|
$attr = wp_kses_html_error( $attr );
|
2005-09-21 00:18:47 +02:00
|
|
|
$mode = 0;
|
|
|
|
}
|
2020-01-29 01:45:18 +01:00
|
|
|
} // End while.
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2020-02-09 17:55:09 +01:00
|
|
|
if ( 1 == $mode && false === array_key_exists( $attrname, $attrarr ) ) {
|
2020-01-29 01:45:18 +01:00
|
|
|
// Special case, for when the attribute list ends with a valueless
|
|
|
|
// attribute like "selected".
|
2017-12-01 00:11:00 +01:00
|
|
|
$attrarr[ $attrname ] = array(
|
|
|
|
'name' => $attrname,
|
|
|
|
'value' => '',
|
|
|
|
'whole' => $attrname,
|
|
|
|
'vless' => 'y',
|
|
|
|
);
|
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
|
|
|
|
return $attrarr;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
/**
|
|
|
|
* Finds all attributes of an HTML element.
|
|
|
|
*
|
|
|
|
* Does not modify input. May return "evil" output.
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* Based on `wp_kses_split2()` and `wp_kses_attr()`.
|
2015-07-22 07:15:25 +02:00
|
|
|
*
|
|
|
|
* @since 4.2.3
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $element HTML element.
|
2021-01-03 23:04:04 +01:00
|
|
|
* @return array|false List of attributes found in the element. Returns false on failure.
|
2015-07-22 07:15:25 +02:00
|
|
|
*/
|
|
|
|
function wp_kses_attr_parse( $element ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$valid = preg_match( '%^(<\s*)(/\s*)?([a-zA-Z0-9]+\s*)([^>]*)(>?)$%', $element, $matches );
|
2015-07-22 07:15:25 +02:00
|
|
|
if ( 1 !== $valid ) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$begin = $matches[1];
|
|
|
|
$slash = $matches[2];
|
2015-07-22 07:15:25 +02:00
|
|
|
$elname = $matches[3];
|
2017-12-01 00:11:00 +01:00
|
|
|
$attr = $matches[4];
|
|
|
|
$end = $matches[5];
|
2015-07-22 07:15:25 +02:00
|
|
|
|
|
|
|
if ( '' !== $slash ) {
|
|
|
|
// Closing elements do not get parsed.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Is there a closing XHTML slash at the end of the attributes?
|
|
|
|
if ( 1 === preg_match( '%\s*/\s*$%', $attr, $matches ) ) {
|
|
|
|
$xhtml_slash = $matches[0];
|
2017-12-01 00:11:00 +01:00
|
|
|
$attr = substr( $attr, 0, -strlen( $xhtml_slash ) );
|
2015-07-22 07:15:25 +02:00
|
|
|
} else {
|
|
|
|
$xhtml_slash = '';
|
|
|
|
}
|
2017-12-01 00:11:00 +01:00
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Split it.
|
2015-07-22 07:15:25 +02:00
|
|
|
$attrarr = wp_kses_hair_parse( $attr );
|
|
|
|
if ( false === $attrarr ) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure all input is returned by adding front and back matter.
|
|
|
|
array_unshift( $attrarr, $begin . $slash . $elname );
|
|
|
|
array_push( $attrarr, $xhtml_slash . $end );
|
2017-12-01 00:11:00 +01:00
|
|
|
|
2015-07-22 07:15:25 +02:00
|
|
|
return $attrarr;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Builds an attribute list from string containing attributes.
|
|
|
|
*
|
|
|
|
* Does not modify input. May return "evil" output.
|
|
|
|
* In case of unexpected input, returns false instead of stripping things.
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* Based on `wp_kses_hair()` but does not return a multi-dimensional array.
|
2015-07-22 07:15:25 +02:00
|
|
|
*
|
|
|
|
* @since 4.2.3
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $attr Attribute list from HTML element to closing HTML element tag.
|
2021-01-03 23:04:04 +01:00
|
|
|
* @return array|false List of attributes found in $attr. Returns false on failure.
|
2015-07-22 07:15:25 +02:00
|
|
|
*/
|
|
|
|
function wp_kses_hair_parse( $attr ) {
|
|
|
|
if ( '' === $attr ) {
|
|
|
|
return array();
|
|
|
|
}
|
|
|
|
|
2017-11-28 05:24:57 +01:00
|
|
|
// phpcs:disable Squiz.Strings.ConcatenationSpacing.PaddingFound -- don't remove regex indentation
|
2015-07-22 07:15:25 +02:00
|
|
|
$regex =
|
Formatting: Extend `wp_kses_hair` and `wp_kses_hair_parse` to allow digits and underscores.
Fixes a lot of issues around parsing XML/HTML attributes.
Fixes #49464.
See #34406, #48608.
Props codeforest, zodiac1978, johnpgreen, dlh, ayeshrajans, johnpgreen, rilwis, travisnorthcutt, miqrogroove, chriscct7, whyisjake.
Built from https://develop.svn.wordpress.org/trunk@48132
git-svn-id: http://core.svn.wordpress.org/trunk@47901 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-23 07:07:11 +02:00
|
|
|
'(?:'
|
2020-06-23 13:11:10 +02:00
|
|
|
. '[_a-zA-Z][-_a-zA-Z0-9:.]*' // Attribute name.
|
Formatting: Extend `wp_kses_hair` and `wp_kses_hair_parse` to allow digits and underscores.
Fixes a lot of issues around parsing XML/HTML attributes.
Fixes #49464.
See #34406, #48608.
Props codeforest, zodiac1978, johnpgreen, dlh, ayeshrajans, johnpgreen, rilwis, travisnorthcutt, miqrogroove, chriscct7, whyisjake.
Built from https://develop.svn.wordpress.org/trunk@48132
git-svn-id: http://core.svn.wordpress.org/trunk@47901 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-23 07:07:11 +02:00
|
|
|
. '|'
|
2020-06-23 13:11:10 +02:00
|
|
|
. '\[\[?[^\[\]]+\]\]?' // Shortcode in the name position implies unfiltered_html.
|
Formatting: Extend `wp_kses_hair` and `wp_kses_hair_parse` to allow digits and underscores.
Fixes a lot of issues around parsing XML/HTML attributes.
Fixes #49464.
See #34406, #48608.
Props codeforest, zodiac1978, johnpgreen, dlh, ayeshrajans, johnpgreen, rilwis, travisnorthcutt, miqrogroove, chriscct7, whyisjake.
Built from https://develop.svn.wordpress.org/trunk@48132
git-svn-id: http://core.svn.wordpress.org/trunk@47901 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-23 07:07:11 +02:00
|
|
|
. ')'
|
|
|
|
. '(?:' // Attribute value.
|
|
|
|
. '\s*=\s*' // All values begin with '='.
|
|
|
|
. '(?:'
|
|
|
|
. '"[^"]*"' // Double-quoted.
|
|
|
|
. '|'
|
|
|
|
. "'[^']*'" // Single-quoted.
|
|
|
|
. '|'
|
|
|
|
. '[^\s"\']+' // Non-quoted.
|
|
|
|
. '(?:\s|$)' // Must have a space.
|
|
|
|
. ')'
|
|
|
|
. '|'
|
|
|
|
. '(?:\s|$)' // If attribute has no value, space is required.
|
|
|
|
. ')'
|
|
|
|
. '\s*'; // Trailing space is optional except as mentioned above.
|
2017-11-28 05:24:57 +01:00
|
|
|
// phpcs:enable
|
2015-07-22 07:15:25 +02:00
|
|
|
|
|
|
|
// Although it is possible to reduce this procedure to a single regexp,
|
|
|
|
// we must run that regexp twice to get exactly the expected result.
|
|
|
|
|
|
|
|
$validation = "%^($regex)+$%";
|
|
|
|
$extraction = "%$regex%";
|
|
|
|
|
|
|
|
if ( 1 === preg_match( $validation, $attr ) ) {
|
|
|
|
preg_match_all( $extraction, $attr, $attrarr );
|
|
|
|
return $attrarr[0];
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2008-09-06 08:53:45 +02:00
|
|
|
* Performs different checks for attribute values.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* The currently implemented checks are "maxlen", "minlen", "maxval", "minval",
|
2011-09-30 00:57:43 +02:00
|
|
|
* and "valueless".
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $value Attribute value.
|
|
|
|
* @param string $vless Whether the attribute is valueless. Use 'y' or 'n'.
|
2015-05-26 20:06:24 +02:00
|
|
|
* @param string $checkname What $checkvalue is checking for.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param mixed $checkvalue What constraint the value should pass.
|
|
|
|
* @return bool Whether check passes.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_check_attr_val( $value, $vless, $checkname, $checkvalue ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$ok = true;
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
switch ( strtolower( $checkname ) ) {
|
|
|
|
case 'maxlen':
|
2020-01-29 01:45:18 +01:00
|
|
|
/*
|
|
|
|
* The maxlen check makes sure that the attribute value has a length not
|
|
|
|
* greater than the given value. This can be used to avoid Buffer Overflows
|
|
|
|
* in WWW clients and various Internet servers.
|
|
|
|
*/
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( strlen( $value ) > $checkvalue ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$ok = false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
break;
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
case 'minlen':
|
2020-01-29 01:45:18 +01:00
|
|
|
/*
|
|
|
|
* The minlen check makes sure that the attribute value has a length not
|
|
|
|
* smaller than the given value.
|
|
|
|
*/
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( strlen( $value ) < $checkvalue ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$ok = false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
break;
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
case 'maxval':
|
2020-01-29 01:45:18 +01:00
|
|
|
/*
|
|
|
|
* The maxval check does two things: it checks that the attribute value is
|
|
|
|
* an integer from 0 and up, without an excessive amount of zeroes or
|
|
|
|
* whitespace (to avoid Buffer Overflows). It also checks that the attribute
|
|
|
|
* value is not greater than the given value.
|
|
|
|
* This check can be used to avoid Denial of Service attacks.
|
|
|
|
*/
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! preg_match( '/^\s{0,6}[0-9]{1,6}\s{0,6}$/', $value ) ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$ok = false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
|
|
|
if ( $value > $checkvalue ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$ok = false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
break;
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
case 'minval':
|
2020-01-29 01:45:18 +01:00
|
|
|
/*
|
|
|
|
* The minval check makes sure that the attribute value is a positive integer,
|
|
|
|
* and that it is not smaller than the given value.
|
|
|
|
*/
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! preg_match( '/^\s{0,6}[0-9]{1,6}\s{0,6}$/', $value ) ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$ok = false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
|
|
|
if ( $value < $checkvalue ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$ok = false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
break;
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
case 'valueless':
|
2020-01-29 01:45:18 +01:00
|
|
|
/*
|
|
|
|
* The valueless check makes sure if the attribute has a value
|
|
|
|
* (like `<a href="blah">`) or not (`<option selected>`). If the given value
|
|
|
|
* is a "y" or a "Y", the attribute must not have a value.
|
|
|
|
* If the given value is an "n" or an "N", the attribute must have a value.
|
|
|
|
*/
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( strtolower( $checkvalue ) != $vless ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$ok = false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
break;
|
KSES: Add options for restricting tags based upon their attributes.
This change adds two now attribute-related config options to KSES:
- An array of allowed values can be defined for attributes. If the attribute value doesn't fall into the list, the attribute will be removed from the tag.
- Attributes can be marked as required. If a required attribute is not present, KSES will remove all attributes from the tag. As KSES doesn't match opening and closing tags, it's not possible to safely remove the tag itself, the safest fallback is to strip all attributes from the tag, instead.
Included with this change is an implementation of these options, allowing the `<object>` tag to be stored in posts, but only when it has a `type` attribute set to `application/pdf`.
Props pento, swissspidy, peterwilsoncc, dd32, jorbin.
Fixes #54261.
Built from https://develop.svn.wordpress.org/trunk@51963
git-svn-id: http://core.svn.wordpress.org/trunk@51552 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-11-01 03:13:56 +01:00
|
|
|
|
|
|
|
case 'values':
|
|
|
|
/*
|
|
|
|
* The values check is used when you want to make sure that the attribute
|
|
|
|
* has one of the given values.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ( false === array_search( strtolower( $value ), $checkvalue, true ) ) {
|
|
|
|
$ok = false;
|
|
|
|
}
|
|
|
|
break;
|
2021-12-02 01:56:01 +01:00
|
|
|
|
|
|
|
case 'value_callback':
|
|
|
|
/*
|
|
|
|
* The value_callback check is used when you want to make sure that the attribute
|
|
|
|
* value is accepted by the callback function.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ( ! call_user_func( $checkvalue, $value ) ) {
|
|
|
|
$ok = false;
|
|
|
|
}
|
|
|
|
break;
|
2020-01-29 01:45:18 +01:00
|
|
|
} // End switch.
|
2005-09-21 00:18:47 +02:00
|
|
|
|
|
|
|
return $ok;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Sanitizes a string and removed disallowed URL protocols.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* This function removes all non-allowed protocols from the beginning of the
|
|
|
|
* string. It ignores whitespace and the case of the letters, and it does
|
|
|
|
* understand HTML entities. It does its work recursively, so it won't be
|
|
|
|
* fooled by a string like `javascript:javascript:alert(57)`.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $string Content to filter bad protocols from.
|
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
|
|
|
* @return string Filtered content.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_bad_protocol( $string, $allowed_protocols ) {
|
|
|
|
$string = wp_kses_no_null( $string );
|
2012-04-19 23:48:12 +02:00
|
|
|
$iterations = 0;
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2012-04-19 23:48:12 +02:00
|
|
|
do {
|
|
|
|
$original_string = $string;
|
2017-12-01 00:11:00 +01:00
|
|
|
$string = wp_kses_bad_protocol_once( $string, $allowed_protocols );
|
2012-04-19 23:48:12 +02:00
|
|
|
} while ( $original_string != $string && ++$iterations < 6 );
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( $original_string != $string ) {
|
2012-04-19 23:48:12 +02:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2005-09-21 00:18:47 +02:00
|
|
|
return $string;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Removes any invalid control characters in a text string.
|
2014-07-01 20:01:17 +02:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* Also removes any instance of the `\0` string.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $string Content to filter null characters from.
|
|
|
|
* @param array $options Set 'slash_zero' => 'keep' when '\0' is allowed. Default is 'remove'.
|
|
|
|
* @return string Filtered content.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2015-06-19 20:47:27 +02:00
|
|
|
function wp_kses_no_null( $string, $options = null ) {
|
|
|
|
if ( ! isset( $options['slash_zero'] ) ) {
|
|
|
|
$options = array( 'slash_zero' => 'remove' );
|
|
|
|
}
|
|
|
|
|
|
|
|
$string = preg_replace( '/[\x00-\x08\x0B\x0C\x0E-\x1F]/', '', $string );
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( 'remove' === $options['slash_zero'] ) {
|
2015-06-19 20:47:27 +02:00
|
|
|
$string = preg_replace( '/\\\\+0+/', '', $string );
|
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2005-09-21 00:18:47 +02:00
|
|
|
return $string;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2008-09-06 08:53:45 +02:00
|
|
|
* Strips slashes from in front of quotes.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* This function changes the character sequence `\"` to just `"`. It leaves all other
|
|
|
|
* slashes alone. The quoting from `preg_replace(//e)` requires this.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $string String to strip slashes from.
|
|
|
|
* @return string Fixed string with quoted slashes.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_stripslashes( $string ) {
|
|
|
|
return preg_replace( '%\\\\"%', '"', $string );
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Converts the keys of an array to lowercase.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param array $inarray Unfiltered array.
|
|
|
|
* @return array Fixed array with all lowercase keys.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_array_lc( $inarray ) {
|
|
|
|
$outarray = array();
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
foreach ( (array) $inarray as $inkey => $inval ) {
|
|
|
|
$outkey = strtolower( $inkey );
|
|
|
|
$outarray[ $outkey ] = array();
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
foreach ( (array) $inval as $inkey2 => $inval2 ) {
|
|
|
|
$outkey2 = strtolower( $inkey2 );
|
|
|
|
$outarray[ $outkey ][ $outkey2 ] = $inval2;
|
2018-04-28 15:58:21 +02:00
|
|
|
}
|
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2005-09-21 00:18:47 +02:00
|
|
|
return $outarray;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Handles parsing errors in `wp_kses_hair()`.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2008-09-06 08:53:45 +02:00
|
|
|
* The general plan is to remove everything to and including some whitespace,
|
|
|
|
* but it deals with quotes and apostrophes as well.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
|
|
|
* @param string $string
|
|
|
|
* @return string
|
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_html_error( $string ) {
|
|
|
|
return preg_replace( '/^("[^"]*("|$)|\'[^\']*(\'|$)|\S)*\s*/', '', $string );
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2008-09-06 08:53:45 +02:00
|
|
|
* Sanitizes content from bad protocols and other characters.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* This function searches for URL protocols at the beginning of the string, while
|
2008-09-06 08:53:45 +02:00
|
|
|
* handling whitespace and HTML entities.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $string Content to check for bad protocols.
|
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
2020-07-23 02:48:06 +02:00
|
|
|
* @param int $count Depth of call recursion to this function.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @return string Sanitized content.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_bad_protocol_once( $string, $allowed_protocols, $count = 1 ) {
|
2019-09-04 19:52:56 +02:00
|
|
|
$string = preg_replace( '/(�*58(?![;0-9])|�*3a(?![;a-f0-9]))/i', '$1;', $string );
|
2019-12-12 18:55:05 +01:00
|
|
|
$string2 = preg_split( '/:|�*58;|�*3a;|:/i', $string, 2 );
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( isset( $string2[1] ) && ! preg_match( '%/\?%', $string2[0] ) ) {
|
|
|
|
$string = trim( $string2[1] );
|
2012-04-19 23:48:12 +02:00
|
|
|
$protocol = wp_kses_bad_protocol_once2( $string2[0], $allowed_protocols );
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( 'feed:' === $protocol ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( $count > 2 ) {
|
2012-04-19 23:48:12 +02:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-04-19 23:48:12 +02:00
|
|
|
$string = wp_kses_bad_protocol_once( $string, $allowed_protocols, ++$count );
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( empty( $string ) ) {
|
2012-04-19 23:48:12 +02:00
|
|
|
return $string;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-04-19 23:48:12 +02:00
|
|
|
}
|
|
|
|
$string = $protocol . $string;
|
|
|
|
}
|
2008-03-18 02:53:36 +01:00
|
|
|
|
|
|
|
return $string;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Callback for `wp_kses_bad_protocol_once()` regular expression.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* This function processes URL protocols, checks to see if they're in the
|
General: Remove “whitelist” and “blacklist” in favor of more clear and inclusive language.
“The WordPress open source community cares about diversity. We strive to maintain a welcoming environment where everyone can feel included.”
With this commit, all occurrences of “whitelist” and “blacklist” (with the single exception of the `$new_whitelist_options` global variable) are removed. A new ticket has been opened to explore renaming the `$new_whitelist_options` variable (#50434).
Changing to more specific names or rewording sentences containing these terms not only makes the code more inclusive, but also helps provide clarity. These terms are often ambiguous. What is being blocked or allowed is not always immediately clear. This can make it more difficult for non-native English speakers to read through the codebase.
Words matter. If one contributor feels more welcome because these terms are removed, this was worth the effort.
Props strangerstudios, jorbin, desrosj, joemcgill, timothyblynjacobs, ocean90, ayeshrajans, davidbaumwald, earnjam.
See #48900, #50434.
Fixes #50413.
Built from https://develop.svn.wordpress.org/trunk@48121
git-svn-id: http://core.svn.wordpress.org/trunk@47890 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-22 19:26:13 +02:00
|
|
|
* list of allowed protocols or not, and returns different data depending
|
|
|
|
* on the answer.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2008-07-23 10:36:15 +02:00
|
|
|
* @access private
|
2018-04-28 15:58:21 +02:00
|
|
|
* @ignore
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 1.0.0
|
|
|
|
*
|
General: Remove “whitelist” and “blacklist” in favor of more clear and inclusive language.
“The WordPress open source community cares about diversity. We strive to maintain a welcoming environment where everyone can feel included.”
With this commit, all occurrences of “whitelist” and “blacklist” (with the single exception of the `$new_whitelist_options` global variable) are removed. A new ticket has been opened to explore renaming the `$new_whitelist_options` variable (#50434).
Changing to more specific names or rewording sentences containing these terms not only makes the code more inclusive, but also helps provide clarity. These terms are often ambiguous. What is being blocked or allowed is not always immediately clear. This can make it more difficult for non-native English speakers to read through the codebase.
Words matter. If one contributor feels more welcome because these terms are removed, this was worth the effort.
Props strangerstudios, jorbin, desrosj, joemcgill, timothyblynjacobs, ocean90, ayeshrajans, davidbaumwald, earnjam.
See #48900, #50434.
Fixes #50413.
Built from https://develop.svn.wordpress.org/trunk@48121
git-svn-id: http://core.svn.wordpress.org/trunk@47890 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-22 19:26:13 +02:00
|
|
|
* @param string $string URI scheme to check against the list of allowed protocols.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string[] $allowed_protocols Array of allowed URL protocols.
|
|
|
|
* @return string Sanitized content.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2010-12-29 21:45:37 +01:00
|
|
|
function wp_kses_bad_protocol_once2( $string, $allowed_protocols ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$string2 = wp_kses_decode_entities( $string );
|
|
|
|
$string2 = preg_replace( '/\s/', '', $string2 );
|
|
|
|
$string2 = wp_kses_no_null( $string2 );
|
|
|
|
$string2 = strtolower( $string2 );
|
2005-09-21 00:18:47 +02:00
|
|
|
|
|
|
|
$allowed = false;
|
2017-12-01 00:11:00 +01:00
|
|
|
foreach ( (array) $allowed_protocols as $one_protocol ) {
|
|
|
|
if ( strtolower( $one_protocol ) == $string2 ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
$allowed = true;
|
|
|
|
break;
|
|
|
|
}
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2005-09-21 00:18:47 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( $allowed ) {
|
2005-09-21 00:18:47 +02:00
|
|
|
return "$string2:";
|
2017-12-01 00:11:00 +01:00
|
|
|
} else {
|
2005-09-21 00:18:47 +02:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2008-09-06 08:53:45 +02:00
|
|
|
* Converts and fixes HTML entities.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2014-12-03 09:47:22 +01:00
|
|
|
* This function normalizes HTML entities. It will convert `AT&T` to the correct
|
2020-10-25 02:14:05 +02:00
|
|
|
* `AT&T`, `:` to `:`, `&#XYZZY;` to `&#XYZZY;` and so on.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
* When `$context` is set to 'xml', HTML entities are converted to their code points. For
|
|
|
|
* example, `AT&T…&#XYZZY;` is converted to `AT&T…&#XYZZY;`.
|
|
|
|
*
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 1.0.0
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
* @since 5.5.0 Added `$context` parameter.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
* @param string $string Content to normalize entities.
|
|
|
|
* @param string $context Context for normalization. Can be either 'html' or 'xml'.
|
|
|
|
* Default 'html'.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @return string Content with normalized entities.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
function wp_kses_normalize_entities( $string, $context = 'html' ) {
|
2015-01-08 06:52:24 +01:00
|
|
|
// Disarm all entities by converting & to &
|
2017-12-01 00:11:00 +01:00
|
|
|
$string = str_replace( '&', '&', $string );
|
2003-12-23 23:09:02 +01:00
|
|
|
|
General: Remove “whitelist” and “blacklist” in favor of more clear and inclusive language.
“The WordPress open source community cares about diversity. We strive to maintain a welcoming environment where everyone can feel included.”
With this commit, all occurrences of “whitelist” and “blacklist” (with the single exception of the `$new_whitelist_options` global variable) are removed. A new ticket has been opened to explore renaming the `$new_whitelist_options` variable (#50434).
Changing to more specific names or rewording sentences containing these terms not only makes the code more inclusive, but also helps provide clarity. These terms are often ambiguous. What is being blocked or allowed is not always immediately clear. This can make it more difficult for non-native English speakers to read through the codebase.
Words matter. If one contributor feels more welcome because these terms are removed, this was worth the effort.
Props strangerstudios, jorbin, desrosj, joemcgill, timothyblynjacobs, ocean90, ayeshrajans, davidbaumwald, earnjam.
See #48900, #50434.
Fixes #50413.
Built from https://develop.svn.wordpress.org/trunk@48121
git-svn-id: http://core.svn.wordpress.org/trunk@47890 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-22 19:26:13 +02:00
|
|
|
// Change back the allowed entities in our list of allowed entities.
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
if ( 'xml' === $context ) {
|
|
|
|
$string = preg_replace_callback( '/&([A-Za-z]{2,8}[0-9]{0,2});/', 'wp_kses_xml_named_entities', $string );
|
|
|
|
} else {
|
|
|
|
$string = preg_replace_callback( '/&([A-Za-z]{2,8}[0-9]{0,2});/', 'wp_kses_named_entities', $string );
|
|
|
|
}
|
2017-12-01 00:11:00 +01:00
|
|
|
$string = preg_replace_callback( '/&#(0*[0-9]{1,7});/', 'wp_kses_normalize_entities2', $string );
|
|
|
|
$string = preg_replace_callback( '/&#[Xx](0*[0-9A-Fa-f]{1,6});/', 'wp_kses_normalize_entities3', $string );
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2005-09-21 00:18:47 +02:00
|
|
|
return $string;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
2010-02-24 06:37:20 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Callback for `wp_kses_normalize_entities()` regular expression.
|
2010-02-24 06:37:20 +01:00
|
|
|
*
|
|
|
|
* This function only accepts valid named entity references, which are finite,
|
|
|
|
* case-sensitive, and highly scrutinized by HTML and XML validators.
|
|
|
|
*
|
|
|
|
* @since 3.0.0
|
|
|
|
*
|
2015-05-26 20:06:24 +02:00
|
|
|
* @global array $allowedentitynames
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param array $matches preg_replace_callback() matches array.
|
|
|
|
* @return string Correctly encoded entity.
|
2010-02-24 06:37:20 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_named_entities( $matches ) {
|
2010-02-24 06:37:20 +01:00
|
|
|
global $allowedentitynames;
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( empty( $matches[1] ) ) {
|
2010-02-24 06:37:20 +01:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-24 06:37:20 +01:00
|
|
|
|
|
|
|
$i = $matches[1];
|
2020-04-05 05:02:11 +02:00
|
|
|
return ( ! in_array( $i, $allowedentitynames, true ) ) ? "&$i;" : "&$i;";
|
2010-02-24 06:37:20 +01:00
|
|
|
}
|
|
|
|
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
/**
|
|
|
|
* Callback for `wp_kses_normalize_entities()` regular expression.
|
|
|
|
*
|
|
|
|
* This function only accepts valid named entity references, which are finite,
|
|
|
|
* case-sensitive, and highly scrutinized by XML validators. HTML named entity
|
|
|
|
* references are converted to their code points.
|
|
|
|
*
|
|
|
|
* @since 5.5.0
|
|
|
|
*
|
|
|
|
* @global array $allowedentitynames
|
2022-01-25 12:16:05 +01:00
|
|
|
* @global array $allowedxmlentitynames
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
*
|
|
|
|
* @param array $matches preg_replace_callback() matches array.
|
|
|
|
* @return string Correctly encoded entity.
|
|
|
|
*/
|
|
|
|
function wp_kses_xml_named_entities( $matches ) {
|
2021-11-21 18:17:02 +01:00
|
|
|
global $allowedentitynames, $allowedxmlentitynames;
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
|
|
|
|
if ( empty( $matches[1] ) ) {
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
$i = $matches[1];
|
|
|
|
|
2021-11-21 18:17:02 +01:00
|
|
|
if ( in_array( $i, $allowedxmlentitynames, true ) ) {
|
Sitemaps: Add XML sitemaps functionality to WordPress.
While web crawlers are able to discover pages from links within the site and from other sites, XML sitemaps supplement this approach by allowing crawlers to quickly and comprehensively identify all URLs included in the sitemap and learn other signals about those URLs using the associated metadata.
See https://make.wordpress.org/core/2020/06/10/merge-announcement-extensible-core-sitemaps/ for more details.
This feature exposes the sitemap index via `/wp-sitemap.xml` and exposes a variety of new filters and hooks for developers to modify the behavior. Users can disable sitemaps completely by turning off search engine visibility in WordPress admin.
This change also introduces a new `esc_xml()` function to escape strings for output in XML, as well as XML support to `wp_kses_normalize_entities()`.
Props Adrian McShane, afragen, adamsilverstein, casiepa, flixos90, garrett-eclipse, joemcgill, kburgoine, kraftbj, milana_cap, pacifika, pbiron, pfefferle, Ruxandra Gradina, swissspidy, szepeviktor, tangrufus, tweetythierry.
Fixes #50117.
See #3670. See #19998.
Built from https://develop.svn.wordpress.org/trunk@48072
git-svn-id: http://core.svn.wordpress.org/trunk@47839 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-17 17:24:07 +02:00
|
|
|
return "&$i;";
|
|
|
|
} elseif ( in_array( $i, $allowedentitynames, true ) ) {
|
|
|
|
return html_entity_decode( "&$i;", ENT_HTML5 );
|
|
|
|
}
|
|
|
|
|
|
|
|
return "&$i;";
|
|
|
|
}
|
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Callback for `wp_kses_normalize_entities()` regular expression.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* This function helps `wp_kses_normalize_entities()` to only accept 16-bit
|
2014-12-03 09:47:22 +01:00
|
|
|
* values and nothing more for `&#number;` entities.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2008-07-23 10:36:15 +02:00
|
|
|
* @access private
|
2018-04-28 15:58:21 +02:00
|
|
|
* @ignore
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param array $matches `preg_replace_callback()` matches array.
|
|
|
|
* @return string Correctly encoded entity.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_normalize_entities2( $matches ) {
|
|
|
|
if ( empty( $matches[1] ) ) {
|
2008-07-21 07:11:00 +02:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2008-07-21 07:11:00 +02:00
|
|
|
|
|
|
|
$i = $matches[1];
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( valid_unicode( $i ) ) {
|
|
|
|
$i = str_pad( ltrim( $i, '0' ), 3, '0', STR_PAD_LEFT );
|
2010-12-29 21:45:37 +01:00
|
|
|
$i = "&#$i;";
|
|
|
|
} else {
|
|
|
|
$i = "&#$i;";
|
|
|
|
}
|
|
|
|
|
|
|
|
return $i;
|
2008-07-21 05:21:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Callback for `wp_kses_normalize_entities()` for regular expression.
|
2008-07-21 05:21:09 +02:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* This function helps `wp_kses_normalize_entities()` to only accept valid Unicode
|
2008-09-06 08:53:45 +02:00
|
|
|
* numeric entities in hex form.
|
2008-07-21 05:21:09 +02:00
|
|
|
*
|
2016-12-27 10:21:44 +01:00
|
|
|
* @since 2.7.0
|
2008-07-23 10:36:15 +02:00
|
|
|
* @access private
|
2018-04-28 15:58:21 +02:00
|
|
|
* @ignore
|
2008-07-23 10:36:15 +02:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param array $matches `preg_replace_callback()` matches array.
|
|
|
|
* @return string Correctly encoded entity.
|
2008-07-21 05:21:09 +02:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_normalize_entities3( $matches ) {
|
|
|
|
if ( empty( $matches[1] ) ) {
|
2008-07-21 07:11:00 +02:00
|
|
|
return '';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2008-07-21 07:11:00 +02:00
|
|
|
|
2010-03-10 19:45:28 +01:00
|
|
|
$hexchars = $matches[1];
|
2017-12-01 00:11:00 +01:00
|
|
|
return ( ! valid_unicode( hexdec( $hexchars ) ) ) ? "&#x$hexchars;" : '&#x' . ltrim( $hexchars, '0' ) . ';';
|
2008-07-21 05:21:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Determines if a Unicode codepoint is valid.
|
2008-07-21 05:21:09 +02:00
|
|
|
*
|
2016-12-27 10:21:44 +01:00
|
|
|
* @since 2.7.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param int $i Unicode codepoint.
|
|
|
|
* @return bool Whether or not the codepoint is a valid Unicode codepoint.
|
2008-07-21 05:21:09 +02:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function valid_unicode( $i ) {
|
2020-02-09 17:55:09 +01:00
|
|
|
return ( 0x9 == $i || 0xa == $i || 0xd == $i ||
|
|
|
|
( 0x20 <= $i && $i <= 0xd7ff ) ||
|
|
|
|
( 0xe000 <= $i && $i <= 0xfffd ) ||
|
|
|
|
( 0x10000 <= $i && $i <= 0x10ffff ) );
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Converts all numeric HTML entities to their named counterparts.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2014-12-03 09:47:22 +01:00
|
|
|
* This function decodes numeric HTML entities (`A` and `A`).
|
2018-04-28 15:58:21 +02:00
|
|
|
* It doesn't do anything with named entities like `ä`, but we don't
|
General: Remove “whitelist” and “blacklist” in favor of more clear and inclusive language.
“The WordPress open source community cares about diversity. We strive to maintain a welcoming environment where everyone can feel included.”
With this commit, all occurrences of “whitelist” and “blacklist” (with the single exception of the `$new_whitelist_options` global variable) are removed. A new ticket has been opened to explore renaming the `$new_whitelist_options` variable (#50434).
Changing to more specific names or rewording sentences containing these terms not only makes the code more inclusive, but also helps provide clarity. These terms are often ambiguous. What is being blocked or allowed is not always immediately clear. This can make it more difficult for non-native English speakers to read through the codebase.
Words matter. If one contributor feels more welcome because these terms are removed, this was worth the effort.
Props strangerstudios, jorbin, desrosj, joemcgill, timothyblynjacobs, ocean90, ayeshrajans, davidbaumwald, earnjam.
See #48900, #50434.
Fixes #50413.
Built from https://develop.svn.wordpress.org/trunk@48121
git-svn-id: http://core.svn.wordpress.org/trunk@47890 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-22 19:26:13 +02:00
|
|
|
* need them in the allowed URL protocols system anyway.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $string Content to change entities.
|
|
|
|
* @return string Content after decoded entities.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
function wp_kses_decode_entities( $string ) {
|
|
|
|
$string = preg_replace_callback( '/&#([0-9]+);/', '_wp_kses_decode_entities_chr', $string );
|
|
|
|
$string = preg_replace_callback( '/&#[Xx]([0-9A-Fa-f]+);/', '_wp_kses_decode_entities_chr_hexdec', $string );
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2005-09-21 00:18:47 +02:00
|
|
|
return $string;
|
2008-01-16 20:15:07 +01:00
|
|
|
}
|
2003-12-23 23:09:02 +01:00
|
|
|
|
2009-08-16 07:58:39 +02:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Regex callback for `wp_kses_decode_entities()`.
|
2009-08-16 07:58:39 +02:00
|
|
|
*
|
2016-12-27 10:21:44 +01:00
|
|
|
* @since 2.9.0
|
2018-04-28 15:58:21 +02:00
|
|
|
* @access private
|
|
|
|
* @ignore
|
2016-12-27 10:21:44 +01:00
|
|
|
*
|
2009-08-16 07:58:39 +02:00
|
|
|
* @param array $match preg match
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function _wp_kses_decode_entities_chr( $match ) {
|
|
|
|
return chr( $match[1] );
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Regex callback for `wp_kses_decode_entities()`.
|
2009-08-16 07:58:39 +02:00
|
|
|
*
|
2016-12-27 10:21:44 +01:00
|
|
|
* @since 2.9.0
|
2018-04-28 15:58:21 +02:00
|
|
|
* @access private
|
|
|
|
* @ignore
|
2016-12-27 10:21:44 +01:00
|
|
|
*
|
2009-08-16 07:58:39 +02:00
|
|
|
* @param array $match preg match
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function _wp_kses_decode_entities_chr_hexdec( $match ) {
|
|
|
|
return chr( hexdec( $match[1] ) );
|
|
|
|
}
|
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Sanitize content with allowed HTML KSES rules.
|
|
|
|
*
|
|
|
|
* This function expects slashed data.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 1.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $data Content to filter, expected to be escaped with slashes.
|
|
|
|
* @return string Filtered content.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2012-09-10 18:19:54 +02:00
|
|
|
function wp_filter_kses( $data ) {
|
|
|
|
return addslashes( wp_kses( stripslashes( $data ), current_filter() ) );
|
2005-09-21 00:18:47 +02:00
|
|
|
}
|
|
|
|
|
2009-10-29 18:15:58 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Sanitize content with allowed HTML KSES rules.
|
|
|
|
*
|
|
|
|
* This function expects unslashed data.
|
2009-10-29 18:15:58 +01:00
|
|
|
*
|
|
|
|
* @since 2.9.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $data Content to filter, expected to not be escaped.
|
|
|
|
* @return string Filtered content.
|
2009-10-29 18:15:58 +01:00
|
|
|
*/
|
2012-09-10 18:19:54 +02:00
|
|
|
function wp_kses_data( $data ) {
|
2015-05-26 20:06:24 +02:00
|
|
|
return wp_kses( $data, current_filter() );
|
2009-10-29 18:15:58 +01:00
|
|
|
}
|
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Sanitizes content for allowed HTML tags for post content.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* Post content refers to the page contents of the 'post' type and not `$_POST`
|
2008-09-06 08:53:45 +02:00
|
|
|
* data from forms.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* This function expects slashed data.
|
|
|
|
*
|
2008-01-16 20:15:07 +01:00
|
|
|
* @since 2.0.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $data Post content to filter, expected to be escaped with slashes.
|
2008-01-16 20:15:07 +01:00
|
|
|
* @return string Filtered post content with allowed HTML tags and attributes intact.
|
|
|
|
*/
|
2015-05-26 20:06:24 +02:00
|
|
|
function wp_filter_post_kses( $data ) {
|
|
|
|
return addslashes( wp_kses( stripslashes( $data ), 'post' ) );
|
2005-09-21 00:18:47 +02:00
|
|
|
}
|
|
|
|
|
2021-11-08 22:24:59 +01:00
|
|
|
/**
|
|
|
|
* Sanitizes global styles user content removing unsafe rules.
|
|
|
|
*
|
2021-11-10 20:56:00 +01:00
|
|
|
* @since 5.9.0
|
|
|
|
*
|
2021-11-08 22:24:59 +01:00
|
|
|
* @param string $data Post content to filter.
|
|
|
|
* @return string Filtered post content with unsafe rules removed.
|
|
|
|
*/
|
|
|
|
function wp_filter_global_styles_post( $data ) {
|
|
|
|
$decoded_data = json_decode( wp_unslash( $data ), true );
|
|
|
|
$json_decoding_error = json_last_error();
|
|
|
|
if (
|
|
|
|
JSON_ERROR_NONE === $json_decoding_error &&
|
|
|
|
is_array( $decoded_data ) &&
|
|
|
|
isset( $decoded_data['isGlobalStylesUserThemeJSON'] ) &&
|
|
|
|
$decoded_data['isGlobalStylesUserThemeJSON']
|
|
|
|
) {
|
|
|
|
unset( $decoded_data['isGlobalStylesUserThemeJSON'] );
|
|
|
|
|
|
|
|
$data_to_encode = WP_Theme_JSON::remove_insecure_properties( $decoded_data );
|
|
|
|
|
|
|
|
$data_to_encode['isGlobalStylesUserThemeJSON'] = true;
|
|
|
|
return wp_slash( wp_json_encode( $data_to_encode ) );
|
|
|
|
}
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
|
2009-10-29 18:15:58 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Sanitizes content for allowed HTML tags for post content.
|
2009-10-29 18:15:58 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* Post content refers to the page contents of the 'post' type and not `$_POST`
|
2009-10-29 18:15:58 +01:00
|
|
|
* data from forms.
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* This function expects unslashed data.
|
|
|
|
*
|
2009-10-29 18:15:58 +01:00
|
|
|
* @since 2.9.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $data Post content to filter.
|
2009-10-29 18:15:58 +01:00
|
|
|
* @return string Filtered post content with allowed HTML tags and attributes intact.
|
|
|
|
*/
|
2015-05-26 20:06:24 +02:00
|
|
|
function wp_kses_post( $data ) {
|
|
|
|
return wp_kses( $data, 'post' );
|
2009-10-29 18:15:58 +01:00
|
|
|
}
|
|
|
|
|
2016-02-01 15:53:27 +01:00
|
|
|
/**
|
|
|
|
* Navigates through an array, object, or scalar, and sanitizes content for
|
|
|
|
* allowed HTML tags for post content.
|
|
|
|
*
|
|
|
|
* @since 4.4.2
|
|
|
|
*
|
2016-02-07 01:18:26 +01:00
|
|
|
* @see map_deep()
|
|
|
|
*
|
|
|
|
* @param mixed $data The array, object, or scalar value to inspect.
|
|
|
|
* @return mixed The filtered content.
|
2016-02-01 15:53:27 +01:00
|
|
|
*/
|
|
|
|
function wp_kses_post_deep( $data ) {
|
|
|
|
return map_deep( $data, 'wp_kses_post' );
|
|
|
|
}
|
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Strips all HTML from a text string.
|
|
|
|
*
|
|
|
|
* This function expects slashed data.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 2.1.0
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string $data Content to strip all HTML from.
|
|
|
|
* @return string Filtered content without any HTML.
|
2008-01-16 20:15:07 +01:00
|
|
|
*/
|
2012-09-10 18:19:54 +02:00
|
|
|
function wp_filter_nohtml_kses( $data ) {
|
2015-05-26 20:06:24 +02:00
|
|
|
return addslashes( wp_kses( stripslashes( $data ), 'strip' ) );
|
2006-02-28 05:22:24 +01:00
|
|
|
}
|
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Adds all KSES input form content filters.
|
2008-09-06 08:53:45 +02:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* All hooks have default priority. The `wp_filter_kses()` function is added to
|
2008-09-06 08:53:45 +02:00
|
|
|
* the 'pre_comment_content' and 'title_save_pre' hooks.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* The `wp_filter_post_kses()` function is added to the 'content_save_pre',
|
2008-09-06 08:53:45 +02:00
|
|
|
* 'excerpt_save_pre', and 'content_filtered_save_pre' hooks.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 2.0.0
|
|
|
|
*/
|
2005-10-06 01:58:16 +02:00
|
|
|
function kses_init_filters() {
|
2020-01-29 01:45:18 +01:00
|
|
|
// Normal filtering.
|
2017-12-01 00:11:00 +01:00
|
|
|
add_filter( 'title_save_pre', 'wp_filter_kses' );
|
2006-02-28 05:22:24 +01:00
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Comment filtering.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( current_user_can( 'unfiltered_html' ) ) {
|
2013-03-01 17:28:40 +01:00
|
|
|
add_filter( 'pre_comment_content', 'wp_filter_post_kses' );
|
2017-12-01 00:11:00 +01:00
|
|
|
} else {
|
2013-03-01 17:28:40 +01:00
|
|
|
add_filter( 'pre_comment_content', 'wp_filter_kses' );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-06-01 22:47:08 +02:00
|
|
|
|
2022-03-11 00:27:04 +01:00
|
|
|
// Global Styles filtering: Global Styles filters should be executed before normal post_kses HTML filters.
|
|
|
|
add_filter( 'content_save_pre', 'wp_filter_global_styles_post', 9 );
|
|
|
|
add_filter( 'content_filtered_save_pre', 'wp_filter_global_styles_post', 9 );
|
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Post filtering.
|
2017-12-01 00:11:00 +01:00
|
|
|
add_filter( 'content_save_pre', 'wp_filter_post_kses' );
|
|
|
|
add_filter( 'excerpt_save_pre', 'wp_filter_post_kses' );
|
|
|
|
add_filter( 'content_filtered_save_pre', 'wp_filter_post_kses' );
|
2005-10-06 01:58:16 +02:00
|
|
|
}
|
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Removes all KSES input form content filters.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* A quick procedural method to removing all of the filters that KSES uses for
|
2008-09-06 08:53:45 +02:00
|
|
|
* content in WordPress Loop.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* Does not remove the `kses_init()` function from {@see 'init'} hook (priority is
|
|
|
|
* default). Also does not remove `kses_init()` function from {@see 'set_current_user'}
|
2008-09-06 08:53:45 +02:00
|
|
|
* hook (priority is also default).
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 2.0.6
|
|
|
|
*/
|
2006-02-28 05:22:24 +01:00
|
|
|
function kses_remove_filters() {
|
2020-01-29 01:45:18 +01:00
|
|
|
// Normal filtering.
|
2017-12-01 00:11:00 +01:00
|
|
|
remove_filter( 'title_save_pre', 'wp_filter_kses' );
|
2006-01-13 20:19:09 +01:00
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Comment filtering.
|
2013-03-01 17:28:40 +01:00
|
|
|
remove_filter( 'pre_comment_content', 'wp_filter_post_kses' );
|
|
|
|
remove_filter( 'pre_comment_content', 'wp_filter_kses' );
|
2012-06-01 22:47:08 +02:00
|
|
|
|
2022-03-11 00:27:04 +01:00
|
|
|
// Global Styles filtering.
|
|
|
|
remove_filter( 'content_save_pre', 'wp_filter_global_styles_post', 9 );
|
|
|
|
remove_filter( 'content_filtered_save_pre', 'wp_filter_global_styles_post', 9 );
|
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Post filtering.
|
2017-12-01 00:11:00 +01:00
|
|
|
remove_filter( 'content_save_pre', 'wp_filter_post_kses' );
|
|
|
|
remove_filter( 'excerpt_save_pre', 'wp_filter_post_kses' );
|
|
|
|
remove_filter( 'content_filtered_save_pre', 'wp_filter_post_kses' );
|
2006-02-28 05:22:24 +01:00
|
|
|
}
|
|
|
|
|
2008-01-16 20:15:07 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Sets up most of the KSES filters for input form content.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* First removes all of the KSES filters in case the current user does not need
|
|
|
|
* to have KSES filter the content. If the user does not have `unfiltered_html`
|
|
|
|
* capability, then KSES filters are added.
|
2008-01-16 20:15:07 +01:00
|
|
|
*
|
|
|
|
* @since 2.0.0
|
|
|
|
*/
|
2006-02-28 05:22:24 +01:00
|
|
|
function kses_init() {
|
|
|
|
kses_remove_filters();
|
|
|
|
|
2015-06-12 19:48:26 +02:00
|
|
|
if ( ! current_user_can( 'unfiltered_html' ) ) {
|
2005-10-06 01:58:16 +02:00
|
|
|
kses_init_filters();
|
2015-06-12 19:48:26 +02:00
|
|
|
}
|
2003-12-24 21:43:04 +01:00
|
|
|
}
|
2006-02-28 05:22:24 +01:00
|
|
|
|
2010-01-09 11:03:55 +01:00
|
|
|
/**
|
2018-04-28 15:58:21 +02:00
|
|
|
* Filters an inline style attribute and removes disallowed rules.
|
2010-01-09 11:03:55 +01:00
|
|
|
*
|
|
|
|
* @since 2.8.1
|
Docs: Move `@since` notes from the `safe_style_css` filter to the `safecss_filter_attr()` function.
The filter allows to modify the list of allowed CSS attributes, however support for specific CSS attributes is added to the function rather than the filter.
Follow-up to [37931], [38121], [42880], [44136], [44531], [45242], [45363], [46235], [46793], [50634], [50923].
Props tmatsuur, muhammadfaizanhaidar, sabernhardt.
Fixes #53731.
Built from https://develop.svn.wordpress.org/trunk@51729
git-svn-id: http://core.svn.wordpress.org/trunk@51335 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-09-03 03:37:57 +02:00
|
|
|
* @since 4.4.0 Added support for `min-height`, `max-height`, `min-width`, and `max-width`.
|
|
|
|
* @since 4.6.0 Added support for `list-style-type`.
|
|
|
|
* @since 5.0.0 Added support for `background-image`.
|
|
|
|
* @since 5.1.0 Added support for `text-transform`.
|
|
|
|
* @since 5.2.0 Added support for `background-position` and `grid-template-columns`.
|
|
|
|
* @since 5.3.0 Added support for `grid`, `flex` and `column` layout properties.
|
|
|
|
* Extend `background-*` support of individual properties.
|
|
|
|
* @since 5.3.1 Added support for gradient backgrounds.
|
|
|
|
* @since 5.7.1 Added support for `object-position`.
|
|
|
|
* @since 5.8.0 Added support for `calc()` and `var()` values.
|
2016-01-09 02:45:26 +01:00
|
|
|
*
|
|
|
|
* @param string $css A string of CSS rules.
|
|
|
|
* @param string $deprecated Not used.
|
2018-04-28 15:58:21 +02:00
|
|
|
* @return string Filtered string of CSS rules.
|
2010-01-09 11:03:55 +01:00
|
|
|
*/
|
2009-07-08 11:54:34 +02:00
|
|
|
function safecss_filter_attr( $css, $deprecated = '' ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! empty( $deprecated ) ) {
|
2020-01-29 01:45:18 +01:00
|
|
|
_deprecated_argument( __FUNCTION__, '2.8.1' ); // Never implemented.
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2009-12-30 17:23:39 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$css = wp_kses_no_null( $css );
|
|
|
|
$css = str_replace( array( "\n", "\r", "\t" ), '', $css );
|
2009-07-04 06:49:39 +02:00
|
|
|
|
2018-12-14 02:41:36 +01:00
|
|
|
$allowed_protocols = wp_allowed_protocols();
|
2009-07-04 06:49:39 +02:00
|
|
|
|
2010-06-30 19:46:37 +02:00
|
|
|
$css_array = explode( ';', trim( $css ) );
|
2014-03-26 15:57:15 +01:00
|
|
|
|
|
|
|
/**
|
Docs: Move `@since` notes from the `safe_style_css` filter to the `safecss_filter_attr()` function.
The filter allows to modify the list of allowed CSS attributes, however support for specific CSS attributes is added to the function rather than the filter.
Follow-up to [37931], [38121], [42880], [44136], [44531], [45242], [45363], [46235], [46793], [50634], [50923].
Props tmatsuur, muhammadfaizanhaidar, sabernhardt.
Fixes #53731.
Built from https://develop.svn.wordpress.org/trunk@51729
git-svn-id: http://core.svn.wordpress.org/trunk@51335 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-09-03 03:37:57 +02:00
|
|
|
* Filters the list of allowed CSS attributes.
|
2014-03-26 15:57:15 +01:00
|
|
|
*
|
|
|
|
* @since 2.8.1
|
|
|
|
*
|
2018-04-28 15:58:21 +02:00
|
|
|
* @param string[] $attr Array of allowed CSS attributes.
|
2014-03-26 15:57:15 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
$allowed_attr = apply_filters(
|
2018-08-17 03:51:36 +02:00
|
|
|
'safe_style_css',
|
|
|
|
array(
|
2017-12-01 00:11:00 +01:00
|
|
|
'background',
|
|
|
|
'background-color',
|
2018-12-14 02:41:36 +01:00
|
|
|
'background-image',
|
2019-04-18 07:56:51 +02:00
|
|
|
'background-position',
|
2019-09-23 00:17:57 +02:00
|
|
|
'background-size',
|
|
|
|
'background-attachment',
|
|
|
|
'background-blend-mode',
|
2017-12-01 00:11:00 +01:00
|
|
|
|
|
|
|
'border',
|
2019-09-23 00:17:57 +02:00
|
|
|
'border-radius',
|
2017-12-01 00:11:00 +01:00
|
|
|
'border-width',
|
|
|
|
'border-color',
|
|
|
|
'border-style',
|
|
|
|
'border-right',
|
|
|
|
'border-right-color',
|
|
|
|
'border-right-style',
|
|
|
|
'border-right-width',
|
|
|
|
'border-bottom',
|
|
|
|
'border-bottom-color',
|
2021-11-09 03:17:17 +01:00
|
|
|
'border-bottom-left-radius',
|
|
|
|
'border-bottom-right-radius',
|
2017-12-01 00:11:00 +01:00
|
|
|
'border-bottom-style',
|
|
|
|
'border-bottom-width',
|
2021-11-08 20:19:58 +01:00
|
|
|
'border-bottom-right-radius',
|
|
|
|
'border-bottom-left-radius',
|
2017-12-01 00:11:00 +01:00
|
|
|
'border-left',
|
|
|
|
'border-left-color',
|
|
|
|
'border-left-style',
|
|
|
|
'border-left-width',
|
|
|
|
'border-top',
|
|
|
|
'border-top-color',
|
2021-11-09 03:17:17 +01:00
|
|
|
'border-top-left-radius',
|
|
|
|
'border-top-right-radius',
|
2017-12-01 00:11:00 +01:00
|
|
|
'border-top-style',
|
|
|
|
'border-top-width',
|
2021-11-08 20:19:58 +01:00
|
|
|
'border-top-left-radius',
|
|
|
|
'border-top-right-radius',
|
2017-12-01 00:11:00 +01:00
|
|
|
|
|
|
|
'border-spacing',
|
|
|
|
'border-collapse',
|
|
|
|
'caption-side',
|
|
|
|
|
2019-09-23 00:17:57 +02:00
|
|
|
'columns',
|
|
|
|
'column-count',
|
|
|
|
'column-fill',
|
|
|
|
'column-gap',
|
|
|
|
'column-rule',
|
|
|
|
'column-span',
|
|
|
|
'column-width',
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
'color',
|
2021-11-08 20:19:58 +01:00
|
|
|
'filter',
|
2017-12-01 00:11:00 +01:00
|
|
|
'font',
|
|
|
|
'font-family',
|
|
|
|
'font-size',
|
|
|
|
'font-style',
|
|
|
|
'font-variant',
|
|
|
|
'font-weight',
|
|
|
|
'letter-spacing',
|
|
|
|
'line-height',
|
2018-03-27 02:54:34 +02:00
|
|
|
'text-align',
|
2017-12-01 00:11:00 +01:00
|
|
|
'text-decoration',
|
|
|
|
'text-indent',
|
2018-03-27 02:54:34 +02:00
|
|
|
'text-transform',
|
2017-12-01 00:11:00 +01:00
|
|
|
|
|
|
|
'height',
|
|
|
|
'min-height',
|
|
|
|
'max-height',
|
|
|
|
|
|
|
|
'width',
|
|
|
|
'min-width',
|
|
|
|
'max-width',
|
|
|
|
|
|
|
|
'margin',
|
|
|
|
'margin-right',
|
|
|
|
'margin-bottom',
|
|
|
|
'margin-left',
|
|
|
|
'margin-top',
|
|
|
|
|
|
|
|
'padding',
|
|
|
|
'padding-right',
|
|
|
|
'padding-bottom',
|
|
|
|
'padding-left',
|
|
|
|
'padding-top',
|
|
|
|
|
2019-05-18 06:34:52 +02:00
|
|
|
'flex',
|
2019-09-23 00:17:57 +02:00
|
|
|
'flex-basis',
|
|
|
|
'flex-direction',
|
|
|
|
'flex-flow',
|
2019-05-18 06:34:52 +02:00
|
|
|
'flex-grow',
|
|
|
|
'flex-shrink',
|
2019-09-23 00:17:57 +02:00
|
|
|
|
|
|
|
'grid-template-columns',
|
|
|
|
'grid-auto-columns',
|
|
|
|
'grid-column-start',
|
|
|
|
'grid-column-end',
|
|
|
|
'grid-column-gap',
|
|
|
|
'grid-template-rows',
|
|
|
|
'grid-auto-rows',
|
|
|
|
'grid-row-start',
|
|
|
|
'grid-row-end',
|
|
|
|
'grid-row-gap',
|
|
|
|
'grid-gap',
|
|
|
|
|
|
|
|
'justify-content',
|
|
|
|
'justify-items',
|
|
|
|
'justify-self',
|
|
|
|
'align-content',
|
|
|
|
'align-items',
|
|
|
|
'align-self',
|
2019-05-18 06:34:52 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
'clear',
|
|
|
|
'cursor',
|
|
|
|
'direction',
|
|
|
|
'float',
|
2020-06-28 13:53:04 +02:00
|
|
|
'list-style-type',
|
2021-04-02 14:41:09 +02:00
|
|
|
'object-position',
|
2017-12-01 00:11:00 +01:00
|
|
|
'overflow',
|
|
|
|
'vertical-align',
|
|
|
|
)
|
|
|
|
);
|
|
|
|
|
2018-12-14 02:41:36 +01:00
|
|
|
/*
|
|
|
|
* CSS attributes that accept URL data types.
|
|
|
|
*
|
|
|
|
* This is in accordance to the CSS spec and unrelated to
|
|
|
|
* the sub-set of supported attributes above.
|
|
|
|
*
|
|
|
|
* See: https://developer.mozilla.org/en-US/docs/Web/CSS/url
|
|
|
|
*/
|
|
|
|
$css_url_data_types = array(
|
|
|
|
'background',
|
|
|
|
'background-image',
|
|
|
|
|
|
|
|
'cursor',
|
|
|
|
|
|
|
|
'list-style',
|
|
|
|
'list-style-image',
|
|
|
|
);
|
|
|
|
|
2019-11-28 01:29:02 +01:00
|
|
|
/*
|
|
|
|
* CSS attributes that accept gradient data types.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
$css_gradient_data_types = array(
|
|
|
|
'background',
|
|
|
|
'background-image',
|
|
|
|
);
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( empty( $allowed_attr ) ) {
|
2009-07-04 06:49:39 +02:00
|
|
|
return $css;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2009-07-04 06:49:39 +02:00
|
|
|
|
|
|
|
$css = '';
|
|
|
|
foreach ( $css_array as $css_item ) {
|
2020-05-16 20:42:12 +02:00
|
|
|
if ( '' === $css_item ) {
|
2009-07-04 06:49:39 +02:00
|
|
|
continue;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2018-12-14 02:41:36 +01:00
|
|
|
|
|
|
|
$css_item = trim( $css_item );
|
|
|
|
$css_test_string = $css_item;
|
|
|
|
$found = false;
|
|
|
|
$url_attr = false;
|
2019-11-28 01:29:02 +01:00
|
|
|
$gradient_attr = false;
|
2018-12-14 02:41:36 +01:00
|
|
|
|
2009-07-04 06:49:39 +02:00
|
|
|
if ( strpos( $css_item, ':' ) === false ) {
|
|
|
|
$found = true;
|
|
|
|
} else {
|
2018-12-14 02:41:36 +01:00
|
|
|
$parts = explode( ':', $css_item, 2 );
|
|
|
|
$css_selector = trim( $parts[0] );
|
|
|
|
|
|
|
|
if ( in_array( $css_selector, $allowed_attr, true ) ) {
|
2019-11-28 01:29:02 +01:00
|
|
|
$found = true;
|
|
|
|
$url_attr = in_array( $css_selector, $css_url_data_types, true );
|
|
|
|
$gradient_attr = in_array( $css_selector, $css_gradient_data_types, true );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2009-07-04 06:49:39 +02:00
|
|
|
}
|
2018-12-14 02:41:36 +01:00
|
|
|
|
|
|
|
if ( $found && $url_attr ) {
|
|
|
|
// Simplified: matches the sequence `url(*)`.
|
|
|
|
preg_match_all( '/url\([^)]+\)/', $parts[1], $url_matches );
|
|
|
|
|
|
|
|
foreach ( $url_matches[0] as $url_match ) {
|
|
|
|
// Clean up the URL from each of the matches above.
|
|
|
|
preg_match( '/^url\(\s*([\'\"]?)(.*)(\g1)\s*\)$/', $url_match, $url_pieces );
|
|
|
|
|
|
|
|
if ( empty( $url_pieces[2] ) ) {
|
|
|
|
$found = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
$url = trim( $url_pieces[2] );
|
|
|
|
|
2020-02-09 17:55:09 +01:00
|
|
|
if ( empty( $url ) || wp_kses_bad_protocol( $url, $allowed_protocols ) !== $url ) {
|
2018-12-14 02:41:36 +01:00
|
|
|
$found = false;
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
// Remove the whole `url(*)` bit that was matched above from the CSS.
|
|
|
|
$css_test_string = str_replace( $url_match, '', $css_test_string );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-28 01:29:02 +01:00
|
|
|
if ( $found && $gradient_attr ) {
|
|
|
|
$css_value = trim( $parts[1] );
|
|
|
|
if ( preg_match( '/^(repeating-)?(linear|radial|conic)-gradient\(([^()]|rgb[a]?\([^()]*\))*\)$/', $css_value ) ) {
|
|
|
|
// Remove the whole `gradient` bit that was matched above from the CSS.
|
|
|
|
$css_test_string = str_replace( $css_value, '', $css_test_string );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-03 01:46:11 +02:00
|
|
|
if ( $found ) {
|
2021-05-17 23:04:59 +02:00
|
|
|
// Allow CSS calc().
|
|
|
|
$css_test_string = preg_replace( '/calc\(((?:\([^()]*\)?|[^()])*)\)/', '', $css_test_string );
|
|
|
|
// Allow CSS var().
|
|
|
|
$css_test_string = preg_replace( '/\(?var\(--[a-zA-Z0-9_-]*\)/', '', $css_test_string );
|
|
|
|
|
|
|
|
// Check for any CSS containing \ ( & } = or comments,
|
|
|
|
// except for url(), calc(), or var() usage checked above.
|
2020-06-18 23:01:11 +02:00
|
|
|
$allow_css = ! preg_match( '%[\\\(&=}]|/\*%', $css_test_string );
|
|
|
|
|
2020-06-03 01:46:11 +02:00
|
|
|
/**
|
2020-06-18 23:01:11 +02:00
|
|
|
* Filters the check for unsafe CSS in `safecss_filter_attr`.
|
2020-06-03 01:46:11 +02:00
|
|
|
*
|
2020-06-18 23:01:11 +02:00
|
|
|
* Enables developers to determine whether a section of CSS should be allowed or discarded.
|
|
|
|
* By default, the value will be false if the part contains \ ( & } = or comments.
|
|
|
|
* Return true to allow the CSS part to be included in the output.
|
2020-06-03 01:46:11 +02:00
|
|
|
*
|
|
|
|
* @since 5.5.0
|
|
|
|
*
|
2020-06-18 23:01:11 +02:00
|
|
|
* @param bool $allow_css Whether the CSS in the test string is considered safe.
|
2020-06-20 14:02:12 +02:00
|
|
|
* @param string $css_test_string The CSS string to test.
|
2020-06-03 01:46:11 +02:00
|
|
|
*/
|
2020-06-18 23:01:11 +02:00
|
|
|
$allow_css = apply_filters( 'safecss_filter_attr_allow_css', $allow_css, $css_test_string );
|
|
|
|
|
2021-08-05 14:59:58 +02:00
|
|
|
// Only add the CSS part if it passes the regex check.
|
2020-06-18 23:01:11 +02:00
|
|
|
if ( $allow_css ) {
|
2020-06-03 01:46:11 +02:00
|
|
|
if ( '' !== $css ) {
|
|
|
|
$css .= ';';
|
|
|
|
}
|
2020-06-18 23:01:11 +02:00
|
|
|
|
2020-06-03 01:46:11 +02:00
|
|
|
$css .= $css_item;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2009-07-04 06:49:39 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $css;
|
|
|
|
}
|
2012-09-10 18:19:54 +02:00
|
|
|
|
|
|
|
/**
|
2020-06-28 16:02:06 +02:00
|
|
|
* Helper function to add global attributes to a tag in the allowed HTML list.
|
2012-09-10 18:19:54 +02:00
|
|
|
*
|
|
|
|
* @since 3.5.0
|
2022-03-21 01:13:05 +01:00
|
|
|
* @since 5.0.0 Added support for `data-*` wildcard attributes.
|
|
|
|
* @since 6.0.0 Added `dir`, `lang`, and `xml:lang` to global attributes.
|
|
|
|
*
|
2012-09-10 18:19:54 +02:00
|
|
|
* @access private
|
2018-04-28 15:58:21 +02:00
|
|
|
* @ignore
|
2012-09-10 18:19:54 +02:00
|
|
|
*
|
|
|
|
* @param array $value An array of attributes.
|
|
|
|
* @return array The array of attributes with global attributes added.
|
|
|
|
*/
|
|
|
|
function _wp_add_global_attributes( $value ) {
|
|
|
|
$global_attributes = array(
|
2018-12-12 04:15:24 +01:00
|
|
|
'aria-describedby' => true,
|
|
|
|
'aria-details' => true,
|
|
|
|
'aria-label' => true,
|
|
|
|
'aria-labelledby' => true,
|
|
|
|
'aria-hidden' => true,
|
|
|
|
'class' => true,
|
2022-03-21 01:13:05 +01:00
|
|
|
'data-*' => true,
|
|
|
|
'dir' => true,
|
2018-12-12 04:15:24 +01:00
|
|
|
'id' => true,
|
2022-03-21 01:13:05 +01:00
|
|
|
'lang' => true,
|
2018-12-12 04:15:24 +01:00
|
|
|
'style' => true,
|
|
|
|
'title' => true,
|
|
|
|
'role' => true,
|
2022-03-21 01:13:05 +01:00
|
|
|
'xml:lang' => true,
|
2012-09-10 18:19:54 +02:00
|
|
|
);
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( true === $value ) {
|
2012-09-10 18:19:54 +02:00
|
|
|
$value = array();
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-09-10 18:19:54 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( is_array( $value ) ) {
|
2012-09-10 18:19:54 +02:00
|
|
|
return array_merge( $value, $global_attributes );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-09-10 18:19:54 +02:00
|
|
|
|
|
|
|
return $value;
|
|
|
|
}
|
2021-12-02 01:56:01 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Helper function to check if this is a safe PDF URL.
|
|
|
|
*
|
|
|
|
* @since 5.9.0
|
|
|
|
* @access private
|
|
|
|
* @ignore
|
|
|
|
*
|
|
|
|
* @param string $url The URL to check.
|
|
|
|
* @return bool True if the URL is safe, false otherwise.
|
|
|
|
*/
|
2021-12-03 03:44:00 +01:00
|
|
|
function _wp_kses_allow_pdf_objects( $url ) {
|
2021-12-02 01:56:01 +01:00
|
|
|
// We're not interested in URLs that contain query strings or fragments.
|
2021-12-06 12:08:01 +01:00
|
|
|
if ( str_contains( $url, '?' ) || str_contains( $url, '#' ) ) {
|
2021-12-02 01:56:01 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If it doesn't have a PDF extension, it's not safe.
|
2021-12-06 12:08:01 +01:00
|
|
|
if ( ! str_ends_with( $url, '.pdf' ) ) {
|
2021-12-02 01:56:01 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the URL host matches the current site's media URL, it's safe.
|
|
|
|
$upload_info = wp_upload_dir( null, false );
|
2021-12-03 03:44:00 +01:00
|
|
|
$parsed_url = wp_parse_url( $upload_info['url'] );
|
|
|
|
$upload_host = isset( $parsed_url['host'] ) ? $parsed_url['host'] : '';
|
|
|
|
$upload_port = isset( $parsed_url['port'] ) ? ':' . $parsed_url['port'] : '';
|
2021-12-06 12:08:01 +01:00
|
|
|
|
|
|
|
if ( str_starts_with( $url, "http://$upload_host$upload_port/" )
|
|
|
|
|| str_starts_with( $url, "https://$upload_host$upload_port/" )
|
|
|
|
) {
|
2021-12-02 01:56:01 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|