Beschrijving
THE TOP RATED WORDPRESS SECURITY AND FIREWALL PLUGIN
All-in-One Security (AIOS) is a security plugin designed especially for WordPress, now brought to you from the team at UpdraftPlus.
Customers love All-In-One Security because it’s easy to use, and it does a whole lot for free.
All-In-One Security gives you Login Security Tools, to keep bots at bay and protect your website from brute force attacks.
Our Web Application Firewall gives you automatic protection from security threats.
Content Protection Features protect what you’ve worked so hard to build; All-In-One Security eliminates comment spam and prevents other websites from stealing your content with features like iFrame prevention and copywriting protection.
Still on the fence?
- We’re currently the Only WordPress Security Plugin with a 5 Star user rating across more than 1 million installs.
- Our security team maintains a list of known exploits, actively building protections against them and releasing these as new firewall rules to free and paying customers, at the same time.
- We’re already the world’s number one for backups, so you know you can trust us with the security of your website too.
LOGIN SECURITY FEATURE SUITE
Protect against brute-force attacks and keep bots at bay. All-In-One Security takes WordPress’ default login security features to a whole new level.
- Supports best practice: All-In-One Security detects if an account has the default ‘admin’ username or if a user has identical login and display names, prompting the user to change this in support of better security practices.
- Hide login page from bots: Configure a custom URL for the WordPress ‘Admin’ login page, making it harder for bots to find.
- Change default
wp_
prefix: Hackers use automated code to attack websites like yours. Make life harder for them and protect your site with this simple but effective AIOS security feature. - Login lockout: External users making multiple login attempts can be locked out for a configured period of time. You can also lockout users with invalid usernames. See a list of all locked out users and unlock with one click.
- Reporting: All-In-One Security provides a wealth of information about website users. View activity by username, IP address, login and logout dates and times. See a list of users currently logged in, and a list of all failed login attempts.
- Force logouts: Ensure users don’t stay logged in indefinitely. With All-In-One Security you can force logouts for all users after a configurable amount of time.
- Robot verification: For additional security and to prevent spam registrations, implement Cloudflare Turnstile, Google reCAPTCHA, plain maths CAPTCHA or a honeypot to registration pages, or enable manual approval of user accounts instead.
- Stops user enumeration: Prevent external users and bots from fetching user information via author permalink.
- Two-factor authentication: All-In-One Security TFA supports Google Authenticator, Microsoft Authenticator, Authy and many more.
- Password strength tool: Calculates how long it would take for your password to be cracked through a brute force attack.
- General visitor lockout Put your site into “maintenance mode” and lock down the front-end to all visitors. This can be useful while doing back end tasks, like performing site upgrades or investigating security threats.
- WordPress Salts Security Feature Extended: All-In-One Security adds 64 new characters to WordPress Salts and changes them weekly, making it even more challenging for hackers to crack your users’ WordPress passwords.
FIREWALL & FILE PROTECTION SECURITY SUITE
A Web Application Firewall (WAF) is your website’s first line of defence, protecting your site by monitoring traffic and blocking malicious requests.
- Progressively activate firewall settings: These range from basic, intermediate and advanced.
- Automatic protection from the latest threats: Our team maintains a list of known exploits, actively building protections against them which are then released as new firewall rules to free and paying customers.
- 6G blacklist: All-In-One Security incorporates ‘6G Blacklist’ firewall rules, protecting your site against a known list of malicious URL requests, bots, spam referrers and other attacks (courtesy of Perishable Press).
- Protect against fake Google bots: Bots presenting as Google crawlers can steal your content and litter your webpage with comment spam. Protect against it with the All-In-One Security Web Application Firewall.
- Blacklist functionality: Ban users by IP address, IP address range or by specifying user agents.
- Prevent DDOS attacks: Prevent malicious users from performing DDOS attacks through a known vulnerability in WordPress XML-RPC pingback functionality.
- Prevent image hotlinking: Protect server bandwidth and your website’s content by preventing other sites from using your imagery via hotlinking.
- Cross site scripting (XSS) protection: All-In-One Security prevents attackers from injecting malicious script into your website via a special cookie.
- File change detection: Security scanners alert you to file changes in your WordPress system, so you can see if a change is legitimate or suspicious, and investigate as appropriate.
- Disable PHP file editing: Protect your PHP code by disabling the ability to edit files in the WordPress administration area.
- Permission setting alerts: Identify files or folders where the permission settings are not secure and correct with one-click.
- Ability to create custom rules: Advanced users can add custom rules to block access to various resources on your site.
- Access prevention: Prevent external users from accessing the readme.html, license.txt and wp-config-sample.php files of your WordPress site.
CONTENT PROTECTION SECURITY SUITE
Eliminate spam, protect your WordPress content, and your search engine rankings with these important security features from All-In-One-Security.
- Comment SPAM prevention : Webpages littered with spam comments damage your brand, effect the user experience and impact SEO.
All-In-One Security stops SPAM at the source by preventing comments that originate from other domains. AIOS automatically and permanently blocks spammers’ IP addresses. Site owners can use Cloudflare Turnstile or Google reCAPTCHA to reduce comment spam and block malicious users with just one click. - iFrame protection: Preventing other websites from reproducing your content via an ‘iFrame’ is a useful security feature that protects your intellectual property and your website visitors.
- Copywriting protection: Stop users from stealing your content by disabling the right-click, select and copy text function.
- Disable RSS and Atom Feeds: RSS and Atom Feeds can be used by bots to ‘scrape’ your website content and present it as their own. This feature prevents that by disabling RSS and Atom Feeds on your website.
LATEST AND GENERAL SECURITY FEATURES
- Audit Log: The All-In-One Security audit log gives Admins a view of events taking place on their WordPress website. They can see if anything strange is happening and detect security risks. For example, you can see if a plugin or theme has been added, removed, updated, activated or deactivated without your knowledge or consent.
INTERESTED IN AIOS PREMIUM?
For even greater protections, consider All-In-One Security (AIOS) Premium. It’s one of the most cost-effective and comprehensive WordPress Security plugins on the market and extends the powers of ‘Free’ with:
MALWARE SCANNING (Premium only)
Finding out by accident that your website’s security has been compromised due to malware is too late.
Malware can have a dramatic effect on search rankings. It can slow your site down, access customer data, send unsolicited emails, change your content or prevent users from accessing it.
- Alerts you to blacklisting: Search engines can very quickly blacklist a site hacked with malicious code. All-In-One Security Premium monitors your site’s status daily and alerts you if you’ve been blacklisted.
- Notification if something is amiss: We’ll notify you of any malware issues within 24 hours so you can take action, before it’s too late.
- Response time monitoring: You’ll know immediately if website response time is negatively affected.
- Up-time monitoring: All-In-One Security checks website uptime every 5 minutes. We’ll notify you if your site/server goes down.
- Flexible assignment: Register and remove WordPress sites from security scanning at any time.
- Security Reports: Security Reports are available via the ‘My Account’ page and directly via email.
FLEXIBLE TWO-FACTOR AUTHENTICATION (PREMIUM ONLY)
TFA is available in our free packages. All-In-One Security Premium affords whole new levels of control over how TFA is implemented.
- Role specific configuration: Make TFA compulsory for certain roles, e.g. for admin and editor roles.
- Require TFA after set time period: For example, you could require all admins to have TFA once their accounts are a week old.
- Trusted Devices: Ask for TFA after a chosen number of days for trusted devices instead of on every login.
- Anti-bot Protection: Option to hide the existence of forms on WooCommerce login pages unless JavaScript is active.
- Customise design layout: Customise the design of TFA so that it aligns with your existing web design.
- Emergency Codes: Generate a one-time use emergency code to allow access if your device is lost.
- Multisite Compatible: Compatible with WordPress multisite networks and sub-sites.
- Support for login forms: Support for WooCommerce and Affiliates-WP, Elementor Pro, bbPress and all third-party login forms without any further coding needed. Also compatible with ‘Theme my Login’
SMART 404 BLOCKING (PREMIUM ONLY)
404 errors occur when someone legitimately mistypes a URL, but they’re also generated by hackers searching for security weaknesses in your site.
- Block bots producing 404s: All-In-One Security Premium automatically and permanently blocks IP addresses of bots and hackers based on how many 404 errors they generate.
- Reporting: Handy charts keep you informed of how many 404s have occurred and which IP address or country is producing them
COUNTRY BLOCKING (PREMIUM ONLY)
Most security attacks come from a handful of countries and so it’s possible to prevent most attacks with our country blocking tool.
* Block traffic based on country of origin: All-In-One Security Premium utilises an IP database that promises 99.5% accuracy.
* Block traffic to specific pages: Block access to your whole WordPress site or on a page-by-page basis.
* Whitelist some users from blocked countries: Whitelist IP addresses or IP ranges even if they are part of a blocked country.
PREMIUM SUPPORT
- Unlimited support: Personalised, email support as and when you need it.
- Fastest response times: We offer a response time of three days. 99% of All-In-One Security Premium customers receive a response to
their enquiry within 24 hours.
Plugin Ondersteuning
- If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via aiosplugin.com
Ontwikkelaars
- Indien je een ontwikkelaar bent en je hebt extra hooks of filters nodig voor deze plugin laat ons dat dan weten s.v.p.
Vertalingen
- All-In-One Security plugin kan vertaald worden naar elke taal.
Momenteel beschikbare vertalingen:
- Engels
- Duits
- Spaans
- Frans
- Hongaars
- Italiaans
- Zweeds
- Russisch
- Chinees
- Portugees (Brazilië)
- Perzisch
Privacybeleid
This plugin may collect IP addresses for security reasons such as mitigating brute force login threats and malicious activity.
The collected information is stored on your server. No information is transmitted to third parties or remote server locations.
Gebruik
Ga naar de instellingen menu nadat u het activeren plugin en volg de instructies.
Blokken
Deze plugin heeft 1 blok.
- All-In-One Security (AIOS) – Security and Firewall
Installatie
Om te beginnen met je WordPress site veiliger te maken:
- Upload het bestand ‘all-in-one-wp-security.zip’ vanaf de pagina Plugins->Nieuw toevoegen in het WordPress beheerpaneel.
- Activeer de plugin via het ‘Plugins’ menu in WordPress
- Ga naar het menu Instellingen onder ‘WP-beveiliging’ en activeer de beveiligingsfuncties van de plug-in .
FAQ
-
How is All-In-One Security (AIOS) supported?
-
Customers of ‘Free’ AIOS can get support from this very webpage. Select ‘Support’ from the tabs above and post a topic. We aim to respond to all support requests within 24 hours during the working week.
-
Is All-In-One Security compatible with other plugins?
-
Yes. AIOS works smoothly with most popular WordPress plugins.
-
Is All-in-One-Security regularly updated?
-
Yes. WordPress Security is something that evolves over time. We update AIOS with new security features (and fixes if required) on a regular basis so you can be assured that your site will keep benefitting from new security protection techniques for as long as you need them.
-
Will All-In-One Security slow down my website?
-
Nee.
-
The decision is yours to make. ‘Free’ AIOS incorporates a web application firewall, comprehensive login security tools including two-factor authentication and all the latest recommended WordPress security practices and techniques.
But if your WordPress site is a business website, if it showcases what you do, or who you are, we generally recommend AIOS Premium. Prices start from as little as $70 for the year. -
AIOS Premium scans your WordPress website for malware whilst also monitoring your site’s response time and uptime, notifying you of any issues within 24 hours, AIOS Premium customers also benefit from hands-on ticketed support via email (rather than via WP Support forums).
Additional security tools include Country Blocking, Smart 404 Error Blocking and Advanced Two Factor Authentication.
More information is available from our All-In-One Security website -
In the web shop, purchase your preferred subscription. After completing the purchase, you will be emailed a link to download the plugin. You can also access the link through your “My Account” page.
After downloading the zip file, install and activate the plugin through WP Admin->Plugins->Add New->Upload Plugin.
The premium extends the free version. Therefore you should keep the free version installed and active. You will also be prompted to enter your AIOS username and password to connect your site to licenses. This will allow the plugin to receive updates. -
Yes, you need to have the free version of the plugin installed and activated before installing Premium. Premium plugin is an add-on that requires the free version to be present.
-
Does All-In-One Security work with multi-site network installations?
-
Yes, AIOS Premium is compatible with WordPress multisites. For multisite networks, the protection will apply to the network as a whole, and the dashboard and options will be available on the main site of the WordPress multisite.
-
Can a WordPress security plugin stop all attacks on my site?
-
There is no 100% guarantee that a security plugin will be able to protect against all attacks, as there is always the possibility of unknown WordPress vulnerabilities or other unexpected factors, and attackers are always seeking to develop new ways around protections. However, All-In-One Security gives good protection against known attack methods, and is under continuous development to monitor and improve protections.
-
Does All-In-One Security work on all servers and hosts?
-
AIOS should be compatible with most hosts, unless the host has specifically restricted the use of security plugins. Similarly, certain features may not work on some servers, especially Windows/IIS platforms. Features that use the ‘.htaccess’ file will not apply on a Windows IIS server or NGINX server (but development is ongoing to port those protections to all servers).
-
Development and test sites require their own licence if updates to the plugin are needed.
However, these sites can be disconnected from the licence when they have served their purpose. You can disconnect the licence via the site’s WP Admin->Plugins page, and it will be available to be reassigned to a different site. -
Is the All In One Security & Firewall Plugin GDPR and other privacy law compliant?
-
Please read more about GDPR compliance here: https://aiosplugin.com/privacy-policy/ .
Beoordelingen
Bijdragers & ontwikkelaars
“All-In-One Security (AIOS) – Security and Firewall” is open source software. De volgende personen hebben bijgedragen aan deze plugin.
Bijdragers“All-In-One Security (AIOS) – Security and Firewall” is vertaald in 12 talen. Dank voor de vertalers voor hun bijdragen.
Vertaal “All-In-One Security (AIOS) – Security and Firewall” naar jouw taal.
Interesse in ontwikkeling?
Bekijk de code, haal de SVN repository op, of abonneer je op het ontwikkellog via RSS.
Changelog
5.2.4 – 16/Aug/2023
- FIX: Ported firewall settings from disabling on upgrade
5.2.3 – 09/Aug/2023
- FIX: Fatal error “set_value() on null” when the firewall config is missing
- FIX: PHP notices when running under cron
- FIX: Revert change that caused the Brute force login whitelist to show the server IPs and not the users
- TWEAK: Add communication mechanism so that firewall can send data to WordPress
- TWEAK: Remove incorrect mentions of the .htaccess file on PHP Firewall rules
5.2.2 – 04/Aug/2023
- FEATURE: An allow list of IP addresses which bypass the firewall rules
- FIX: Fix get_class() on null fatal error when updating via ManageWP
- FIX: No such file or directory notice generated by the firewall’s config file
- FIX: Only send the upgrade email if one or more of the ported rules had been enabled
- FIX: Fake Google bots are now blocked if bot server IP address does not resolve to a hostname
- FIX: Google reCaptcha now appears correctly on the WooCommerce checkout page
- FIX: Prevent Woocommerce auto login if manual registration approval is turned on
- FIX: Premium upgrade tab UI overlapping issue.
- FIX: Allow maintenance mode to be controlled via WP-CLI (Premium)
- FIX: Use the correct site id for login success events added to audit log table on Multisite
- FIX: Added missing features to the feature manager list
- FIX: A warning when using the update all command via WP-CLI
- TWEAK: AIOS settings based IP address is now used instead of the REMOTE_ADDR server variable for multiple wrong 2FA code notification
- TWEAK: Added ‘aios_audit_log_record_event’ filter to allow events to not be recorded
- TWEAK: Improve the feature item manager code structure making way for future improvements
- TWEAK: Login whitelist suggests both IPv4 and IPv6 addresses to whitelist.
- TWEAK: Move the ‘Custom rules’ tab from the ‘Firewall’ section to its own tab in the ‘Tools’ section
- TWEAK: Move the ‘Prevent hotlinking’ tab to the ‘File protection’ tab in the ‘Filesystem Security’ menu
- TWEAK: Moved all CAPTCHA settings to the ‘CAPTCHA settings’ tab in the ‘Brute Force’ menu
- TWEAK: Moved the ‘Password tool’ tab to the ‘Tools’ admin menu
- TWEAK: Moved the ‘Visitor lockout’ tab to the ‘Tools’ admin menu
- TWEAK: Moved the ‘User registration honeypot’ tab to the ‘Brute force’ admin menu
- TWEAK: Remove ‘Account activity table’ as these entires are also recorded in the audit log
- TWEAK: Removed the ‘Failed login records’ tab as previously announced, these are now recorded in the audit log
- TWEAK: Improve list table code performance
- TWEAK: Removed use of $_GET, $_POST, $_REQUEST from all template files making way for future improvements
5.2.1 – 12/Jul/2023
- FIX: Include helper class file from loader
- TWEAK: Conditionally load TFA block JavaScript
5.2.0 – 10/Jul/2023
- SECURITY: Remove authentication data from the stacktrace before saving to the database. This defect meant that a site administrator had the potential, between releases 5.1.9 to 5.2.0 (which purges the existing data), to know what site users’ passwords are. This information has limited value (an admin can already reset anyone’s password) except insofar as the passwords may be re-used by users on other sites. In that “hostile admin” scenario, your site has other problems (since the hostile admin has a whole raft of equivalent ways of causing mischief to users, especially if not on multisite where a site admin is potentially not a super admin and may not be able to install or configure plugins). This changelog has been expanded in response to incorrect reports which suggested a wider problem (for example, they did not mention that the attacker needs to already be logged in as an admin to read the log, or that upgrading to 5.2.0 deletes the affected data).
- SECURITY: Set tighter restrictions on what subsite admins can do in a multisite.
- FIX: After editing a file reset permissions back to the original permissions
- FIX: Corrected some broken links in the plugin
- FIX: Fatal error: cannot declare class
- FIX: Normalise all arguments in the stacktrace
- FIX: Wrong login entries added to login activity table on multisite when user logs into subsite they don’t belong to.
- FIX: Too many redirects error for forced logout users solved
- TWEAK: For Cronjob, WP CLI and AIOS_DISABLE_EXTERNAL_IP_ADDR defined constant do not use external services for user IP addresses. Silenced api.ipify.org request failed warning.
- TWEAK: Reset password page missing translation and generate password button added for renamed login page
- TWEAK: Added ‘aios_audit_log_event_user_ip’ filter to allow filtering of IP addresses in the audit log
- TWEAK: Added action hook “aios_reset_all_settings” for reset all settings.
- TWEAK: Renamed login page to have language change dropdown and other tweaks as per the WordPress 6.2
5.1.9 – 09/May/2023
- FEATURE: IP addresses – Blacklist manager functionality based on PHP instead of .htaccess rules. Added AIOS_DISABLE_BLACKLIST_IP_MANAGER constant, Define it in your wp-config.php to disable IP Blacklist manager.
- FEATURE: Detect spambots posting comments and discard it completely or mark as spam.
- FEATURE: Encrypt TFA secret keys that are stored in the database (extra protection in case of your database being hacked)
- FEATURE: Added a “Delete all” and “Delete filtered” bulk action to the audit log table
- FIX: Prevent Cloudflare Turnstile being added to login forms when no credentials where set
- FIX: Change where the audit log event handler is loaded to prevent an error on plugin deletion
- FIX: Fix context class checks to support cli
- TWEAK: Multisite super admin can access the subsite dashboard without login again if salt postfix enabled
- TWEAK: Captcha JavaScript file is unnecessarily loaded on some site pages if comment captcha or custom login captcha enabled
- TWEAK: Change some nonce checks to use our internal function to check user capability and nonces
- TWEAK: User registrations and successful logins are now recorded in the audit log
- TWEAK: Added a commands class and refactored AJAX handlers
- TWEAK: Captcha verification to prevent conflicts with some plugins that recall the WordPress authentication code
- TWEAK: Improve database table prefix feature UI.
- TWEAK: WordPress core updates are now recorded in the audit log
- TWEAK: Translation updates are now recorded in the audit log
- TWEAK: Add an entity changed event to the audit log when upgrader information is not available
- TWEAK: Automated emails sent by AIOS that failed to send due to from address
5.1.8 – 11/April/2023
- FIX: 404 detection – Individual record blacklisting, delete, temp block actions stopped working in 5.1.7
- FIX: Uncaught fatal error on null ‘set_value’
- FIX: Remove audit log event handler actions on plugin deletion to prevent an error
- FIX: Remove some audit log event handler on plugin deletion to prevent an error
- FIX: Get correct wp-config path when installed in a subdirectory
- TWEAK: AIOS_Helper::request_remote timed out exception ignored.
- TWEAK: Requests_IPv6 class name deprecated in WordPress 6.2.
- TWEAK: Failed login attempts are now recorded in the audit log
5.1.7 – 24/March/2023
- FIX: Prevent fatal error when calling get_server_detected_user_ip_address() when the firewall is not setup
- TWEAK: Clarify dashboard notice title and change image.
5.1.6 – 21/March/2023
- FEATURE: Added an audit log
- FEATURE: Add salt postfix option to improve your site’s security
- FEATURE: Shared library that can be used from the firewall.
- FIX: Rename login slug used like wp-login-RANDOM_SUFFIX showing 404 page issue solved and code clean up for multisite activation.
- FIX: Divi child theme conflict – Call to undefined function et_builder_get_fonts() in functions.php on line 208 solved.
- FIX: Captcha settings tab in multisite installation for subsites not showing
- FIX: Cron reschedule event error for hook aios_15_minutes_cron_event if plugin deactivated or uninstalled
- TWEAK: Stop user enumeration now shows 403 forbidden error code instead of 500 server error
- TWEAK: PHP 8.1 warning rawurldecode passing null instead type string is deprecated for block request string 6g rule
- TWEAK: Code clean up for disable cookie based brute force constant as rule moved to firewall
- TWEAK: Comment spam IP monitoring page UI
- TWEAK: Updated seasonal notices
- TWEAK: Improve internal code structure making way for future improvements
- TWEAK: Remove mention of the 6g firewall rules being .htaccess based as they are now php based
- TWEAK: Added new internal function to check user capability and nonces
- TWEAK: Improve config code with inline saving.
- TWEAK: Allow audit log to be filtered and exported to CSV
5.1.5 – 13/February/2023
- FEATURE: Added Cloudflare Turnstile CAPTCHA support
- FIX: Notices about undefined array key HTTP_USER_AGENT solved.
- FIX: New v5 features not saved in export file and not properly reset after uninstallation.
- FIX: File permission change being applied to the last record not selected one. Also, no longer change permissions when they are already tighter than the suggested.
- FIX: Fatal error ‘Call to a member function contains_contents() on null’
- TWEAK: Removed wrong information about login whitelist being implemented via htaccess.
- TWEAK: Refactoring settings tasks for WP CLI AIOS premium commands.
- TWEAK: Page load performance issue due to incompatible tfa premium plugin active check improved.
- TWEAK: Make sure translation domain is registered before attempting to use it
- TWEAK: Replaced click with press in text because users could be on mobile etc and not using a mouse.
- TWEAK: Registration, comment, Buddypress and bbPress admin pages to show notice enable the captcha settings.
- TWEAK: Improve the UI/UX for the 404 detection tab
- TWEAK: Improve internal code structure making way for future improvements
- TWEAK: PHP 8.2 deprecation warning for dynamic properties
- TWEAK: Remove the unintended ability for directory traversal and lack of escaping when outputting files with the “view system log” feature. This facility is only available to an administrator (who can of course already do anything on the site, so this has no security implications) and allow them to view (the last 50 lines) from any file or list any directory on the system where the web server has read access.
- FIX: Fatal error ‘Call to a member function contains_contents() on null’
- TWEAK: Firewall gets constants from a single source.
5.1.4 – 14/December/2022
- FEATURE: Add option to disable RSS and ATOM feeds.
- FIX: The IP address blacklist manager wasn’t working.
5.1.3 – 09/December/2022
- SECURITY: No longer save settings import files in a publicly accessible folder where they can be potentially indexed by search engines if the administrator does not actually import the settings (which deletes the import file)
- FEATURE: Implement firewall events system
- FIX: Protect subsites when firewall is loaded via plugins_hook
- TWEAK: Improve the UX for uploading import files
- TWEAK: Add a default CAPTCHA option making way for new CAPTCHAs in the future
5.1.2 – 07/December/2022
- FEATURE: User Agent – Blacklist manager functionality should be based on PHP instead .htaccess rules.
- FIX: Sorting by ‘status’ on the comment spam table
- FIX: Copy protection feature not working on iPhone
- FIX: Cookie based brute force prevention locks out if plugin deactivated and activated again.
- FIX: The notice to reapply .htaccess rules after reactivating the plugin is displayed on subsites.
- FIX: Various WordPress command line notices about undefined $_SERVER indexes
- FIX: Deativate and reactivate plugin firewall settings file sync issue solved.
- TWEAK: 2FA setting page to show premium options for AIOS premium.
- TWEAK: Remove characters that should not have been on the scanner page
- TWEAK: Organise firewall rules into subdirectories
- TWEAK: Added GDPR question answer to the AIOS WP org plugin’s FAQ section.
- TWEAK: Allow AIOS management permission to be filtered via
aios_management_permission
filter - TWEAK: Make use of is_main_site() function.
- TWEAK: Copy IP to clipboard when clicking on it at WP Security -> Brute Force -> Login whitelist.
- TWEAK: Better context detection for the firewall
5.1.1 – 16/November/2022
- SECURITY: Fixed a failure to check bulk action nonces, leading to a CSRF vulnerability. Exploitation would require an attacker to craft a link specifically for your site, and persuade you to click it whilst logged in; if you did so, this could result in bulk actions being carried out on AIOS list tables (e.g. delete entries from blocked IP address lists), with the attacker being restricted to deleting entries by database ID numbers that he cannot know directly (e.g. 15, 16, 17) and not IP address (e.g. 100.101.102.103).
- FEATURE: Cookie-based brute force prevention implemented with the new PHP based firewall system.
- FIX: AIOWPSecurity_WP_Loaded_Tasks::site_lockout_tasks() method visibility
- FIX: Prevent the dismiss notice button removing all notices from page including notices that contained important information
- FIX: Brute Force > Login Whitelist issue access password protected pages by user solved.
- FIX: Force logout link not working in the currently logged-in users list.
- FIX: Google reCAPTCHA site key and secret key are not verified immediately.
- TWEAK: Code style changes for scanner related pages and future item manager class.
- TWEAK: Capitalisation style reapply for firewall menu tabs.
- TWEAK: Instead login lockdown used login lockout word in UI and mail content. Changed constant AIOWPS_DISABLE_LOGIN_LOCKDOWN to AIOWPS_DISABLE_LOGIN_LOCKOUT.
- TWEAK: Update tabs, links to match capitalisation style of other UpdraftPlus plugins.
- TWEAK: Added the filter
aios_server_type
to override theAIOWPSecurity_Utility::get_server_type()
method’s return value. - TWEAK: Notice – Account activity logs, 404 event logs older than 90 days cleared automatically to show.
- TWEAK: Premium upgrade page FAQs linked to correct URL.
- TWEAK: IP address lookup called only once in same page request. Visitor blocking called when user is not logged in. User online information updated on login only.
- TWEAK: User login lockout – minimum lockout time length should be less than maximum lockout time length validated.
- TWEAK: Take a backup of wp-config before inserting firewall contents.
- TWEAK: Ability to downgrade the firewall’s protection which allows users to reverse the changes from setting up the firewall.
- TWEAK: Set a global context for $wp_file_descriptions context so that it gets assigned to correctly, preventing a subtle visual change in the theme editor
- TWEAK: Black Friday notice
- TWEAK: Update readme.txt file
5.1.0 – 12/October/2022
- FIX: The login loader is visible infinitely on the login screen and administrators can’t log in if the user has enabled maintenance mode and 2FA authentication simultaneously.
- FIX: Pressing the “Disable Firewall” button didn’t clear new 6G firewall rules.
- FIX: The application password was disabled by default on the activation of the AIOS plugin.
- FIX: The error occurred with the error message: Uncaught TypeError: fclose(): Argument #1 ($stream) must be of type resource, bool given in all-in-one-wp-security-and-firewall/classes/wp-security-utility-htaccess.php:164 in the server where the root folder is not writable.
- TWEAK: IP address lookup service whatismyipaddress removed, API for bot.whatismyipaddress.com is no longer available.
- TWEAK: The simple math captcha box was shown when the user was filling in the 2FA code at login time.
- TWEAK: firewall max upload limiet standaardwaarde verhoogd in plaats van 10MB tot 100MB.
- TWEAK: Google reCaptcha multilingual implemented to show in local language messages instead of English only.
- Aanpassing: Kopteksten, labels en knoppen updaten om overeen te komen met de hoofdletterstijl van andere plugins.
- TWEAK: Add premium upgrade tab.
5.0.9 – 06/October/2022
- FIX: PHP Notice: Only variables should be passed by reference in /wp-content/plugins/all-in-one-wp-security-and-firewall/classes/wp-security-notices.php on line 202.
- TWEAK: Auto disable the login whitelisting on upgrade for all server types and shown related notice.
- TWEAK : 2FA – Warning: Deprecated: Call get_controller(’totp’), not get_totp_controller() in /includes/simba-tfa/simba-tfa.php on line 713.
5.0.8 – 29/September/2022
- SECURITY/FEATURE: Fix IP address detection, and give IP address detection settings in the Admin Dashboard > WP Security > Settings > Advanced Settings, provide user guidance on how to use them, and notify the user if there any problem is apparent. Versions from 5.0.0 to 5.0.7 had a defect allowing an attacker to spoof their IP address, aiding them to avoid detection or locking out legitimate users. Thanks to Calvin Alkan for the responsible disclosure.
- FIX: The 403 forbidden error was shown on the wp login screen if the login url contains the redirect_to parameter and the deny bad query strings firewall feature is enabled on localhost.
- FIX: The PUT request method was blocked when the user enabled the 6G firewall.
- FIX: The login whitelisting didn’t work on servers not supporting .htaccess files, without this information being dislayed in the user interface. The feature is now ported to PHP so that it works on all servers. Thanks to Calvin Alkan for identifying this issue.
- TWEAK: Add index keys to the login lockdown, failed_logins and the permanent block tables to prevent poor database reading performance in the event of vast numbers of rows being stored in these tables (see the “SECURITY” item above, since the defect described there can allow this). Thanks to Calvin Alkan for identifying this issue.
- TWEAK: Resolve a PHP-firewall ‘Unable to locate workspace’ log message.
- TWEAK: Added a constant AIOS_DISABLE_GET_EXTERNAL_IP. Define this in your wp-config.php to disable getting the IP address via an external API when the IP retrieval method fail to get a valid IP address.
- TWEAK: Replace deprecated jQuery(document).ready() calls.
- TWEAK: Disable cookie access via JS and HTTP for cookie-based brute force prevention.
- TWEAK: Enhanced cookie storage mechanism for cookie-based brute force prevention. Thanks to Calvin Alkan for identifying this improvement.
- TWEAK: Display notice alerting the user that the block spam comment doesn’t work on non-apache servers in the block spam comment section. Thanks to Calvin Alkan for identifying this omission.
- TWEAK: Added a constant AIOS_DISABLE_LOGIN_WHITELIST. Define this in your wp-config.php to disable login IP whitelist.
5.0.7 – 08/September/2022
- FIX: The Login URL was prefixed with the site URL instead of the home URL when the home URL is different than the site URL.
- FIX: Rename login and cookie-based brute force protection couldn’t work simultaneously when the permalink was set to plain.
- FIX: Disabling the 5G Firewall Protection didn’t remove the 5G rules from the .htaccess file.
- TWEAK: voeg een knop ‘Negeren’ toe aan de installatiemelding van de firewall.
5.0.6 – 07/September/2022
- FIX: Stopped host cron job working in a specific situation.
- FIX: A few setting options like enabling the honeypot feature for registration page, disabling the application password, enabling move spam comments to trash after specified days, moving spam comments to trash after days, enabling remove database tables upon uninstalling, and enabling remove all plugin settings upon uninstalling the plugin were overridden on upgrading the plugin.
- TWEAK: Add a ‘safe message’ comment to the firewall’s settings file.
5.0.5 – 05/September/2022
- FIX: Cookie based brute force etc rules to be removed from .htaccess if set in older version 4.4.12.
- FIX: The IP lock notification mail was sent out for the 404 lockdown event.
- TWEAK: Resolve a PHP-firewall ‘Unable to locate workspace’ log message.
5.0.4 – 03/September/2022
- FIX: PHP coding warning in latest PHP version when handling email address parameter.
- TWEAK: Added a constant, AIOS_DISABLE_COOKIE_BRUTE_FORCE_PREVENTION. Define this in your wp-config.php to disable cookie based brute force login prevention.
5.0.3 – 02/September/2022
- FIX: An empty IP lock notification mail could be sent out after upgrading to the 5.0.0 version.
- FIX: The PHP file couldn’t be loaded via commandline if the rename login page is enabled.
- FIX: When running WordPress from the command line, the warning Undefined index: REQUEST_METHOD was logged.
- TWEAK: Import latest TFA module, loading JS less aggressively to avoid potential for conflicts.
5.0.2 – 02/September/2022
- FIX: The user can’t login if the user set forced logout and the site’s timezone is different than UTC.
- FIX: Avoid an incompatibility with Wordfence Login Security by not loading our TFA module if that plugin is active
5.0.0 – 01/September/2022
- FEATURE: Two-Factor Authentication (2FA) functionality & related settings.
- FEATURE: Set up a mechanism to load the firewall PHP file early.
- FEATURE: PHP firewall rule engine.
- FEATURE: Add WHOIS lookup functionality.
- FEATURE: Implement 6G firewall rules in the new PHP-based firewall.
- FEATURE: Disable WordPress application passwords.
- FEATURE: Remove the plugin’s tables and options when uninstalling the plugin according to configuration settings.
- FEATURE: Trash spam comments after n number of days as per configuration set in Admin Dashboard > WP Security > SPAM Prevention > the “Comment SPAM” tab > the “Comment Processing” section > the “Trash Comments After” settings.
- FEATURE: Brute force Cookie-based Firewall Protection based on the PHP code instead of htaccess rules so that it also works with Nginx, IIS etc servers.
- FEATURE: Allow multiple email addresses for the User Login > Notify By Email setting.
- FEATURE: IPv6 range support in CIDR Format enabled.
- FIX: The WooCommerce customer was redirected to the wp-login page after payment with an external payment gateway if forced logout configured after a specific number of minutes.
- FIX: If the WordPress language was set to something other than English, then auto-update core, plugin, and theme emails sent in English instead of the configured language.
- FIX: Database error for multisite when creating a new site solved.
- FIX: Captcha options should not be autoloaded.
- FIX: Database error for multisite cronjob column name.
- FIX: The plugin clogs up the database with lots of rows. Delete old data after 90 days.
- FIX: Rename Login issue with wp plugin list command solved.
- FIX: Rename Login breaks logout functionality if WP_HOME is set to a different URL than the WordPress core files URL.
- FIX: PHP Fatal error: Uncaught Error: Class ‘AIOWPSecurity_Admin_Init’ not found in html/wp-content/plugins/all-in-one-wp-security-and-firewall/wp-security-core.php:366.
- FIX: The Spam comment blocked IP address remains blocked even after spammed comments are approved.
- FIX: Admin Dashboard > WP Security > Security Points Breakdown Section piechart tooltips flickering.
- FIX: The “Time Length of 404 Lockout” option doesn’t do anything.
- FIX: Search did not work for the 404 Event Logs list table.
- FIX: Search did not work for Failed Logins list table.
- FIX: Search did not work for the Account Activity list table.
- FIX: Bulk deletions did not work for the Account Activity list table.
- FIX: Warning when bots make malformed requests.
- FIX: When the user had pressed the bottom bulk action button of the list table, the bulk action was confirmed by two confirm alerts.
- FIX: Unblock link in 404 Event Logs list table redirected to wrong tab.
- FIX: Temp Block, Blacklist IP and Delete links in 404 Event Logs list table didn’t work.
- FIX: Rename login page and Cookie based brute force login prevention configurations didn’t work simultaneously.
- FIX: Fatal error when activating using older PHP versions
- FIX: If auto_prepend_file is already pointed to the firewall bootstrap file from php.ini manually, the bootstrap file try to include itself.
- FIX: The custom logo wasn’t displayed on the login lockdown unlock request form.
- TWEAK: Allow taking database backups via the UpdraftPlus backup plugin.
- TWEAK: maak uitsluitingsredenen specifieker.
- TWEAK: Update notice class.
- TWEAK: If the user has not performed the cookie test, the brute force attack prevention configuration fields remain disabled in the Admin Dashboard > WP Security > Brute Force > Cookie Based Brute Force Prevention.
- TWEAK: Display locked IP addresses lockout date and release date in WordPress settings format.
- TWEAK: Improve success or messages when performing bulk actions on the table list.
- TWEAK: 404 events date is displayed in WordPress settings format.
- TWEAK: Account activity login date and logout date are displayed in WordPress settings format.
- TWEAK: voeg een label toe voor elk instellingsveld.
- TWEAK: JQMIGRATE: jQuery.fn.click() event shorthand is deprecated.
- TWEAK: Fix typos at Admin Dashboard > WP Security > Firewall > Basic Firewall Rules > Block Access to Debug Log File.
4.4.12 – 22/April/2022
- FEATURE: Disable login lockdown feature when the AIOWPS_DISABLE_LOGIN_LOCKDOWN constant with true value.
- FEATURE: Implement lockout time multiplied on each lockout up to the maximum lockout time configured.
- FIX: For multisite giving fatal error on settings and dashboard page Call to a member function on null.
- FIX: Scores not updating correctly if a feature activated and “Remove wp generator meta info” activated shows 5/5 for all.
- FIX: Change hard-coded references of wp-content to WP_CONTENT_DIR constant.
- FIX: The AIOS plugin should not be site-wide activated in a multisite WordPress setup.
- TWEAK: Get user IP Address using an external service in local server setup.
- TWEAK: Filter name changed to “aiowps_pre_add_to_permanent_block” from “pre_add_to_permanent_block”.
- TWEAK: Filter name changed to “aiowps_filter_event_logger_data” from “filter_event_logger_data”.
- TWEAK: Disables the “Secret Word” and “Re-direct URL” input fields when the “Enable Brute Force Attack Prevention” option is unchecked.
- TWEAK: Show nice error on activation if site php version is lower than 5.6.
4.4.11 – 29/March/2022
- FEATURE: Reset all settings by clicking on the “Reset Settings” button on the Settings Page.
- FEATURE: Verify the Google reCaptcha Site key before rendering and disable it if the Google reCaptcha site key is invalid.
- FIX: PHP Fatal error: Cannot redeclare wp_install_maybe_enable_pretty_permalinks() in specific server.
- FIX: throwing database error for creating debug log table in specific MySQL server.
- FIX: Compatibility issue with WPML plugin for login and logout functionality.
- FIX: Update email sent in English instead of setting language.
- FIX: The Simple Math Captcha can’t be validated when a third-party plugin clears transients more frequently.
- FIX: The login lockdown unlock request was not working in a few specific server environments.
- FIX: The warning headers already sent was displayed in a few specific server environments.
- FIX: Handle invalid tabs appropriately in setting pages.
- FIX: A Fatal error occurred when WooCommerce was activated, but it was disabled on the frontend by the Asset Cleanup Pro plugin.
- FIX: Fix login lockout issue with different timezone.
- TWEAK: Add review notice.
- TWEAK: Improve functionality of fake google bot prevents to access the site.
- TWEAK: Remove IP address retrieval setting and detect IP address automatically.
- TWEAK: Verify Google reCaptcha site key before rendering the reCaptcha.
- TWEAK: Remove force logout checking from REST API Call.
- TWEAK: Made Admin Dashboard > WP Security > Settings tabs extensible.
- TWEAK: Add G2 review message in the admin footer.
- TWEAK: Format failed login date time according to WordPress general settings.
- TWEAK: Remove unused codes from AIOWPSecurity_Config.
- TWEAK: Add more specific instructions to change the Display name compared to the username in Admin Dashboard > WP Security > User Accounts > “Display Name” tab > “Modify Accounts With Identical Login Name & Display Name” section.
- TWEAK: Remove Admin Dashboard > WP Security > Site Info tab (now redundant because of WP’s “Site Health” tool)
- TWEAK: The “Allow Login Lockout Request” checkbox is ticked by default.
4.4.10 – 21/Jan/2022
- FEATURE: Send site login lockout emails by batch processing instead of sending them instantly.
- FEATURE: Auto-purge failed login records after 90 days.
- FEATURE: Change the debug log so it’s stored in the database and not a file
- FIX: Missing Plugin header fields are added.
- FIX: PHP Warning Notice for finding IP Address appears when a dual proxy used.
- FIX: Logout date-time shows 1000-10-10 10:00:00 for non-logged out user.
- FIX: The notification for re-inserting the security rules in your .htaccess file appears after deactivating and activating the plugin to non-admin users.
- TWEAK: Replace obsolete variable reference style
- TWEAK: Sanitize $_REQUEST parameters in redirect function
- TWEAK: View debug logs from within the UI
- FIX: Compatibility issues with PHP 8.1.
- TWEAK: Advertise All in One WP Security Premium Plugin instead of Addons.
4.4.9
- Added Polish language translation file to the plugin. Thanks to Dariusz for submitting the language files.
- Fixed a typo in the help text.
- Allow the “redirect_to” parameter to be used on renamed login page when logged in. Thanks to @tvartom.
- Fixed a Typo in the help text located in the “Custom Rules tab”.
- Added a new filter hook (aiowps_execute_backup_set_memory_limit) to allow overriding of the PHP memory limit setting when executing a backup.
- WordPress 5.8
4.4.8
- Fixed an issue with the rename login page feature on WordPress v5.7.
4.4.7
- Updated the renamed login page code to reflect the latest WordPress wp-login.php code.
- Cleaned up/improved repeated code.
- Translation string fix in the rename login feature.
- Added action hook “aiowps_site_lockout_settings_saved” that is triggered after the site lockout configuration is saved.
- Updated some queries to use $wpdb->prepare() or esc_sql() wherever possible.
4.4.6
- Fixed potential vulnerability with the Banned User Agents feature (in the blacklist menu). Thanks to WonTae Jang.
4.4.5
- Fixed default DateTime to prevent DB error.
- Added Korean language translation files. Thanks to Jonghyun Cho.
- Reworked the code for the “Generate New DB Table Prefix” feature to make it more robust. Thanks to @baddiedev.
- Added translation ability to some strings.
4.4.4
- Fixed bugs and improved functionality related to “logged in users” functionality.
- Google recaptha checks for WooCommerce product reviews
- Replaced use of deprecated hook “wpmu_new_blog” with “wp_insert_site”
- Fixed a potential XSS issue in the settings menu of the plugin for IE11 or older browsers.
4.4.3
- Improved file change detection feature to address DB backups failing silently in some cases due to very large serialized data stored in a single row.
- Added new action hook (aiowps_rename_login_load) just before renamed login page is loaded.
- Added a check to ensure that woocommerce captcha settings are displayed only if woocommerce plugin is installed/active.
- Fixed recaptcha bugs.
- Added configurable item for max file upload size in basic firewall rules.
4.4.2
- Fixed vulnerability related to open redirect and exposure of hidden login page for specific case. (Thanks to Erwan (wpscanteam) for letting us know)
4.4.1
- Fixed bug where Apache directives were not being re-added into the .htaccess file after plugin re-activation.
- Fixed bug related to account activity logout date not being set.
4.4.0
- Added robustness to login lockdown feature by replacing the strtotime function with DateTime/DateInterval.
This should prevent 32-bit systems from being constrained to the max date of 19 Jan 2038. - Fixed bugs related to captcha features.
- Fixed and improved “Logged In Users” functionality for multisite.
- Always set valid dates, to avoid errors when strict mode is enabled on mysql. Thanks to Davide.
4.3.9.4
- Whois feature verwijderd omdat dit relatief weinig waarde toevoegt, en de bibliotheek van een andere leverancier die gebruikt werd, niet regelmatig wordt bijgewerkt.
- Foutmelding “headers already sent” opgelost, als er een bulkactie werd uitgevoerd m.b.v. de aiowps tabel lijst.
4.3.9.3
- Een andere captcha bug opgelost gerelateerd aan het reactie formulier.
4.3.9.2
- Verschillende captcha bugs opgelost:woocommerce wachtwoord verloren pagina, eigen login formulier pagina, etc
4.3.9.1
- Fixed rename login page feature bug introduced after WP core change in version 5.2.
4.3.9
- Captcha bug opgelost.
- Opgelost PHP_EOL issue als sommige IPV6 en v4 adressen opgeslagen worden, maar ongeldig verklaard werden.
- Bestandsrechten voor wp-config.php omgezet naar ‘640″
- Opgelost de BB prefix wijziging bug voor gevallen waar de DB tabellen had met het type “view”.
- Probleem met vertaal strings opgelost.
- Kleine stijl fix voor wp tabel lijst paginatie nav knoppen.
4.3.8.3
- Opnieuw proberen – Invoegtoepassing voor captcha-verificatie opgelost.
4.3.8.2
- Foutenaanmelding voor captcha-authenticatie opgelost.
4.3.8.1
- Kleine bugfix – ontbrekende cheque toegevoegd om recaptcha-script alleen in te huren als die functie is ingeschakeld.
4.3.8
- Mogelijkheid toegevoegd om de geheime login pagina link te verbergen bij het verzenden van e-mails naar mensen die vragen om de export van persoonlijke gegevens.
- Google reCaptcha kwam niet tevoorschijn op de reactie pagina, deze fout is opgelost.
- Vaste activering handler en de creatie van DB tabellen om multi- hanteren website activaties meer robuust.
- Verbeterde reCaptcha code om af en toe een optreden van voorkomen “Uncaught Fout : reCAPTCHA placeholder element moet een element of id zijn” fout .
- Toegevoegd extra controle voor PHP_OS waarde om te voorkomen dat Apple “DARWIN” wordt geïnterpreteerd als windows server.
- Enkele kleine vertaalproblemen op de inlogpagina voor hernoemen gecorrigeerd .
- Verhoogde prioriteit van authenticatiehaak voor captcha-controle.
- Het Nederlandse taalbestand geüpdatet.
4.3.7.2
- Meer “get_home_path” fatale fouten voorkomen.
4.3.7.1
- Vaste fatale fout opgelost met betrekking tot de “get_home_path” -functie.
4.3.7
- Toegevoegd Google reCaptcha eigenschap voor inlogformulieren.
- Verbeterde code die controleert of de site de belangrijkste is voor installaties met meerdere sites .
- De tekstdomeinstring uit de vertaalfuncties in het bestand wp-security-rename-login-feature.php verwijderd.
- Veranderde .htaccess pad locatie te get_home_path gebruiken ().
- Kleine WooCommerce captcha bug opgelost
4.3.6
- Toegevoegd nieuw tabblad genaamd “WP REST API” in het Diversen menu en creëerde een aparte functie die ongeoorloofde REST toegang voor niet-ingelogde gebruikers, onafhankelijk van de gebruikers opsomming functie uitgeschakeld.
- Verbeterde dashboard pagina widget gebied display.
- Kleine vertaalreeks opgelost in de functie inlogpagina wijzigen .
4.3.5
- Fix – Fout : aanroep van de ongedefinieerde functie the_privacy_policy_link () in oudere versies van WordPress.
- Toegevoegd een controle om bestand te wijzigen detectie functie uit te schakelen en te voorkomen dat fatale fouten wanneer FilesystemIterator is niet beschikbaar als gevolg van oude versies van PHP.
- Verbeterde methode get_login_fail_count in de klasse AIOWPSecurity_User_Login die gevallen verhelpt waarbij login vergrendeling
op sommige servers niet werkte vanwege het tijdstempelverschil tussen PHP current_time (‘mysql’) en mysql now().
4.3.4
- Gemodificeerde hernoemen login pagina te GDPR Export / Erase persoonsgegevens verwerken verzoek .
- Vaste woocommerce registratie pagina captcha bug.
- Verbeterde gebruikersentelling zodat geverifieerde aanvragen voor de REST API zijn toegestaan, maar andere worden geblokkeerd .
- Verbeterde logica in Renamed Login Pagina instellingen zoals onnodige oproep van AIOWPSecurity_Utility_Htaccess :: write_to_htaccess () functie wordt vermeden.
4.3.3.1
- Een typfout opgelost met de nieuw toegevoegde actiehaak – aiowps_before_wp_die_renamed_login
4.3.3
- Opgelost bug – aiowps zal nu toestaan toegang tot bestuurs- bericht Php van front-end als ombenoem login functie actief is.
- Aangepast login lockdown-functie, zodat het exacte IP-adres is vergrendeld en niet het IP-bereik.
- Toegevoegd nieuwe filter (aiowps_ip_blocked_output_page), die het mogelijk maakt de gebruiker om de volledige productie te filteren wanneer IP iemand is vergrendeld.
- Toegevoegd nieuwe actie haak (aiopws_before_wp_die_renamed_login) voor de hernoemde login functie die ontsteekt net voordat de wp_die gebeurtenis die de “Niet produceert beschikbaar ” gedrag.
- Ongebruikte code verwijderd.
- Gewijzigd get_user_ip_adres om het eerste IP-adres te krijgen in gevallen waarin er meerdere door komma’s gescheiden adressen zijn opgegeven – bijvoorbeeld X-Forwarded-For.
4.3.2
- Toegevoegd nieuw IP-adres instellingen pagina die de gebruiker de mogelijkheid om te configureren welke $ _SERVER global het IP-adres zal worden opgehaald uit. (Nieuwe instelling gevonden in WP-beveiliging & gt; & gt; Instellingen & gt; & gt; Geavanceerde instellingen)
- Probleem opgelost in .htaccess-regels die werden veroorzaakt toen 6G en IP Blacklist firewall-regels tegelijkertijd werden ingeschakeld.
- Bug opgelost waar captcha antwoord werd genegeerd op woocommerce login pagina.
- Toegevoegde ondersteuning voor unlock verzoeken gemaakt van woocomerce account login pagina wanneer rename login functie actief is.
- Toegevoegd nuttig debug-code voor het oplossen van problemen in de nep-googlebot functie.
- Enkele algemene codeopruiming en verbetering.
- Code toegevoegd om directe datalekken te voorkomen.
- Toegevoegd captcha instellingen voor BBPress nieuw bericht formulier.
- Kleine bug op Dashboard- pagina opgelost bij controle of htaccess-regels zijn toegepast.
- Toegevoegd een cheque voor Windows-installatie van de server in File Permissions voorzien – deze functie is niet van toepassing op Windows-servers.
- Toegevoegd check om te laten zien commentaar captcha alleen wanneer de gebruiker niet ingelogd.
4.3.1
- Verbeterde whitelist richtlijnen om te voorzien in Apache 2,4 en eerdere versies.
- Toegevoegd 3 filters voor de handmatige account registratie goedkeuring e-mail: aiowps_register_approval_email_subject, aiowps_register_approval_email_msg, aiowps_register_approval_email_from_name
- Toegevoegd configuratie optie om aangepaste firewallregels toe te passen aan het begin van alle regels toegepast door aiowps.
- Gewijzigde recordinserties naar DB-tabel aiowps_failed_logins om het volledige IP-adres op te slaan in plaats van het IP-bereik.
4.3.0
- Bijwerken WP-Security-Rename-Login-Feature. php voor opnemen van de laatste WordPress core veranderingen.
- Toegevoegd captcha voor woocommerce login en registratieformulieren.
- Vaste “gemengde lijneinde” waarschuwingen voor whois bibliotheek.
- Verplaatst DB Cleanup taak cron job van dagelijks tot per uur.
- Bijwerken naar de opnieuw toepassen htaccess werking zodat het geen “create the header already sent error” produceert.
4.2.9
- De parameter in de current_user_can-functie is gewijzigd om een beheerdersmogelijkheid te gebruiken in plaats van de rol van de beheerder.
- Toegevoegd een aantal nieuwe haken aan het AIOWPSecurity_WP_Loaded_Tasks genaamd aiowps_wp_loaded_tasks_start en aiowps_wp_loaded_tasks_end.
- Verbeterde get_locked_ips() functie en toegevoegd $wpdb->prepare statement.
- Toegevoegd meer ontbrekende vertaling domein parameters voor vertaalbare strings in de rename login pagina .
- Lokale kopie van de Perzische en Italiaanse taalbestanden verwijderd. Deze vertalingen zijn beschikbaar op translate.wordpress.org.
- Domeinpad en tekstdomein toegevoegd aan plugin header.
- De functies get_user_ip_address zijn gewijzigd, zodat $ _SERVER [‘REMOTE_ADDR’] de primaire methode is om het IP-adres te verkrijgen.
- Toegevoegd opsomming blok via REST API (WP > = 4,7)
4.2.8
- Verbeterde functie “Gebruikersregistratie” om de lopende goedkeuringsstatus te omzeilen voor nieuwe gebruikers die aan de kant van de beheerder zijn aangemaakt.
- Bug opgelost in de whois-bibliotheek.
- Parameter vertaalparagraaf toegevoegd voor vertaalbare reeksen op de inlogpagina voor hernoemen .
- Het Chinese taalbestand bijgewerkt.
4.2.7
- De PHPWhois bibliotheek bijgewerkt naar hun nieuwste versie om een beveiligingspatch op te nemen.
4.2.6
- Toegevoegd nieuwe Login Lockdown whitelist functie die immuniteit voor IP-adres of bereiken toestaat waardoor ze niet door de Lockdown functie worden geblokkeerd.
- Fixed bug-vervangen date_i18n met current_time om gevallen waarin sommige lokalisaties produceren vreemde tekens in datumstempel output te voorkomen.
- Added a new feature to add Honeypot to the WordPress’s user registration form (this can help reduce registration attempts by robots).
- Added “Export to CSV” buttons for 404 Event Logs, Account Activity Logs and Failed Login Records.
- Kleine update voor de 6G regels.
- Kleine spelfouten en bewoording aanpassingen.
4.2.5
- Fixed bug – added code which caters for mysql view definitions when DB prefix is changed.
- Fixed a typo in the user login security menu.
- Fixed storage of time stamp in lockdown table to match the local WordPress server time and be consistent with the timestamp stored in the failed logins table.
- Prevent direct access to wp-security-core.php
- Het POT bestand geupdate.
4.2.4
- Fix error on block_ip_if_locked(), doesn’t exit with a wp_user. This is needed for other plugins that create the $user (aka ldap auth plugins).
- Fix login error message for users with pending account approval.
- WordPress 4.7. compatibel.
4.2.3
- Fixed bug when math captcha was displayed on Woocommerce registration page.
- Fixed login page bug for cases where email address and captcha are used to submit login form (thanks to @chesio for fix).
- Logs directory now contains a .htaccess file with proper deny directives.
- Small UX improvement: add for attribute to captcha label.
- Added check for IIS server in get_server_type function.
4.2.2
- Debug log class verbeteringen.
- Een bericht in het debug instellingen gebied toegevoegd, om aan te geven dat de log bestanden worden gereset bij elke plugin update.
- Always return an array from scan_dir_sort_date() to prevent PHP notices.
- Improvements for Automated DB backups filling up space – old backup file will be deleted first.
- Thanks to RIPS Analyzer for sending us the vulnerability report.
4.2.1
- Improve output of .htaccess to include checks and RewriteEngine On directives.
- Fall back to default DB backup interval in case of invalid value.
- The aiowps_delete_backup_files() function will produce a debug log message on every call (to help with troubleshooting when needed).
4.2.0
- WPML plugin compatibility fix for the renamed admin login page feature.
- Fixed a few potential XSS vulnerabilities.
4.1.9
- Small improvement to the new “immediate blocking of specific usernames” feature.
4.1.8
- New feature to allow immediate blocking of specific usernames.
- Only activate copy (right-click) protection for non-admin users.
- Fixed bug where logout link in admin bar does not get updated on after the $_POST submit to reflect the new rename login setting.
- Fixed small bug in return_regularized_url function.
- Improvement/bug fix: When currently logged in user attempts to access renamed login page, redirect them to dashboard.
- Removed Spanish language files so they can be automatically pulled from WordPress.org.
- Drop unnecessary WHERE clause in some backend listings.
- Improvement: do not schedule a cronjob, if it is already scheduled.
4.1.7
- Added sanitisation for log file data in textarea.
- Disabled autocomplete for Captcha field.
4.1.6
- Added cleanup code for captcha string info transients.
- Minor change to the username label in the renamed login page to keep it inline with the standard WordPress login page.
- Fixed a potential vulnerability when viewing AIOWPS log files in the Dashboard menu. Thanks to Manuel LLOP for pointing this out.
4.1.5
- Fixed bug where username is an email and captcha was being ignored.
- Reduce memory footprint of database backup.
- Improvements: Make hard-coded strings localizable.
- Gedeeltelijke Apache 2.3 compatibiliteit.
- Improved: Hide WP version number by replacing it with a hash. This way, WordPress version number is not exposed, but browser caching is not obscured by missing version numbers.
4.1.4
- Improved and tweaked the login captcha feature to avoid some issues people had with the last modification.
- Deleted reference to ini_get(‘safe_mode’) to avoid fatal errors for newer versions of PHP where that setting has been totally removed.
4.1.3
- Added new checkbox for XMLRPC to disable only pingback methods but leave other XMLRPC functionality accessible. This will be useful for people who use Jetpack or WordPress iOS or other apps.
- Updated the French language file.
- Fix: decbin doesn’t add leading zero. Comparing empty strings return bad results.
- Fix: bugfix in the login captcha. Thanks to Sipke Mellema for pointing it out.
4.1.2
- Fixed bug introduced by last file change scanner code changes.
- Fixed bug in SPAM comment blocking functionality.
- Fixed fatal error case when Divi theme and front end lockout is enabled.
4.1.1
- Fixed Fatal error conflict between Rename Login feature and Yoast SEO and some themes when attempting to access wp-admin page directly.
- Bericht ‘In afwachting van goedkeuring’ toegevoegd wanneer de functie voor handmatige registratiegoedkeuring is ingeschakeld en een gebruiker zich registreert.
- Fix (minor): No need to use strcmp to compare integer values.
- Updated and simplified wp-security-stop-users-enumeration.php for bug (thanks to @davidegiunchidiennea)
- Minor code cleanup (Thanks to @chesio for the following changes).
- File scanner codebase cleanup.
- Fix: properly report invalid email addresses in file scanner configuration.
- Code clean-up in AIOWPSecurity_Scan::do_file_change_scan() method.
- Tweak: Compare file scan data faster.
4.1.0
- Fixed bug in Maintenance menu page when trying to attach a media file to the message text box.
- Added a new filter (called “aiowps_ip_blocked_error_msg”) which allows the modification of the error message displayed on the login page when an IP address has been blocked by the login lockdown feature.
- De Franse vertaling geupdate. Met dank aan Claude Ribaux voor het aanleveren van de vertaal bestanden.
- Thanks to @chesio for making the following two changes.
- Replaced deprecated call to get_currentuserinfo() function.
- Minor code fixes in the backup class file.
- Fix: display correct (error) message when write_to_htaccess() fails.
- Tweak: database backup filename is more human-readable.
Before: 24x7eg8l6i-database-backup-1463042767.zip
After: database-backup-20160512-104607-24x7eg8l6i.zip
4.0.9
- Made file change scanner code more robust for cases when open_basedir restriction is in effect. (Thanks to Manuel Jeanne for pointing this out).
- Added code which will remove WordPress version info during CSS and JS script loading if you have the “Remove WP Generator Meta Info” option checked. (Thanks to aldemarcalazans for pointing this out).
- Fixed some potential SQL injection vulnerabilities. (Thanks to Julio Potier for pointing these out).
- Changed the feature category of blacklist manger from “Intermediate” to “Advanced”.
- Tweak: Remove “@” from list of characters blocked by advanced character string filter. (Because it is often used in retina-ready images).
- Fix: Use home URL instead of site URL in lock notification email subject. Thanks to @chesio for fixing this.
4.0.8
- Added ability to identify IP addresses during user registration and option to block selected IPs.
- Added login form captcha functionality for sub-sites in a multi-site installation. (see the Brute Force menu)
- Fixed multi-site bug related to manual user-chosen DB prefix change.
- Added extra XSS protection inside admin menu pages for the “tab” query parameter.
- Added a note to the features that has the potential to lock you out if it doesn’t work correctly on your site.
- Updated Brazil-Portuguese language file.
- Fixed issue with firewall custom rules being corrupted by magic quotes. Thanks to @chesio for fixing this.
4.0.7
- Added a new action hook “aiopws_before_set_404” which triggers just before the AIOWPS sets a 404. (handy for cases when rename login page is used which affects some themes when accessing “wp-admin” directly)
- Fixed some potential SQL injection vulnerabilities.
- Thanks to @chesio for submitting the following changes and applying the fixes.
- Sub-directory install fixes.
- Improve behavior of WP File Access tab.
- Fix invalid nesting of HTML elements.
- Do not block HTTP requests that contain “tag=” in query string.
- Optie om de 6G firewall in te schakelen.
4.0.6
- Verwijderd het bekijken van de inhoud van wp-config.php en .htaccess bestanden om gevoelige informatie te beschermen.
- Fixed more potential XSS vulnerabilities in some other settings pages. (Once again many thanks to Erin Germ for pointing these out)
4.0.5
- Fixed some potential XSS vulnerability in the blacklist, file system and file change detection settings pages. (Many thanks to Erin Germ for pointing these out)
4.0.4
- Added new feature: Auto Block Spammer IPs. This feature will automatically and permanently block IP addresses which are linked to comment SPAM. (see SPAM Prevention -> Comment SPAM IP Monitoring tab)
- Added compatibility fix for the qTranslate-X plugin in the rename login page feature.
- Added ability to send to more than one email address for file change detection feature notification.
- Fixed bug in whois library when searching ARIN registry.
- Fixed the handling of display of longer IPV6 strings in dashboard summary table.
- Added hook for WooCommerce login form to display unlock button.
- De Nederlandse vertaling toegevoegd. Jeroen van der Linde wordt bedankt voor het aanleveren van de vertalingsbestanden.
- Typo fix in the “stop users enumeration” feature.
4.0.3
- Added urlencode to query strings in URLs to prevent unexpected behaviour. Thanks to @chesio for spotting the issue.
- Added new feature to stop users enumeration. Thanks to Davide Giunchi @davidegiunchidiennea for adding this.
- Added a more robust code for check_user_exists function. Thanks to Christian Carey.
- Added cron cleanup of the global meta table.
- Added a title in each of the admin interface menu.
4.0.2
- Added ability to enable/disable debug from the settings menu.
- Fixed bug related to using IP ranges in the whitelist settings.
- Added IPv6 support for the whitelist feature.
- Added check in file permissions feature for cases where wp-config.php may be located outside of root.
- Added wp cron DB cleanup events for various tables which may grow large over time.
- Changed firewall rule for proxy comment prevention to reflect suggestion made by Thomas O. in forum (https://wordpress.org/support/topic/high-server-cpu-with-proxy-login)
- Fixed CSS styling issue in admin pages for WordPrss 4.4
4.0.1
- De taalbestanden hernoemd zodat ze overeenkomen met de nieuwe tekstdomeinslug om de taalvertalingsfout te verhelpen.
- Probleem opgelost met betrekking tot de functie om inloggen te hernoemen en gedwongen uitloggen of verlopen uitlog gebeurtenissen.
- Applied fix for log being generated by events table DB insert.
- Corrected a function call to static version of display error msg.
4.0.0
- Tekstdomein aangepast aan verwachte waarde voor translate.wordpress.org vertaalsysteem.
- Bug opgelost met betrekking tot multi-site user_roles die niet werden geüpdatet voor sub sites.
- Kleine bug opgelost in de inlogfunctie hernoemen.
- Het Italiaanse taalbestand geüpdatet.
3.9.9
- Probleem met de functie om de loginpagina te hernoemen voor WordPress 4.3 is opgelost.
- Esc_attr() sanering toegevoegd aan enkele relevante parameters
- De nodige wijzigingen toegevoegd om activering via wp-cli mogelijk te maken
3.9.8
- Bescherming toegevoegd tegen mogelijke XSS in de unlock request functie.
3.9.7
- Nieuwe functie toegevoegd die aangepaste .htaccess regels toestaat. (Zie “Aangepaste regels” tab in Firewall menu). Je kunt dit nu gebruiken om aangepaste regels toe te voegen om de toegang tot verschillende bronnen op je site te blokkeren.
- Een nieuwe functie toegevoegd om de toegang tot het wp-content/debug.log bestand te blokkeren (WordPress maakt dit bestand aan als je de debug logging optie hebt ingeschakeld in het config bestand).
- De “v” uit het versienummer van de plugin verwijderd.
- Voltooid testen met WordPress 4.3.
3.9.6
- Hernoem login pagina functie toegevoegd vanuit het “Brute Force” menu aan multisite sub-sites.
- Ongeldig “lengte” attribuut verwijderd uit invoerelement in captcha code.
- Reset wachtwoord functie waarbij de URL die wordt verstuurd in de e-mail wanneer de hernoem login functie is ingeschakeld niet goed werd gedecodeerd.
- De controle op boolean false indien geretourneerd van wpdb query resultaat is verbeterd.
- Media knop toegevoegd voor wp editor in onderhoudsinstellingen pagina.
3.9.5
- Kleine bug verholpen – IP-adressen die geblokkeerd waren vanwege ‘404’ werden niet weergegeven in de weergavetabel.
- Het Russische vertaalbestand geüpdatet.
- De waarde voor het automatisch genereren van voorvoegsels voor databasetabellen gebruikt alleen a-z tekens.
- Esc_url sanering toegevoegd aan de add_query_arg/remove_query_arg functie instanties om mogelijke XSS te voorkomen.
3.9.4
- De parameters sort order en orderby gebruiken nu een whitelisting aanpak voor sanering.
3.9.3
- De sorteervolgorde werkte niet in de 404 fout logging en account activiteitenpagina.
3.9.2
- Een controle op registratie captcha functie toegevoegd om fouten te voorkomen bij het gebruik van een andere captcha plugin.
- Enkele SQL statements verbeterd.
3.9.1
- Toegevoegd nieuwe “Forceer uitloggen” functie die direct een bepaalde gebruiker zal uitloggen uit hun sessie. (Zie de “Ingelogde gebruikers” tab in het Gebruikerslogin menu)
- Added more security protection for aiowps log files by creating .htaccess file and rules. AIOWPS log files can now only be viewed via dashboard menu, in new tab called “AIOWPS Logs”. (NOTE:This security currently applies only for apache or similar servers)
- Backticks toegevoegd aan SQL statement voor DB voorvoegsel wijziging om fouten te voorkomen.
- Bescherming toegevoegd tegen mogelijke SQL injectie aanvallen.
3.9.0
- Wat robuustheid toegevoegd aan de bestand scan code.
- Added extra security to all relevant list table instances to prevent unlikely malicious deletion commands.
- Fixed the user agent part of the blacklist settings code to allow user-agents to be cleared upon saving.
3.8.9
- Fixed bug in the new feature which allows permanent blocking of IP addresses that create 404 events.
- Fixed minor bug for all instances where wpdb “prepare” was being used with order/orderby parameters.
- Fixed a possible open redirect vulnerability. Thanks to Sucuri for pointing it out.
3.8.8
- Added extra robustness and security for wp list table db commands by using wpdb “prepare” command.
- Fixed minor bug with undeclared variable in rename login feature page.
3.8.7
- Added an improvement for login lockdown feature – locked IP addresses will no longer be allowed to register.
- Een link “weergave” toegevoegd voor elk account in de lijst met tabel met goedkeuringen voor registratie in afwachting van registratie.
- Fixed 404 logging/lockout bug.
- Added ability to permanently block IP addresses from the 404 event list for both bulk and single cases.
- Added ability to do bulk temp blocking for IP addresses in 404 list.
- Fixed a minor bug with validate_ip_list function.
3.8.6
- DB schoonmaak cron evenement bug opgelost.
- Vertaling in het Zweeds toegevoegd. De vertaling is ingediend door Tor-Björn Fjellner.
- Russisch vertaalbestand geüpdatet. Update ingediend door Tor-Björn Fjellner.
- The events table will automatically be cleaned up so it only keeps the last 5000 entries. You can override it using a filter (if you wanted to).
3.8.5
- Functionaliteit toegevoegd om te voorkomen dat de aiowps_events tabel te groot wordt.
- Added file change scan summary inside the alert email.
- Fixed the unlock feature so that it works correctly when the Rename Login Page feature is active.
- Added a check in the list logged in users file to prevent error when get_transient returns false.
3.8.4
- Taalbestand POT geüpdatet.
- De functie die het IP-adres ophaalt aangepast om gevallen te behandelen waarbij het verkeer van cloudflare komt
- The MySQL database will not be forced anymore at the time of creating the table. It also reads the characters set value from the system first.
- Applied fixes to prevent remotely exploitable vulnerabilities.
3.8.3
- Modified “Pingback Protection” .htaccess rules to prevent xmlrpc login attacks and to be compatible with more servers.
- Made improvements to ensure that the rename login and white list features can be used together.
- Added a check to force user to enter alphanumeric string for renamed login slug.
- Improved the turn_off_all_firewall_rules() and turn_off_all_security_features() functions so that they also handle the updating of the htaccess file.
- Added an alternative way to import settings via a text box (Thanks to Dave McHale). This is for people who might have issues using the config settings file uploader.
- Added fix to properly update options tables when changing DB prefix in multisite system.
- Greatly improved the Renamed Login Page feature by removing various potential vulnerabilities.
- Added an if statement check to fix bug with rename login page feature – special case where user had non permalink structure was not working correctly in some rare scenarios.
- Het Italiaanse taalbestand geüpdatet.
- Fixed bug regarding wp_mail malformed header when “From” string was empty due to “site title” not being set.
- Fixed bug in IP list validation function for blacklist feature.
- Removed strict filtering of IP addresses so as to allow internal IP address ranges.
- Added stripping of orderby and order query parameters in the plugin.
- Added search capability by IP address, URL or referer for the 404 events list table.
3.8.2
- Een CSS probleem met de honeypot functie opgelost.
- Fixed a call to the login action handler static function.
3.8.1
- Minor bug fix for the honeypot feature – loading of css style sheet was not occurring when main login page rendered.
3.8.0
- Improved deactivation and re-activation tasks – AIOWPS will now gracefully clean up the .htaccess rules when the plugin is deactivated.
- Tweaked code so that all login pages including custom ones will correctly load the CSS style sheet file needed for honeypot feature.
- De Portugese vertaling geüpdatet.
- Fixed the copy protection feature so it doesn’t interfere with iframes and shortcodes.
- The plugin will now work fine even if your wp-config.php file is outside the wordpress root folder.
3.7.9.2
- kopieerbeveiliging JS code verbetering
3.7.9.1
- Added captcha functionality for custom login form which is produced by the WP function: wp_login_form()
- Fixed a minor bug with the copy protection feature’s JavaScript code.
- Tweaked file change scan algorithm to help prevent getMTime fatal runtime errors.
- Een link naar de github repository toegevoegd in het readme.txt bestand voor ontwikkelaars.
3.7.9
- Fixed a small bug related to the cookie test in the Cookie Based Brute Force feature.
3.7.8
- Added new feature called Login Honeypot which will help reduce brute force login attempts by robots. (This can be found in the Brute Force menu)
- Added new feature to prevent other sites from displaying your content via a frame or iframe. (This can be found in the Miscellaneous menu)
- Captcha functie toegevoegd voor BuddyPress registratieformulier.
- Added a new filter for the site lockout message so it can be customized.
- Added a new filter for template include of the site lockout feature.
- Tijdelijk de “DB scan” functie uitgeschakeld.
3.7.7
- Improved DB prefix change code to make it more robust.
- Fixed a minor bug for the Rename Login page feature.
- Added check when processing rename login page to see if maintenance (lockout) mode enabled. Plugin will now display lockout message instead of 404 page if site lockout enabled.
- Made the Cookie Based Brute Force Prevention feature more secure by introducing a 10 digit random suffix to the test cookie name.
3.7.6
- Added ability to insert captcha in WordPress Multi Site registration form.
- Added a condition around the management permission constant. This will allow users to define a custom capability for this plugin’s admin side via the wp-config file. This was submitted by Samuel Aguilera.
- Een bug opgelost met de verborgen login pagina functie.
- Fixed a small settings bug with the “block fake google bot” feature.
3.7.5
- Added a new DB scan feature. Go to the “Scanner” menu to use this new feature.
- Nieuwe import-/exportfunctie voor instellingen toegevoegd.
- Modified user accounts feature to alert administrator if one or both “admin” or “Admin” usernames are being used.
- Perzische vertaling toegevoegd. De vertaling werd ingediend door Amir Mousavi Pour (me@ameer.ir).
- Small change to get_mysql_tables function to prevent fatal error when mysqli query is unsuccessful.
- Vertaling in de Italiaanse taal toegevoegd. De vertaling werd ingediend door Marco Guglielmetti.
3.7.4
- Een nieuwe functie toegevoegd om kopieerbeveiliging toe te voegen voor je front-end. Je vindt deze functie onder het menu “Diversen”.
- Fixed comment captcha bug for multi-site. Now this feature can be activated/deactivated for subsites of a multisite installation.
- Added Hungarian language translation. The translation was submitted by Daniel Kocsis.
- Moved the custom login page feature’s handling code to wp-loaded hook so other plugins that modify the login page can do their task before our one is triggered. This change was suggested by Mark Hudnall.
- Duitse vertaling toegevoegd. De vertaling werd ingediend door Manuel Fritsch.
- Het vertaalbestand in de Braziliaanse taal geüpdatet.
3.7.3
- Vertaling in de Braziliaanse taal toegevoegd. De vertaling werd ingediend door Sergio Siqueira.
- Twee nieuwe actiehooks toegevoegd voor het activeren en deactiveren van de plugin.
- Improved the get_user_ip_address() function so it handles cases when multiple addresses are returned due to proxy.
- Fixed the mis-alignment of login page which was broken by WP3.9 when rename login feature is used.
- WordPress 3.9 compatibel
3.7.2
- Een PHP Info sectie toegevoegd in de systeem info interface om enkele belangrijke PHP details van de server te tonen.
- Added a filter to allow the user to have a custom translation in a place (which will be loaded instead of the default one from the plugin). This change was submitted by Samuel Aguilera.
- Replaced myslqi fetch_all method with fetch_assoc to cover cases where some servers do not have the correct mysql drivers.
- Added a new filter to allow manipulation of the htaccess rules from your custom code. The name of the filter is ‘aiowps_htaccess_rules_before_writing’.
- Een knop “Alle 404 gebeurtenislogs verwijderen” toegevoegd om alle 404-logs van DB te verwijderen
- Added code to automatically send an email to the registrant when an account has been manually “Approved” from the User Registration menu.
3.7.1
- Fixed a minor bug: dashboard link was pointing to the wrong tab for the “Logged In Users” tab.
- Fix a bug with the login page captcha. The captcha wansn’t shown if the rename login page feature was enabled at the same time.
3.7
- Added new feature – 404 detection. This allows you to log 404 events and block selected IPs. This feature can be found in the Firewall menu.
- Added new dashboard info box to display number of blocked IP addresses in the lockout table.
- Fixed bug where user could not access login page when maintenance mode and rename login page features were both active.
- De hotlinking .htaccess richtlijnen aangepast om zowel http als https te dekken.
- Fixed code to prevent mysql errors due to some variables not having default value in failed login and lockdown tables
- Replaced deprecated PHP function mysql_query with mysqli.
- Added language file for Spanish language. The Spanish translation was done by Samuel Montoya.
- Added code to hide the “DB Prefix” menu for the non-main sites in multi-site installation
3.6
- Added a new feature to prevent image hot-linking. (See the “Prevent Hotlinks” tab in the firewall menu)
- Added a check in the Rename Login Page feature to prevent people from setting the slug to “wp-admin”
- Fixed a small bug with Login Lockdown feature.
3.5.1
- Fixed a bug where the cookie-based brute force directives were not being deleted from the .htaccess file when the Rename Login Page feature was being activated.
3.5
- Added new feature which will Block Fake Googlebots from crawling your site. Check the Firewall menu for this new feature.
- Added code to prevent users from having both the Rename Login Page and Cookie-Based Brute Force features active at the same time.
- Added some useful info boxes in the dashboard: 1) to inform the user if the cookie based brute force or rename login page features are active, 2) last 5 logins to your site.
- Fixed minor bug with .htaccess backup feature.
- Updated the from email address value used for sending backups and file change notification. Thanks to @TheAssurer for the tip.
- Updated the warning message for the disable index view feature.
3.4
- Consolidated “Brute Force” features by moving all such features to the “Brute Force” menu.
- Improved the file change detection scan feature: Introduced a button allowing admin to view the file change results from the last scan and fixed small bug whereby the change detected flag was not being cleared for applicable cases.
- Fixed a small bug with “rename login page” (hide admin login) feature.
- Made wp-config.php and .htaccess file backups more secure. Thanks to @TheAssurer for the tip.
- Made the login code more robust by catering for cases where the “wp_login” action was not passing 2 parameters.
3.3
- Een gloednieuwe brute force preventie functie toegevoegd – Rename Login Page. Deze functie is te vinden in het nieuwe menu-item genaamd “Brute Force”.
- Modified the new unlock request feature so that the locked out user will only have to enter email address when they submit an unlock request.
- Replaced the deprecated PHP function “mysql_list_tables” with alternative code.
- Added warning message regarding WordPress iOS app when pingback protection feature in the firewall settings is active.
- Malware scan tab en informatie toegevoegd.
- Enkele kleine html formulier en CSS correcties.
3.2
- Added new feature which allows users to generate an automated unlock request link via email when they get locked out because of the login lockdown feature.
- Added a check to ensure that user cannot enter 0 minutes in the Force Logout feature.
- Fixed translations so that various previously omitted strings can now be translated.
- Added a new filter before locking down a user’s IP address – aiowps_before_lockdown.
- Een nieuw vertaalbestand (POT) gegenereerd.
3.1
- Added a new feature that will allow you to add a captcha to the lost password form (useful if you are allowing user registration on your site).
- Added ability to specify a system log file in the “Host System Logs” tab of the “File System Security” menu
- Fixed a tab link bug. One link was going to the wrong menu tab.
- Het POT bestand van de plugin geüpdatet.
3.0
- Added a new feature which allows you to add captcha to the WordPress user registration page.
- Added some more helpful comments and link to video tutorial in the brute force and white list features settings pages.
2.9
- Added new feature which automatically sets the status of newly registered wordpress user accounts to “pending” and allows manual approval by an administrator.
- Improved robustness of file change detection iteration code.
- WordPress 3.7 compatibiliteit
2.8.1
- Verbeterde implementatie van de login captcha
- Changed the management permission to manage_options
2.8
- Added a feature to insert a simple math captcha to the WordPress comment form (to reduce comment spam). Check the spam prevention menu for this new feature.
- Fixed a minor bug with bulk unlock/delete in user login menu
- Een kleine bug in de logica van de wiskunde captcha is opgelost.
2.7
- Added a simple math captcha functionality for the WP login page. This is another easy yet effective way to combat Brute Force Login Attacks. You can enable this new feature from the user login security menu.
2.6
- Added a new Login Whitelist feature. This feature enables you to specify one or more IP addresses in a special whitelist which will have access to your WP login page.
All other IP addresses trying to access your WP login page which are not in the whitelist will be automatically blocked. - The IP address will also be included in the email that gets sent to the admin for the ip address lockout notification.
- Oplossing voor het laden van taalbestanden in het Chinees.
- Tweaked the code which creates a .htaccess file in the backup directory to ensure it gets run even if the directory already existed.
- Made DB backups more secure.
- Added more useful debug logs for .htaccess file manipulation failure scenarios.
2.5
- Added a new feature which will list the currently logged in users who have been active within the last 15 minutes.
- Added a new feature in settings menu which will disable all firewall rules and clear all applicable directives in the .htaccess file.
- Improved the way the wp-config.php file is handled when it contains an ending PHP tag “?>” (older sites that were using PHP4 earlier).
2.4
- Added new feature/checkbox which will instantly lockout IP address ranges which attempt to login with an invalid username.
- Fixed a bug in the Comment SPAM IP Monitoring page where trying to block one or more IPs was failing.
- Removed the word “config” from the list of bad query strings check (to add compatibility with a few more plugins)
- Added a notice in the dashboard menu to show you if there are any recent file changes that the plugin detected.
- Fixed bug with php File Editing feature. Code now also handles older style wp-config.php files which have the php end tag “?>”
- Fixed bug with “Disable All Security Features” button functionality. When clicked, this will now also make the appropriate changes to the .htacces and wp-config.php files if necessary.
- Changed the storage of backup files from the plugin’s directory to the uploads directory. Also added a .htaccess file for security.
- Fixed the way user-agent strings were written to the .htacess file from the Blacklist feature. The code now will correctly identify and represent spaces and escaped chars.
- Fixed a bug related to sending backup to correct email address.
2.3
- Added new menu called Scanner with a new feature called File Change Detection. This feature will alert you if any files have changed, added or removed from your system.
- Fixed “Deny Bad Query Strings” rules to not break the ability to drag components in the WordPress “Appearance->Menus” page
- Fixed an activation time warning (on sites with WP_DEBUG option enabled)
- Re-implemented the wp-config.php file content backup feature. It now directly downloads the contents of the file to your computer.
- Multi-site enhancements: Suppressed access to configuration settings for features which are not allowed to be configured from subsites of multi-site installations.
- Fixed a bug with login lockdown feature.
2.2
- Added a new feature which will block some spambots from submitting comments.
- Moved Comment SPAM IP monitoring interface to the new “SPAM Prevention” menu.
- Fixed a bug with login lockdown feature for both multi and single site.
- Improved firewall feature for multi-site by making the “Firewall” menu available only for the main site and not the sub-sites.
- Added random prefix to backup file names.
- Fixed a bug for WP multi-site install where DB tables do not get created when new blog are created in the network.
2.1.1
- Fixed a version tagging issue.
2.1
- Fixed an issue with install time error on some sites for WordPress 3.6
- Fixed some WP Debug related errors for WordPress 3.6
- Replaced the deprecated $wpdb->escape() function calls with esc_sql() calls
2.0
- Fixed a bug for general DB backup functionality.
- Fixed multi-site DB backup – the plugin will now backup only the tables relevant for the sub-site in question.
- Added blank index.html files in various folders inside the plugin.
- Disabled the wp-config.php file backup feature until we find a more secure method of doing the backup.
1.9
- Added new WordPress PingBack Vulnerability Protection feature. This allows the user to prohibit access to the xmlrpc.php file in order to protect against certain vulnerabilities in the pingback functionality.
- Added a configuration item in the brute force login prevention feature to allow ajax functionality to work properly when this feature is enabled.
- Added a POT file for language translations.
- Made the DB Prefix feature more robust by adding a check to ensure that plugin can write to the wp-config.php file. This will prevent user from losing access to their site in cases where the system changed the prefix but not the entry in the wp-config.php file.
- Tightened the data validation for the cookie based brute force login feature to ensure that the user must enter a secret word which consists of alphanumeric characters.
- Added edit links to the user account list in the “User Acounts” menu.
1.8
- Moved the front end site lockout feature to a new menu called “Maintenance”.
- Added a feature in the front-end lockout feature to allow people to specify their own message which will be displayed on the front-end to visitors who try to access the site when it is in lock out state.
- Fixed a bug in the front-end lockout feature by adding some checks which ensure that the admin will not get locked if the feature is still active and their login session expires or they log out.
- Added a widget in the dashboard menu to show the status of the “maintenance mode” feature.
1.7
- Added a new feature which is a password strength tool which calculates how easy it is for your chosen password to be cracked using a desktop PC and the appropriate SW. This tool should help you create strong passwords.
- Added a front-end general visitor lockout feature. This feature allows you to temporarily lock down the front end of your site while you do security investigation, site upgrades, tweaks etc.
1.6
- Added a new option in the cookie-based Brute Force Login Attack prevention feature to allow users to use this feature together with the WordPress’s post/page password protection feature.
- Fixed a bug in the 5G firewall rules to so that the printed rules include the correct number of ‘\’ characters.
- Fixed a minor bug in the “restore from backed up htaccess file” feature.
- Enhanced the “Save current wp-config.php file” feature so it will continue to work with all of the firewall rules active on the site.
- Added extra checks to account for some error scenarios caused on some servers when recursive file search is done.
1.5
-
Added new feature – Cookie-based Brute Force Login Attack Prevention. Check under the “Firewall” menu for this new feature.
This feature will stop hackers in their tracks when they try to access your wp-admin or login pages. This feature will secure your WordPress backend by enforcing the requirement that anybody trying to access these pages will require a special cookie. -
Fixed bug related to setting of default configuration for first-time plugin activation.
1.4
- Tweaked the “Deny Bad Query Strings” firewall rules so that plugin deletion and update operations from the WordPress plugins menu are not affected.
- Fixed a minor bug related to scheduled database backups.
- Added some extra default settings to be applied to the plugin’s configuration pages upon activation for the first time.
- Plugin will now display a recommendation message if user sets scheduled backup frequency to less than 24 hours.
1.3
- Added a new feature to remove the WordPress Generator Meta information from the HTML source of your site.
- Tweaked the “Advanced Character String Filter” to fix issue which was affecting plugins such as “Admin Management Xtended” and also pages with keywords such as “password” in the URL.
- Updated one rule in the “Advanced Character String Filter” feature to make it compatible with W3 Total Cache Plugin’s minify feature.
- Een optie “Alle mislukte aanmeldingsrecords verwijderen” toegevoegd op het tab “Mislukte aanmeldingsrecords”. Dit verwijdert alle vermeldingen in de tabel met mislukte aanmeldingen en maakt het minder vervelend voor gebruikers die veel brute force-aanvallen op hun site krijgen.
1.2
- Moved the rules which disable index views from the “basic firewall” rules to the “additional rules” section. This will prevent any site breakage for
those who want to enable the basic firewall but do not have “AllowOverride” option enabled in their httpd.conf
1.1
- Added the following new feature:
- Prevent people from accessing the readme.html, license.txt and wp-config-sample.php files.
1.0
- First commit to the WP repository.